<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: Computer Forensics : Network Case using Wireshark and NetworkMiner	</title>
	<atom:link href="https://www.forensicxs.com/computer-forensics-network-case-using-wireshark-and-networkminer/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.forensicxs.com/computer-forensics-network-case-using-wireshark-and-networkminer/</link>
	<description>Ethical Hacking &#124; Cybersecurity</description>
	<lastBuildDate>Sun, 06 Mar 2022 20:44:06 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>
		By: Forensicxs		</title>
		<link>https://www.forensicxs.com/computer-forensics-network-case-using-wireshark-and-networkminer/#comment-2493</link>

		<dc:creator><![CDATA[Forensicxs]]></dc:creator>
		<pubDate>Sun, 06 Mar 2022 20:44:06 +0000</pubDate>
		<guid isPermaLink="false">https://www.forensicxs.com/?p=919#comment-2493</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.forensicxs.com/computer-forensics-network-case-using-wireshark-and-networkminer/#comment-2488&quot;&gt;Lucas&lt;/a&gt;.

Hi Lucas, thanks for your comment. elishevet@gmail.com and jcoach@gmail.com are not the same person, this is not my meaning here. I was explaining that I had found a way to catch emails associated to some IP/MAC data, and by carefully checking the PCAP records, I found the frame 78990 which helps narrow down to Johnny Coach. Please read the other comments in the chat, especially with &quot;Kinimod&quot;, as we can see that this exercise has some limitations.
Hope this helps !]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://www.forensicxs.com/computer-forensics-network-case-using-wireshark-and-networkminer/#comment-2488">Lucas</a>.</p>
<p>Hi Lucas, thanks for your comment. <a href="mailto:elishevet@gmail.com">elishevet@gmail.com</a> and <a href="mailto:jcoach@gmail.com">jcoach@gmail.com</a> are not the same person, this is not my meaning here. I was explaining that I had found a way to catch emails associated to some IP/MAC data, and by carefully checking the PCAP records, I found the frame 78990 which helps narrow down to Johnny Coach. Please read the other comments in the chat, especially with &#8220;Kinimod&#8221;, as we can see that this exercise has some limitations.<br />
Hope this helps !</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Lucas		</title>
		<link>https://www.forensicxs.com/computer-forensics-network-case-using-wireshark-and-networkminer/#comment-2488</link>

		<dc:creator><![CDATA[Lucas]]></dc:creator>
		<pubDate>Sun, 06 Mar 2022 00:33:10 +0000</pubDate>
		<guid isPermaLink="false">https://www.forensicxs.com/?p=919#comment-2488</guid>

					<description><![CDATA[Hi Forensicxs, can you please explain the part regarding &quot;Now that we have found a way to identify the email adress of the attacker, let’s go through the different frames including the GET /mail/ HTTP/1.1 info and let’s check the email, IP, MAC data. Probably, we will find a match with the already suspicious IP/MAC pair from the previous paragraph ? Here below the result of my analysis in a table, the match is easily found and highlighted in red&quot;

I have not understood what they have in common to prove that they are the same person.]]></description>
			<content:encoded><![CDATA[<p>Hi Forensicxs, can you please explain the part regarding &#8220;Now that we have found a way to identify the email adress of the attacker, let’s go through the different frames including the GET /mail/ HTTP/1.1 info and let’s check the email, IP, MAC data. Probably, we will find a match with the already suspicious IP/MAC pair from the previous paragraph ? Here below the result of my analysis in a table, the match is easily found and highlighted in red&#8221;</p>
<p>I have not understood what they have in common to prove that they are the same person.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Forensicxs		</title>
		<link>https://www.forensicxs.com/computer-forensics-network-case-using-wireshark-and-networkminer/#comment-365</link>

		<dc:creator><![CDATA[Forensicxs]]></dc:creator>
		<pubDate>Mon, 14 Jun 2021 21:00:08 +0000</pubDate>
		<guid isPermaLink="false">https://www.forensicxs.com/?p=919#comment-365</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.forensicxs.com/computer-forensics-network-case-using-wireshark-and-networkminer/#comment-337&quot;&gt;o71&lt;/a&gt;.

Hi o71, thanks for your message :) 

Your analysis is good and supplements my article usefully

For the p3p.xml file, you may look here : https://en.wikipedia.org/wiki/P3P. It&#039;s basically a retired privacy protocol

An official solution may have been asked directly on the Nitroba case website, but as there has been no recent comments on this page, I decided to write my &quot;own&quot; solution]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://www.forensicxs.com/computer-forensics-network-case-using-wireshark-and-networkminer/#comment-337">o71</a>.</p>
<p>Hi o71, thanks for your message 🙂 </p>
<p>Your analysis is good and supplements my article usefully</p>
<p>For the p3p.xml file, you may look here : <a href="https://en.wikipedia.org/wiki/P3P" rel="nofollow ugc">https://en.wikipedia.org/wiki/P3P</a>. It&#8217;s basically a retired privacy protocol</p>
<p>An official solution may have been asked directly on the Nitroba case website, but as there has been no recent comments on this page, I decided to write my &#8220;own&#8221; solution</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Database Caching using Disk (Request-wide modification query)

Served from: www.forensicxs.com @ 2026-01-12 23:47:48 by W3 Total Cache
-->