- Hands-On Network Forensics
- Nipun Jaswal
- 76字
- 2021-06-24 16:04:17
CAM table on a network switch
Network switches contain content-addressable memory tables that store the mapping between a system's MAC address and the physical ports. In a large setup, this table becomes extremely handy, as it can pinpoint a MAC address on the network to a wall-jacked system, since mappings are available to the physical ports. Switches also provide network-mirroring capabilities, which will allow the investigators to see all the data from other VLANs and systems.
推薦閱讀
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- Metasploit Penetration Testing Cookbook(Third Edition)
- 零信任網絡:在不可信網絡中構建安全系統
- 計算機病毒分析與防范大全(第3版)
- 走進新安全:讀懂網絡安全威脅、技術與新思想
- 反黑命令與攻防從新手到高手(微課超值版)
- 華為防火墻實戰指南
- 無線傳感器網絡安全與加權復雜網絡抗毀性建模分析
- 華為Anti-DDoS技術漫談
- INSTANT Kali Linux
- 功能型密碼算法設計與分析
- 計算機網絡安全實驗指導
- 紅藍攻防:技術與策略(原書第3版)
- Blockchain Development with Hyperledger
- AI+網絡安全:智網融合空間體系建設指南