PacketDetective
As a SOC analyst, explore a collection of Wireshark pcap files that delve into various attack tactics, including evasion and lateral movement. Analyze network traffic captured within these pcaps ..
Q1 File => Traffic-1 What is the amount of bandwidth being used by the SMB protocol in bytes?

Q2 File => Traffic-1 Which username was utilized for authentication via SMB?

Q3 File => Traffic-1 What is the name of the file that was opened?



Q4 File => Traffic-1 What is the timestamp in UTC of the attempt to clear the event log? (UTC date and time)

Q5 File => Traffic-2 An attacker used a named pipe for communication to blend in and evade detection. What is the name of the service that utilized this pipe for communication?

Q6 File => Traffic-2 What was the duration of communication between 172.16.66.1 and 172.16.66.36?

Q7 File => Traffic-3 Which username is used to set up requests that may be considered suspicious?

Q8 File => Traffic-3 What is the name of the executable file utilized to execute processes remotely?

Last updated
