Problem
• Problem I: How might one use Wireshark for good (Whitehat, network defense, internal systems administration)?
• Problem II: How might one use Wireshark for evil (Blackhat, hackers, external entities)?
• Problem III: Explore one additional feature of Wireshark. Describe its purpose. Provide screenshots of the feature you used.