This is a dedicated watch page for a single video.
A security analyst observes an increase in network traffic believed to be an indicator of a brute force attack against a wireless network's encryption. Which tool would best analyze this type of traffic to confirm the attack?