Involves researching and describing normal expected behaviour of the TCP, identifiying anomalous behaviour or patterns within a Wireshark capture file, identifying impacted TCP header fields and other observations of anomalous behaviour exhibited in other layers if applicable. Using this information, identify and explain what type of attack has likely occured and provide on-premmises and outsourced mitigation strategies to stop this occuring in the future.