Network Traffic Analysis

Learn to read network packet captures to identify suspicious activity.

Packet Capture Challenge

The table below shows a capture of network traffic. Click on the rows you believe represent suspicious activity, then click "Check Answers" to see your results.

No.TimeSourceDestinationProtocolLengthInfo
10.000000192.168.1.101172.217.14.238
TCP
7449886 → 443 [SYN]
20.031132172.217.14.238192.168.1.101
TCP
74443 → 49886 [SYN, ACK]
30.031198192.168.1.101172.217.14.238
TCP
6649886 → 443 [ACK]
40.125432192.168.1.101172.217.14.238
TLSv1.2
583Client Hello
50.21549810.0.0.510.0.0.255
UDP
550Port: 138 > 138
60.301234172.217.14.238192.168.1.101
TLSv1.2
1400Server Hello, Certificate
70.405876192.168.1.1058.8.8.8
ICMP
98Echo (ping) request
80.512345192.168.1.102192.168.1.1
FTP
60Request: USER anonymous