Online PCAP analysis using apackets.com
For our final exercise, let’s look at another online packet analysis tool, available at https://apackets.com/. So, let’s get started with the exercise:
- Let’s download a sample file from https://www.malware-traffic-analysis.net/2022/06/07/index.html. The name of this file is
Emotet-epoch5-infection-with-Cobalt-Strike-.pcap
.

Figure 16.36 – A-Packets file upload interface
- Click on the From Device button and browse to the downloaded sample file to be uploaded for analysis.

Figure 16.37 – A-Packets file upload status
- Once A-Packets has automatically processed and analyzed our
.pcap
file, a very detailed and categorized breakdown of the findings will be presented, as seen in the following screenshot:

Figure 16.38 – A-Packets analyzed findings
If we scroll down a bit, we should see results...