Imagine you are a network forensics expert who has been tasked with analyzing the PCAP file. As soon as you open the file in Wireshark, you are presented with the following:
![](https://static.packt-cdn.com/products/9781789344523/graphics/assets/02f4ec43-deaa-4ac4-958c-e349f8c8341f.png)
What we can see from the capture file is that it contains a ton of ICMP packets traveling to and from 192.168.153.129 and 192.168.153.130. We quickly added a new column by right-clicking the column header in Wireshark and choosing Column Preferences and adding a new column by clicking the + button and choosing its type as UTC for the UTC time, as shown in the following screenshot:
![](https://static.packt-cdn.com/products/9781789344523/graphics/assets/5dd5631a-3d36-4953-b150-6067da5a8f39.png)
Next, we go to the Statistics tab and choose Capture File Properties:
![](https://static.packt-cdn.com/products/9781789344523/graphics/assets/8cd5fffe-037f-4d4c-9e97-0c591645326e.png)
The preceding option will populate the following window:
![](https://static.packt-cdn.com/products/9781789344523/graphics/assets/22e7c625-7e67-481b-af05-3b0f98ca7136.png)
We can see a good amount of detail related to the capture file, such as the date and time of the first packet, last packet, duration, average...