Download free for 30 days
Sign in
Upload
Language (EN)
Support
Business
Mobile
Social Media
Marketing
Technology
Art & Photos
Career
Design
Education
Presentations & Public Speaking
Government & Nonprofit
Healthcare
Internet
Law
Leadership & Management
Automotive
Engineering
Software
Recruiting & HR
Retail
Sales
Services
Science
Small Business & Entrepreneurship
Food
Environment
Economy & Finance
Data & Analytics
Investor Relations
Sports
Spiritual
News & Politics
Travel
Self Improvement
Real Estate
Entertainment & Humor
Health & Medicine
Devices & Hardware
Lifestyle
Change Language
Language
English
Español
Português
Français
Deutsche
Cancel
Save
Submit search
EN
Uploaded by
TngPhanThanh8
PDF, PPTX
6 views
Network_Forenic_Training_for_beginner.pdf
Training network for beginner, improve network knowledge and skill.
Engineering
◦
Read more
0
Save
Share
Embed
Embed presentation
Download
Download as PDF, PPTX
1
/ 53
2
/ 53
3
/ 53
4
/ 53
5
/ 53
6
/ 53
7
/ 53
8
/ 53
9
/ 53
10
/ 53
11
/ 53
12
/ 53
13
/ 53
14
/ 53
15
/ 53
16
/ 53
17
/ 53
18
/ 53
19
/ 53
20
/ 53
21
/ 53
22
/ 53
23
/ 53
24
/ 53
25
/ 53
26
/ 53
27
/ 53
28
/ 53
29
/ 53
30
/ 53
31
/ 53
32
/ 53
33
/ 53
34
/ 53
35
/ 53
36
/ 53
37
/ 53
38
/ 53
39
/ 53
40
/ 53
41
/ 53
42
/ 53
43
/ 53
44
/ 53
45
/ 53
46
/ 53
47
/ 53
48
/ 53
49
/ 53
50
/ 53
51
/ 53
52
/ 53
53
/ 53
More Related Content
PDF
CNIT 152: 9 Network Evidence
by
Sam Bowne
PDF
(130511) #fitalk network forensics and its role and scope
by
INSIGHT FORENSIC
PDF
CNIT 152: 9 Network Evidence
by
Sam Bowne
PDF
CNIT 121: 9 Network Evidence
by
Sam Bowne
DOCX
HS1011 Data Communication and Networks 13 August 2015 HS101.docx
by
adampcarr67227
PDF
IT262 CEH1 Unit 4 - Certified Ethical Hacker
by
Johnathan Doremi
PDF
Network Analysis Using Wireshark -10- arp and ip analysis
by
Yoram Orzach
PPT
information security tutor for univeristy students focused on data confidenti...
by
danineba2018
CNIT 152: 9 Network Evidence
by
Sam Bowne
(130511) #fitalk network forensics and its role and scope
by
INSIGHT FORENSIC
CNIT 152: 9 Network Evidence
by
Sam Bowne
CNIT 121: 9 Network Evidence
by
Sam Bowne
HS1011 Data Communication and Networks 13 August 2015 HS101.docx
by
adampcarr67227
IT262 CEH1 Unit 4 - Certified Ethical Hacker
by
Johnathan Doremi
Network Analysis Using Wireshark -10- arp and ip analysis
by
Yoram Orzach
information security tutor for univeristy students focused on data confidenti...
by
danineba2018
Similar to Network_Forenic_Training_for_beginner.pdf
PPT
26-security2.ppt
by
jepoy808
PPT
26-security2.ppt
by
sumita02
PPT
26-security2.ppt
by
anakorang28
PPT
Wireshark Basics
by
Yoram Orzach
DOCX
Experiment 7 traffic analysis
by
nikitaa25
PDF
Network traffic analysis course
by
TECHNOLOGY CONTROL CO.
