Assignment:
Using the below wireshark file. I need explanations how to find/filter those information, not just answers.
Task 1: What is the server address used by the hackers to communicate?
Task.2: What is the nickname of the malicious actors involved in this conversation? Add the names in the order they appear in the conversation.
Task 3: What channel do they use to communicate?
Task.4: What is the hash used by the malicious actor to validate its identity?