Watch this video on YouTube
A penetration tester is tasked with capturing network traffic on a target network. Which tool would they use to monitor and analyze this traffic for signs of vulnerabilities or malicious activity?