Network forensics including capture locations, stealth-mode capture, optimal capture and
display filters, validating encrypted logins, identifying reconnaissance processes,
locating header and payload signatures, catching penetration tests, malware behavior,
backdoor communications and virus traffic