- Hands-On Network Forensics
- Nipun Jaswal
- 74字
- 2021-06-24 16:04:16
Source of network evidence
Network evidence can be collected from a variety of sources and we will discuss these sources in the next section. The sources that we will be discussing are:
- Tapping the wire and the air
- CAM table on a network switch
- Routing tables on routers
- Dynamic Host Configuration Protocol logs
- DNS server logs
- Domain controller/ authentication servers/ system logs
- IDS/IPS logs
- Firewall logs
- Proxy Server logs
推薦閱讀
- 數(shù)據(jù)恢復(fù)方法及案例分析
- Penetration Testing with Perl
- Preventing Digital Extortion
- 諸神之眼:Nmap網(wǎng)絡(luò)安全審計技術(shù)揭秘
- Spring Security(Third Edition)
- 安全防御入門手冊
- 互聯(lián)網(wǎng)企業(yè)安全高級指南
- End to End GUI Development with Qt5
- 企業(yè)數(shù)據(jù)安全防護(hù)指南
- 黑客攻防入門
- 社會工程:防范釣魚欺詐(卷3)
- BeagleBone for Secret Agents
- INSTANT Microsoft Forefront UAG Mobile Configuration Starter
- Web前端黑客技術(shù)揭秘
- 精通Veeam Backup&Replication(原書第2版)