- Hands-On Network Forensics
- Nipun Jaswal
- 118字
- 2021-06-24 16:04:16
Tapping the wire and the air
One of the purest and most raw forms of information capture is to put taps on network and optical fiber cables to snoop on traffic.
Many commercial vendors provide network taps and SPAN ports on their devices for snooping where they will forward all traffic seen on the particular port to the analyzer system. The technique is shown in the following diagram:

In the case of WLAN or Wi-Fi, the captures can be performed by putting an external wireless receptor into promiscuous mode and recording all the traffic for a particular wireless access point on a particular channel. This technique is shown in the following diagram:

推薦閱讀
- 攻守道:企業數字業務安全風險與防范
- DevSecOps敏捷安全
- Metasploit Penetration Testing Cookbook(Third Edition)
- 計算機使用安全與防護
- 數字安全藍皮書:本質屬性與重要特征
- Learning Veeam? Backup & Replication for VMware vSphere
- 網絡安全技術與實訓(第4版)(微課版)
- 編譯與反編譯技術實戰
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- 數字政府網絡安全合規性建設指南:密碼應用與數據安全
- 功能型密碼算法設計與分析
- 網絡空間安全法律問題研究
- 聯邦學習原理與算法
- 社會工程:防范釣魚欺詐(卷3)
- Metasploit 5.0 for Beginners