

Other options can be found in Article #282: Recommendations on Secure File Sharing and File Storage. If not we can use a peer-to-peer file sharing channel such as Onionshare.

This step is needed in order to verify the integrity of the file. Then when the PCAP file is received, check that the hash is the same.

ProblemĪ system is behaving strangely and you need to conduct a network perimeter analysis to check if it is compromised. Edit me PCAP File Analysis with Wireshark to investigate Malware infection How to analyze a PCAP file using Wireshark.
