These are not guides! These are me working through the challenge and narrating to myself so I can see my thinking. These exercises consist of a packet capture that occurred when a host on the network was compromised.

The task is to find how the attacker got in and what was compromised.

All these challenges are from: malware-traffic-analysis.net/