A penetration tester received a .pcap file to look for credentials to use in an engagement.
Which of the following tools should the tester utilize to open and read the .pcap file?
A. Nmap
B. Wireshark
C. Metasploit
D. Netcat
Which of the following tools should the tester utilize to open and read the .pcap file?
A. Nmap
B. Wireshark
C. Metasploit
D. Netcat