Watch this video on YouTube
You are an information security manager of HDA Inc. You received an alert from IDS about malicious traffic attempting to enter your network. IDS captured the traffic. Which of the following tools will you use to investigate and analyze the traffic?