![]() Other options can be found in Article #282: Recommendations on Secure File Sharing and File Storage. If not we can use a peer-to-peer file sharing channel such as Onionshare. The file can be sent over email if its size allows that.For more help, you can follow this guide on how to verify the hash. This step is needed in order to verify the integrity of the file. Then when the PCAP file is received, check that the hash is the same. Record the hash of the PCAP file on the beneficiary machine that was used to capture the traffic. ![]()
0 Comments
Leave a Reply. |