15 April 2026 • Wireshark & Nmap Analysis
ANALYST
Youssef Moataz
ENVIRONMENT
Kali Linux (VMware NAT)
DURATION
~12 Minutes
This report documents a technical analysis of network traffic captured during a simulated cyber attack. The study focused on baseline behavioral mapping and reconnaissance detection.
Patterns identified include high-volume SYN scanning, unencrypted data exchange, and service discovery on the local gateway. The findings highlight the importance of network visibility in identifying adversarial behavior early in the attack lifecycle.
Source: Kali VM
Target Gateway: 192.168.1.1
Activity: ~1.3k SYN packets
tcp.flags.syn==1 && tcp.flags.ack==0
Successful transport-layer connection to 127.0.0.1 detected. Service is fully interactive.
Active services expand the local attack surface and should be hardened to prevent exploitation.
Plaintext HTTP traffic captured. All application-layer headers and content are visible to passive monitoring tools on the network.
| Phase | Evidence Observed | Mapped Technique |
|---|---|---|
| Scanning | Massive SYN packet burst | T1046 (Network Scanning) |
| Enumeration | Targeted HTTP connection | T1016 (Device Discovery) |
| Exfiltration Risk | Plaintext HTTP GET requests | T1041 (Exfiltration) |

























