You are chatting with your friends and transferred pictures by using a popular application (which uses ftp and http, a faked scenario). However, someone intercept your traffic by sniffing the communication signals and dumped into a few log files

File Download and Detail:
- Lab Instruction
- Quiz
- Related Files
https://drive.google.com/file/d/1g36mJ3P3nDhpdtB10tJVCHNa8o_4eRYH/view?usp=sharing
https://drive.google.com/file/d/1F57YqmF1Ti60MEci1W97ylo3xn6t94oQ/view?usp=sharing