- Hands-On Network Forensics
- Nipun Jaswal
- 113字
- 2021-06-24 16:04:16
Technical requirements
To perform the exercises covered in this chapter, you will require the following:
- A laptop/desktop computer with an i5/i7 processor or any other equivalent AMD processor with at least 8 GB RAM and around 100 GB of free space.
- VMware Player/VirtualBox installation with Kali OS installed. You can download it from https://www.offensive-security.com/kali-linux-vm-vmware-virtualbox-image-download/.
- Installing Wireshark on Windows: https://www.wireshark.org/docs/wsug_html_chunked/ChBuildInstallWinInstall.html.
- Netcat From Kali Linux (already installed).
- Download NetworkMiner from https://www.netresec.com/?page=Networkminer.
- The PCAP files for this chapter, downloaded from https://github.com/nipunjaswal/networkforensics/tree/master/Ch1.
Every investigation requires a precise methodology. We will discuss the popular network forensics methodology used widely across the industry in the next section.
To install Wireshark on Windows, go to https://www.wireshark.org/docs/wsug_html_chunked/ChBuildInstallWinInstall.html.
推薦閱讀
- 云原生安全:攻防實(shí)踐與體系構(gòu)建
- 特種木馬防御與檢測技術(shù)研究
- 安全技術(shù)運(yùn)營:方法與實(shí)踐
- 網(wǎng)絡(luò)安全技術(shù)及應(yīng)用(第3版)
- 從實(shí)踐中學(xué)習(xí)Kali Linux滲透測試
- 數(shù)據(jù)安全與流通:技術(shù)、架構(gòu)與實(shí)踐
- 網(wǎng)絡(luò)安全態(tài)勢感知
- 信息技術(shù)基礎(chǔ):提高篇·實(shí)驗(yàn)與習(xí)題
- 持續(xù)集成:軟件質(zhì)量改進(jìn)和風(fēng)險(xiǎn)降低之道
- 黑客攻防從入門到精通
- Bug Bounty Hunting Essentials
- 華為Anti-DDoS技術(shù)漫談
- 信息內(nèi)容安全管理及應(yīng)用
- 云計(jì)算安全:關(guān)鍵技術(shù)、原理及應(yīng)用
- Manga Studio 5 Beginner's Guide