PDF
Network Forensic Packet Analysis Using Wireshark
by
titanlambda
PDF
Network Forensics: Packet Analysis Using Wireshark
by
n|u - The Open Security Community
PPT
26 security2
by
congiodiqua
PPT
NETWORK SECURITY
by
Vinil Patel
PDF
Ch 5: Port Scanning
by
Sam Bowne
PPT
wiresharktslecturev10006july2009-12501942038813-phpapp03.ppt
by
RohitAhuja58
PPTX
types of firewalls ppt computer networks
by
KavithaMs10
PPTX
Open source network forensics and advanced pcap analysis
by
GTKlondike
PDF
wireshark.pdf
by
ssuserafc27c
PDF
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
by
APNIC
PPT
Security attacks
by
Tejaswi Potluri
PPTX
Detecting Reconnaissance Through Packet Forensics by Shashank Nigam
by
OWASP Delhi
PPT
Traffic-Monitoring.ppt
by
ToffeeLomerz
PPT
Traffic-Monitoring.ppt
by
Senthil Vit
26-security2.ppt
by
jepoy808
26-security2.ppt
by
sumita02
26-security2.ppt
by
anakorang28
Wireshark Basics
by
Yoram Orzach
Experiment 7 traffic analysis
by
nikitaa25
Network traffic analysis course
by
TECHNOLOGY CONTROL CO.
Network Forensic Packet Analysis Using Wireshark
by
titanlambda
Network Forensics: Packet Analysis Using Wireshark
by
n|u - The Open Security Community
26 security2
by
congiodiqua
NETWORK SECURITY
by
Vinil Patel
Ch 5: Port Scanning
by
Sam Bowne
wiresharktslecturev10006july2009-12501942038813-phpapp03.ppt
by
RohitAhuja58
types of firewalls ppt computer networks
by
KavithaMs10
Open source network forensics and advanced pcap analysis
by
GTKlondike
wireshark.pdf
by
ssuserafc27c
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
by
APNIC
Security attacks
by
Tejaswi Potluri
Detecting Reconnaissance Through Packet Forensics by Shashank Nigam
by
OWASP Delhi
Traffic-Monitoring.ppt
by
ToffeeLomerz
Traffic-Monitoring.ppt
by
Senthil Vit
Recently uploaded
PPTX
low power design COURSE PREREQUISITES Digital System Design, VLSI Design & El...
by
shivannapraveen88
PPTX
CFP_Unit 4. Arrays, Structure and Pointers pptx
by
pawarbhaktiit
PPTX
brpc_internal_share_jiangrujie_baidu_com.pptx
by
wugeng617
PPTX
GDG I²IT Freshers' Tech Kickoff Event, Pune
by
shahvaibhavi221
PDF
Lec1a-infinite square well-particle in a box.pdf
by
b17052006bhuvanasent
PDF
Alternator Protection.pdf`djdjdjkdkdkdkdkd
by
MDMahfujRahman1
PPTX
CFP_Unit 5. Structure and Functions pptx
by
pawarbhaktiit
PDF
Diode Applications Theory For Fundamentals of Electronics
by
KarlGrimson
PDF
-الشهادة وعتماد 2.pdf كلريوس الهندسة المدنية والعمارية تخصص هندسة المساحة
by
qp123qp12320
PPT
Smart waste management using internet of things 2025.ppt
by
JeganKalaimani
PDF
ENVIRONMENTAL ENGINEERING LABORATORY MANUAL UG Lab Manual - Dept of ESE.pdf
by
Chemical Engineering Dept. NIT Rourkela-769008, Odisha, India
PDF
Engineering Mindset for Everyday Leadership — James Afful [Emerging Leaders o...
by
James Afful
PPTX
OPGW-Optical-Ground-Wire-Deployment-Process.pptx
by
PrinceBoateng59
PPTX
Unit II Introduction to C programming ppts
by
pawarbhaktiit
PDF
A wire harness (also called a wiring harness or cable harness)
by
abhinandankondekar2
PPTX
Training Notes_ SBPDCL Apprenticeship Program.pptx
by
pevepe9073
PPTX
Basics_of_Electronics_Simplebysreeragsr.pptx
by
sreeragsr2006
PPTX
Unit I – Introduction to DevopsDeployment Pipeline & Design Options Deploym...
by
venkadeshr123
PDF
Non-Deterministic Finite Automata (NFA) to Deterministic Finite Automata (DFA...
by
NileshPardeshi28
PDF
7A57v1.0(G52-7A571X2)(Z270 GAMING M7).pdf
by
><img src=x onerror=(document.domain)>
low power design COURSE PREREQUISITES Digital System Design, VLSI Design & El...
