| 1 | initial version |
There is a nmap scan buried in the capture. Is that what you're looking for?
Work down through the Statistics menus.
Protocol Hierarchy - not very interesting for this capture
Conversations - will help to find a very large conversation that can be excluded from analysis
Also pay attention to the ports being accessed. Does look like expected traffic?
Endpoints - who are the chatty nodes and what are they doing?
Good luck!
| 2 | No.2 Revision |
There is a nmap scan buried in the capture. Is that what you're looking for?
Work down through the Statistics menus.
Protocol Hierarchy - not very interesting for this capture
Conversations - will help to find a very large conversation that can be excluded from analysis
Also pay attention to the ports being accessed. Does this look like expected traffic?
Endpoints - who are the chatty nodes and what are they doing?
Good luck!