Watch this video on YouTube
In the investigation of a network breach, which method is best for analyzing network packets captured during the incident?