All Access Pass Online Training Portal

Trace File Analysis - Set 1 (CPE 1)

Watch Laura analyze various traffic patterns including:

  • honeypots attacking each other
  • a printing problem
  • illegal source IP address
  • someone sneaking traffic through the network
  • a network scan
  • a lousy hotel network
  • ARP process during a bootup sequence
  • ARP used to ping a local host
  • ARP used for discovery
  • bruteforce password cracking


This class includes the trace files (click the Documents button on the icon toolbar) for you to practice on!