You are a junior security analyst at a small Japanese cryptocurrency trading company. After detecting suspicious activity on the internal network, you exported a PCAP for further investigation. Analyze this capture to determine whether the environment was compromised and reconstruct the attacker’s actions.
https://app.hackthebox.com/sherlocks/Packet Puzzle


we can see that 192.168.170.128 is performing port scanning on 192.168.170.130


filtering with ip.dst == 192.168.170.128 to view the responses shows replies from ports 22, 80, 135, 443, 445, 3389 and 5357, which totals eight open ports observed.