- Hands-On Network Forensics
- Nipun Jaswal
- 358字
- 2021-06-24 16:04:16
Introducing Network Forensics
Network forensics is one of the sub-branches of digital forensics where the data being analyzed is the network traffic going to and from the system under observation. The purposes of this type of observation are collecting information, obtaining legal evidence, establishing a root-cause analysis of an event, analyzing malware behavior, and so on. Professionals familiar with digital forensics and incident response (DFIR) know that even the most careful suspects leave traces and artifacts behind. But forensics generally also includes imaging the systems for memory and hard drives, which can be analyzed later. So, how do network forensics come into the picture? Why do we need to perform network forensics at all? Well, the answer to this question is relatively simple.
Let's consider a scenario where you are hunting for some unknown attackers in a massive corporate infrastructure containing thousands of systems. In such a case, it would be practically impossible to image and analyze every system. The following two scenarios would also be problematic:
- Instances where the disk drives may not be available
- Cases where the attack is in progress, and you may not want to tip off the attackers
Whenever an intrusion or a digital crime happens over the wire, whether it was successful or not, the artifacts left behind can help us understand and recreate not only the intent of the attack, but also the actions performed by the attackers.
If the attack was successful, what activities were conducted by the attackers on the system? What happened next? Generally, most severe attacks, such as Advanced Package Tool (APT), ransomware, espionage, and others, start from a single instance of an unauthorized entry into a network and then evolve into a long-term project for the attackers until the day their goals are met; however, throughout this period the information flowing in and out of the network goes through many different devices, such as routers, firewalls, hubs, switches, web proxies, and others. Our goal is to identify and analyze all these different artifacts. Throughout this chapter, we will discuss the following:
- Network forensics methodology
- Sources of evidence
- A few necessary case studies demonstrating hands-on network forensics
- DevSecOps敏捷安全
- 科技安全:戰(zhàn)略實踐與展望
- SASE原理、架構(gòu)與實踐
- Metasploit Penetration Testing Cookbook(Third Edition)
- Getting Started with FortiGate
- 網(wǎng)絡(luò)安全技術(shù)及應(yīng)用(第3版)
- CTF競賽權(quán)威指南(Pwn篇)
- 云原生安全技術(shù)實踐指南
- 隱私計算
- 云原生安全與DevOps保障
- 網(wǎng)絡(luò)安全與攻防入門很輕松(實戰(zhàn)超值版)
- 云計算安全防護技術(shù)
- 黑客攻擊與防范實戰(zhàn)從入門到精通
- Android Application Security Essentials
- 網(wǎng)絡(luò)空間安全體系