This project demonstrates network traffic investigation using Wireshark.
The objective is to analyze captured packet data and identify network communication patterns such as HTTP requests, protocols used, and host interactions.
- Wireshark
- Windows PowerShell
malicious-traffic-analysis │ ├── captures │ └── http.cap ├── analysis │ └── investigation_notes.md ├── reports │ └── investigation_report.md ├── screenshots │ ├── http_requests.png │ ├── ip_conversations.png │ └── protocol_hierarchy.png
- Open the PCAP file in Wireshark
- Inspect captured packets
- Identify protocols using protocol hierarchy
- Filter HTTP traffic
- Identify communicating hosts
- Document observations
- HTTP
- TCP
- IP
Network traffic shows HTTP requests generated by a client communicating with external servers. The packet capture demonstrates how web requests appear in network traffic and how analysts can investigate them.
- Packet capture analysis
- Network traffic investigation
- Protocol identification
- Security documentation
This project demonstrates basic network traffic analysis techniques used by security analysts and SOC teams when investigating suspicious network activity.