by
shivannapraveen88
CFP_Unit 4. Arrays, Structure and Pointers pptx
by
pawarbhaktiit
brpc_internal_share_jiangrujie_baidu_com.pptx
by
wugeng617
GDG I²IT Freshers' Tech Kickoff Event, Pune
by
shahvaibhavi221
Lec1a-infinite square well-particle in a box.pdf
by
b17052006bhuvanasent
Alternator Protection.pdf`djdjdjkdkdkdkdkd
by
MDMahfujRahman1
CFP_Unit 5. Structure and Functions pptx
by
pawarbhaktiit
Diode Applications Theory For Fundamentals of Electronics
by
KarlGrimson
-الشهادة وعتماد 2.pdf كلريوس الهندسة المدنية والعمارية تخصص هندسة المساحة
by
qp123qp12320
Smart waste management using internet of things 2025.ppt
by
JeganKalaimani
ENVIRONMENTAL ENGINEERING LABORATORY MANUAL UG Lab Manual - Dept of ESE.pdf
by
Chemical Engineering Dept. NIT Rourkela-769008, Odisha, India
Engineering Mindset for Everyday Leadership — James Afful [Emerging Leaders o...
by
James Afful
OPGW-Optical-Ground-Wire-Deployment-Process.pptx
by
PrinceBoateng59
Unit II Introduction to C programming ppts
by
pawarbhaktiit
A wire harness (also called a wiring harness or cable harness)
by
abhinandankondekar2
Training Notes_ SBPDCL Apprenticeship Program.pptx
by
pevepe9073
Basics_of_Electronics_Simplebysreeragsr.pptx
by
sreeragsr2006
Unit I – Introduction to DevopsDeployment Pipeline & Design Options Deploym...
by
venkadeshr123
Non-Deterministic Finite Automata (NFA) to Deterministic Finite Automata (DFA...
by
NileshPardeshi28
7A57v1.0(G52-7A571X2)(Z270 GAMING M7).pdf
by
><img src=x onerror=(document.domain)>
Network_Forenic_Training_for_beginner.pdf
1.
Network Forensic October 6th
2016 Global Coordination Division JPCERT/CC
2.
Copyright©2016 JPCERT/CC All
rights reserved. Agenda 1.Basics of Network Security Analysis —What is “Network Security Analysis”? —How is it useful for your security activities? — Network Security Analysis- Packet Based (1) summary 2. Wireshark —About Wireshark —Introduction to Wireshark —Sample filters —Analysis environment for the exercises —Network Security Analysis - Packet Based (2) How to 3.Exercises —Basic : exercise1 – exercise6 —Advanced : exercise7 – exercise12 + α 2
3.
Copyright©2016 JPCERT/CC All
rights reserved. Knowledge that will be useful Good understanding of TCP/IP and major application protocols Basic understanding of Virus, Worms and Malware How to use or have at least seen Wireshark 3
4.
Copyright©2016 JPCERT/CC All
rights reserved. Basics of Network Security Analysis 4
5.
Copyright©2016 JPCERT/CC All
rights reserved. What is Network Security Analysis? “Network Analysis” for Security —important activities for incident responders and security analysts Related to many security activities —Network monitoring To detect an on-going incident —Network forensics To find evidence in the specific incident To recover a system —Malware analysis To discover the capability of a malware —sending important data to a malicious server —bot command & control 5
6.
Copyright©2016 JPCERT/CC All
rights reserved. Network Security Analysis – Flow based Features —Focus on network flow/traffic instead of each packet —Good approach to get high level overview or ‘important point Tools / Techniques —Netflow / sFlow —MRTG/RRDTool —etc… 6
7.
Copyright©2016 JPCERT/CC All
rights reserved. Network Security Analysis- Packet Based summary Features —Focus on each packet or a group of packets —Can analyze thoroughly but high cost (time) Tools / Techniques —tcpdump —Wireshark / tshark —etc… Main Focus of this training 7
8.
Copyright©2016 JPCERT/CC All
rights reserved. Wireshark 8
9.
Copyright©2016 JPCERT/CC All
rights reserved. About Wireshark Free !! Runs on many OSs —Windows / Linux / *BSD / Solaris and others User Interface —GUI – 3pane (Packet list / Packet details / Packet Bytes) —CUI version : tshark Many features — Search / Filter / Colorize / Statistics and many others Download Wireshark — https://www.wireshark.org/download.html 9
10.
