Problem
i. If malicious actors got into your network to access to your network security logs, how could they use that information to their advantage?
ii. Provide examples of IP addresses, hostnames, and mac addresses based on your analysis of the .pcap files in Wireshark. What do you think is happening?