PCAP Analysis of the Nitroba Incident
The following is a pcap analysis walkthrough for a course on network traffic analysis. Without the pcap file, this post will not make much sense. The purpose of the post is really just for class amusement. Much like the emails, it will self destruct over the weekend.

Scenario
Someone connecting to a wifi router in the dorms sent harrassing and threatening emails to a professor. The students who had physical possession of the router allowed a wire tap to be placed on the router to capture traffic after the first message was sent. The task is to analyze the pcap from this after the second message was received to find forensic evidence that may indicate who was responsible for sending the messages.
Export Objects
First, there was quite a bit of traffic to sift through and with the specific transgressions in mind, I decided to first export objects.
HTML > search "www.willselfdestruct.com" Examined associated packets: 84366. User Agent looked suspicious. Looked at MAC address. MAC address from source indicates Apple computer (does not jive with the UA String). Note: I later learned that this was not really significant due to where the sniffer was. Nonetheless, the process did not lead me in a wrong direction.
Source MAC:
eth.addr == 00:17:f2:e2:c0:ce
Attacker IP address:
192.168.15.4