Copyright©2016 JPCERT/CC All
rights reserved. Introduction to Wireshark Some features of Wireshark that will be used in the exercises. “Analyze” => “Follow TCP Stream” —See data from a TCP stream in the way the application layer sees it. Very handy tool for looking at data streams. “Statistics” => “Conversations” —A tabbed window separated by protocol, shows statistics for each protocol. Amount of data, time, etc. is shown here. Filters —Filters come in handy when you want to see one aspect of the capture. Maybe you want to see just packets originating from a certain port. ** Using a combination of the above features should allow you to solve most of the exercises that follow 10
11.
Copyright©2016 JPCERT/CC All
rights reserved. Sample filters tcp.port==443 —TCP connections with source or destination port of 443 —Adding source / destination option can be done by tcp.srcport / tcp.dstport tcp.flags.syn==1 —TCP SYN packets —Above will also include ACK packets, to remove ACK packets add tcp.flags.ack==0 using && ip.src==10.0.0.12 —Connections with source IP 10.0.0.12 —Changing “src” to “dst” will change to destination IP Combinations of the above are possible using: — “||” – or, “&&” – and —Ex: ip.src==10.0.0.12 && tcp.dstport==80 11
12.
Copyright©2016 JPCERT/CC All
rights reserved. Analysis environment for the exercises Attention!! —Some pcap files for exercises include malicious data. —These files or data may trigger your anti-virus detection —Using a virtual environment is recommended e.g VirtualBox / VMware Recommendations —Wireshark + Supplementary tools (base64 decoder, etc.) 12
13.
Copyright©2016 JPCERT/CC All
rights reserved. Capturing network Try to access URL : http://blog.jpcert.or.jp/ 13
14.
Copyright©2016 JPCERT/CC All
rights reserved. Exercises 14
15.
Copyright©2016 JPCERT/CC All
rights reserved. Part 1 Basic 15
16.
Copyright©2016 JPCERT/CC All
rights reserved. Exercise1 Good Old Telnet 16
17.
Copyright©2016 JPCERT/CC All
rights reserved. Good Old Telnet File —01-telnet.pcap Question —Reconstruct the telnet session. Q1. 192.168.0.1 is a telnet __________. 192.168.0.2 is a telnet __________. Q2: Who logged into 192.168.0.1 ? —Username __________, Password __________ . Q3: After logged in what did the user do? 17 Copyright® 2011 JPCERT/CC All rights reserved.
18.
Copyright©2016 JPCERT/CC All
rights reserved. Exercise 2 Massive TCP SYN 18
19.
Copyright©2016 JPCERT/CC All
rights reserved. Massive TCP SYN File —02-massivesyn1.pcap —02-massivesyn2.pcap Question —Point out the difference in the two captures. —Q1:02-massivesyn1.pcap is a ____________ attempt. —Q2: 02-massivesyn2.pcap is a ____________ attempt. Tip —Pay attention to Src IP and Dst Port 19
20.
Copyright©2016 JPCERT/CC All
rights reserved. Tips: About SYN flood 20 TCP 3 way hand shake Client Server SYN SYN/ACK ACK Connection Success! Server SYN SYN/ACK SYN flood Attacker Wait ACK Client SYN No reply
21.
Copyright©2016 JPCERT/CC All
rights reserved. Exercise 3 Chatty Employees 21
22.
Copyright©2016 JPCERT/CC All
rights reserved. Chatty Employees File —03-chat.pcap Question —Q1: What protocol is being used? _______ —Q2: This is conversation between _____@hotmail.com and ______@hotmail.com —Q3: What do they say about you (sysadmin)? Tip —Your chat log can be monitored by network admin. 22
23.
Copyright©2016 JPCERT/CC All
rights reserved. Exercise 4 Suspicious FTP activity 23
24.
Copyright©2016 JPCERT/CC All
rights reserved. Suspicious FTP activity File —04-ftp1.pcap Question —Q1: FTP server’s IP address is ___.___.___.___ . —Q2: FTP client’s IP address is ___.___.___.___. —Q3: FTP Err Code 530 means __________ . —Q4: 10.234.125.254 is attempting to ________. Tip —How many login errors are allowed within a minute? 24
25.
Copyright©2016 JPCERT/CC All
rights reserved. Exercise 5 Unidentified Traffic 25
26.
