Discover How The Attack Happened By WireShark In this article you will learn how to use wireshark effectively to identify how the attack happened and what the attacker do on the compromised machine Discover How The Attack Happened By WireShark: In this scenario a pcap file generated by cyberlympics <ref-here> in the 2013 competition will be used to answer the following questions to identify how the attacker get in and how he extract the data from the compromised machine. The questions are: • What files were transferred to/from the victim? • What malware/unauthorized programs were installed? • What directory were files transferred to or from? • What is the router password? • What were user passwords changed to? • We will start by loading the pcap file into wireshark After while navigating throw the packet we identify interesting packets. Those packets are using FTP protocol. We will follow the stream to figure out what have bee...