Hello everyone! I have a question related to networking in general. In a pcap file, how can I differentiate between a โsyn scanโ and โack floodโ attacks? What are the signs that each of these attacks happened? Iโm using wireshark to analyse a pcap file.