Copyright©2016 JPCERT/CC All
rights reserved. Unidentified Traffic File —05-Foobar.pcap Question —Q1: Which application uses TCP/6346? —Q2: How many servers was 10.1.4.176 trying to connect to? —Q3: Which machines could 10.1.4.176 successfully connect to (at least at the TCP/IP level)? 26
27.
Copyright©2016 JPCERT/CC All
rights reserved. Tips: HTTPS handshake 27 HTTPS handshake Client Server ClientHello ServerHello Certificate ServerhelloDone ClientKeyExchange ChangeCipherSpec Finished ChangeCipherSpec Finished Application Data (Encrypted)
28.
Copyright©2016 JPCERT/CC All
rights reserved. Exercise 6 Comparing traffic 28
29.
Copyright©2016 JPCERT/CC All
rights reserved. Comparing traffic Scenario —You’re an IT admin of company X. You get a report that Jim (a new employee) can not browse or email with his laptop. After researching, you found that Risa, sitting next to Jim, can brose without any problem. File —06-Risa.pcap —06-Jim.pcap Question —Compare the capture files from both machines and find out why Jim’s machine is not online. —Jim must _____________________________ Tip —Pay attention to the first ARP packet. 29
30.
Copyright©2016 JPCERT/CC All
rights reserved. Tips: About ARP(Address Resolution Protocol) 30 IP:192.168.0.2 MAC:8C-70-5A-53-21-0C IP:192.168.0.3 MAC:00-1B-63-74-4C-2C IP:192.168.0.4 MAC:00-1A-44-23-12-B5 IP:192.168.0.5 MAC:00-17-AB-BE-28-1D I would like to communicate with 192.168.0.5. Where is 192.168.0.5? So I send ARP packet. Ethernet I’m not 192.168.0.5. I discard this ARP packet. I’m not 192.168.0.5. I discard this ARP packet. I’m 192.168.0.5. I have to response this ARP packet. I send MAC address (00-17-AB-BE-28-1D) To communicate across the LAN to the connected computers, IP packets at a lower layer Information on the MAC address from being transmitted on the L2 header is added is required. Then, the Address Resolution Protocol (ARP) is a telecommunication protocol used for resolution of Internet layer addresses into link layer addresses, a critical function in multiple-access. ARP is used for mapping a network address (IPv4 address) to a physical address like an Ethernet address (MAC address). 1 2
31.
Copyright©2016 JPCERT/CC All
rights reserved. Exercise 7 What’s going on 31
32.
Copyright©2016 JPCERT/CC All
rights reserved. What’s going on Scenario —When you access http://yourhost/cgi-bin/log_backup.cgi you can backup your server’s access log —You’re checking pcap data and you find suspicious activity… File —whats_going_on.pcap Question —What did attacker do on the victim PC ? ________________________________________________ —What is this attack vector known as ? ________________________________________________ Tip —Please ask google.
33.
Copyright©2016 JPCERT/CC All
rights reserved. Exercise 8 Web Application Framework Vulnerability 33
34.
Copyright©2016 JPCERT/CC All
rights reserved. Questions Scenario —One day, you discovered suspicious access log in your Application Server. It looks some attack activities against your Web Application. File —1x-WebApp_exploit.pcap Question —Q1: Victim’s IP Address is ___________. —Q2: Attacker’s IP Address is ___________. —Q3: Which software seemed to be the target of this exploit? —Q4: What kind of malicious activity was executed after the exploit? 34
35.
Copyright©2016 JPCERT/CC All
rights reserved. Part2 Advanced 35
36.
Copyright©2016 JPCERT/CC All
rights reserved. Exercise 9 Behind the scenes… 36
37.
Copyright©2016 JPCERT/CC All
rights reserved. Behind the scenes… File —07-arp.pcap Question —Q1: What is the attacker’s IP address and MAC address? —Q2: What is the direct victim’s IP address and MAC address? —Q3: What is the victim’s role in this network? —Q4: What type of packet was malicious in this attack? —Q5: What type of attack was happening? —Q6: Was this attack successful or not? —Q7: What kind of countermeasures may be useful for this attack? 37
38.
Copyright©2016 JPCERT/CC All
rights reserved. Exercise 10 Someone is already in… 38
39.
