- Hands-On Network Forensics
- Nipun Jaswal
- 74字
- 2021-06-24 16:04:16
Source of network evidence
Network evidence can be collected from a variety of sources and we will discuss these sources in the next section. The sources that we will be discussing are:
- Tapping the wire and the air
- CAM table on a network switch
- Routing tables on routers
- Dynamic Host Configuration Protocol logs
- DNS server logs
- Domain controller/ authentication servers/ system logs
- IDS/IPS logs
- Firewall logs
- Proxy Server logs
推薦閱讀
- 網絡空間攻防技術原理
- Learning Python for Forensics
- 計算機使用安全與防護
- Enterprise Cloud Security and Governance
- 數據安全實踐指南
- Testing and Securing Android Studio Applications
- Spring Security(Third Edition)
- 數據安全領域指南
- Web安全之深度學習實戰
- 從實踐中學習密碼安全與防護
- SQL Injection Strategies
- 黑客攻防從入門到精通
- ATT&CK與威脅獵殺實戰
- CPK通向賽博安全之路:理論與實踐CPK Solution to Cyber Security:Theory and Practice
- 網絡安全技術及應用實踐教程