Hello everyone, i am taking a course in Information of security.
I have question. How can i know whether there's suspicious activity.
Describe any suspicious activity or outlying data points. Use screen captures to help illustrate your findings.
Image may be NSFW.
Clik here to view.
This a bonus question in my course, but i would like learn about it.
I used Wireshark to capture and then saved the capture and opened it in Witness.
I have question. How can i know whether there's suspicious activity.
Describe any suspicious activity or outlying data points. Use screen captures to help illustrate your findings.
Image may be NSFW.
Clik here to view.

This a bonus question in my course, but i would like learn about it.
I used Wireshark to capture and then saved the capture and opened it in Witness.