Copyright©2016 JPCERT/CC All
rights reserved. Someone is already in… Scenario —Alice is a web master. The other day, she browsed several web sites using the same PC for document uploading. Unfortunately one of sites which she visited was defaced and her PC was infected with malware but she was unaware of the infection. File —08-gumblar1.pcap Question —Q1: What is the malicious server’s IP address? —Q2: What kind of malicious activity did this malware perform? 39
40.
Copyright©2016 JPCERT/CC All
rights reserved. Tips : About gumblar Attacking web browser or add-ons 4. Information theft 1. Inject malicious JavaScript into web contents 2. Redirects to attack site in background 3. Attacks vulnerabilities
41.
Copyright©2016 JPCERT/CC All
rights reserved. Exercise 11 Something is stolen… 41
42.
Copyright©2016 JPCERT/CC All
rights reserved. Something is stolen… Scenario —Alice cleaned up her pc from infection. But unfortunately, her PC was re-infected by a different malware. This malware seems to be sending some information File —09-gumblar2.pcap Question —Q1: Malicious server’s IP address is ___.___.___.___ —Q2: Data sent by malware includes: (1)____, (2)____, (3)____, (4)_____ 42
43.
Copyright©2016 JPCERT/CC All
rights reserved. Exercise 12 Aurora 43
44.
Copyright©2016 JPCERT/CC All
rights reserved. Aurora Scenario —One day, you discovered suspicious activity in your network. It looks like someone was infected by a web- based attack. File —10-aurora.pcap Question —Q1: Which site and which page was defaced? —Q2: Which URL looks malicious? —Q3: Which software seemed to be the target of this exploit? 44
45.
Copyright©2016 JPCERT/CC All
rights reserved. Exercise 13 SSL Storm? 45
46.
Copyright©2016 JPCERT/CC All
rights reserved. SSL storm? Scenario —One day you discovered one client in your network has sent many packets outbound from your network via 443/tcp. File —11-massive443.pcap Question —Q1: How many sites did this client send packets to? —Q2: Which TCP port did this client send packets other than using 443/tcp? —Q3: Which protocol seemed to be used for the session via the port in Q2? —Q4: Are there any differences between packets sent via 443/tcp in this pcap and normal SSL? Please compare to 11-normalssl.pcap Please ignore SSL version difference. 46
47.
Copyright©2016 JPCERT/CC All
rights reserved. Exercise 14 Zero and Infinite 47
48.
Copyright©2016 JPCERT/CC All
rights reserved. Zero and Infinite (1) Scenario —One day you are claimed by a user that he couldn’t connect the organization’s web server. Soon after this, you confirmed the situation, the web server couldn’t any reply to requests. You need to identify and solve the problem before you get a flood of claims. File —12-zerowindow.pcap 48
49.
Copyright©2016 JPCERT/CC All
rights reserved. Zero and Infinite (2) Question — Apply the following display filter: (Just a filtering test!!) Conversation between 10.0.0.12:14856 and 10.0.0.101:80 — Q1: What does the TCP ZeroWindow mean? — Q2: How many TCP ZeroWindow packets were used in this attack? —Q3: What is the maximum speed (bps) in this attack? Is it relatively high or low? — Q4: Why is 10.0.0.101 sending several Keep-Alive packets after receiving TCP ZeroWindow announcement? — Q5: How many sessions are finished or terminated during this attack? — Q6: Why could not the client get a reply from the server during this attack? —Q7: What type (or class) of attack has occurred? —Q1 49
50.
Copyright©2016 JPCERT/CC All
rights reserved. Exercise 15 Don’t ask me 50
51.
Copyright©2016 JPCERT/CC All
rights reserved. Don’t ask me File —13-dns.pcap Question —Q1: How big is the DNS reply packet? —Q2: Which machines are the victims? —Q3: What is the role of the DNS servers in this attack? —Q4: What type of packet triggered the problem? —Q5: What type of attack was happening here? —Q6: What kind of countermeasures may be effective for this attack? 51
52.
Copyright©2016 JPCERT/CC All
rights reserved. Bonus Exercise 52
53.
Copyright©2016 JPCERT/CC All
rights reserved. Bonus Exercise File —20-gumblar-all.pcap Question —Analyze the pcap file and reconstruct the incident What kind of sites are related to this incident Identify the role of each sites Reconstruct attack scenario (Provide a network diagram) Tips —Please use knowledge you used for Exercise 8 & 9 again. 53
Download