- Hands-On Network Forensics
- Nipun Jaswal
- 113字
- 2021-06-24 16:04:16
Technical requirements
To perform the exercises covered in this chapter, you will require the following:
- A laptop/desktop computer with an i5/i7 processor or any other equivalent AMD processor with at least 8 GB RAM and around 100 GB of free space.
- VMware Player/VirtualBox installation with Kali OS installed. You can download it from https://www.offensive-security.com/kali-linux-vm-vmware-virtualbox-image-download/.
- Installing Wireshark on Windows: https://www.wireshark.org/docs/wsug_html_chunked/ChBuildInstallWinInstall.html.
- Netcat From Kali Linux (already installed).
- Download NetworkMiner from https://www.netresec.com/?page=Networkminer.
- The PCAP files for this chapter, downloaded from https://github.com/nipunjaswal/networkforensics/tree/master/Ch1.
Every investigation requires a precise methodology. We will discuss the popular network forensics methodology used widely across the industry in the next section.
To install Wireshark on Windows, go to https://www.wireshark.org/docs/wsug_html_chunked/ChBuildInstallWinInstall.html.
推薦閱讀
- 白話網絡安全2:網安戰略篇
- Mobile Forensics Cookbook
- 特種木馬防御與檢測技術研究
- 網絡空間安全:管理者讀物
- 走進新安全:讀懂網絡安全威脅、技術與新思想
- 反黑命令與攻防從新手到高手(微課超值版)
- Learning Veeam? Backup & Replication for VMware vSphere
- Python Penetration Testing Cookbook
- Cybersecurity Threats,Malware Trends,and Strategies
- 網絡空間安全導論
- 云計算安全技術與應用
- Practical Internet of Things Security
- 網絡入侵檢測系統原理與應用
- BeagleBone for Secret Agents
- 計算機網絡安全與應用技術(第2版)