previous (10): As you can see, the first HTTP request (...)

[11] Now let's try to automate the analysis process we performed manually. Run the fhelp.pl script:

$ fhelp.pl sample_1.pcap $ fhelp.pl sample_2.pcap $ fhelp.pl sample_3.pcap

Has the script detected all the attacks we identified manually? Has it detected any threats that we overlooked?

THE END.

contents