I understand what they are supposed to be, but how did Mike get his hands on them? And how does he know what he has are legit?
To go along with that, does he have anyway of proving these are legit captures? or is that what this is supposed to prove?
u/TheRoyalRob:
So lets say it isn't encrypted (or it is but key is known or shared by the network). What to do ? Simply you start some sniffer between communicating computers (let's say on some computer between,but that isn't only way) and you have packets captured.
It is all old story with Alice,Bob and Eve(sdopper)...