This document provides a detailed analysis of network traffic and packet capture using Wireshark in the context of Cyber Operations. It covers topics such as network boundaries, active nodes, external sources, types of traffic, protocols, and activity narratives for identifying attacks. The document also includes step-by-step instructions for installing and operating Wireshark.