// Network Forensics Challenge Write-up
This challenge involved analyzing network traffic captures to identify suspicious activity and trace the attacker's footsteps through the network infrastructure.
Started by loading the PCAP file into Wireshark to get an overview of the traffic patterns and identify any anomalies in the network communication.
Applied various filters to isolate suspicious traffic and focus on potentially malicious communications.
Examined packet payloads to identify data exfiltration attempts and command-and-control communications.