- Hands-On Network Forensics
- Nipun Jaswal
- 80字
- 2021-06-24 16:04:17
Routing tables on routers
Routing tables in a router maps ports on the router to the networks that they connect. The following table is a routing table. These tables allow us to investigate the path that the network traffic takes while traveling through various devices:

Most of the routers have inbuilt packet filters and firewall capabilities as well. This means that they can be configured to log denied or certain types of traffic traveling to and from the network.
推薦閱讀
- Extending Symfony2 Web Application Framework
- Learning Python for Forensics
- Wireshark 2 Quick Start Guide
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- CTF那些事兒
- Mastering Reverse Engineering
- 數據安全與流通:技術、架構與實踐
- 人工智能安全(精裝版)
- 數據安全架構設計與實戰
- 實用黑客攻防技術
- Kali Linux高級滲透測試(原書第4版)
- 網絡空間安全:拒絕服務攻擊檢測與防御
- 信息內容安全管理及應用
- 黑客攻擊與防范實戰從入門到精通
- 網絡空間安全實戰基礎