- Hands-On Network Forensics
- Nipun Jaswal
- 112字
- 2021-06-24 16:04:17
DNS servers logs
Name server query logs can help understand IP-to-hostname resolution at specific times. Consider a scenario where, as soon as a system got infected with malware on the network, it tried to connect back to a certain domain for command and control. Let's see an example as follows:

We can see in the preceding screenshot that a DNS request was resolved for malwaresamples.com website and the resolved IP address was returned.
Having access to the DNS query packets can reveal Indicators of Compromise for a particular malware on the network while quickly revealing the IP address of the system making the query, and can be dealt with ease.
推薦閱讀
- DevSecOps敏捷安全
- 信息安全導(dǎo)論(在線實(shí)驗+在線自測)
- Mobile Forensics Cookbook
- SASE原理、架構(gòu)與實(shí)踐
- Metasploit Penetration Testing Cookbook(Third Edition)
- Penetration Testing with Perl
- Preventing Digital Extortion
- Computer Forensics with FTK
- 華為Anti-DDoS技術(shù)漫談
- 網(wǎng)絡(luò)空間安全導(dǎo)論
- INSTANT Kali Linux
- 計算機(jī)網(wǎng)絡(luò)安全實(shí)驗指導(dǎo)
- 物聯(lián)網(wǎng)信息安全技術(shù)
- 互聯(lián)網(wǎng)域名國際化與安全技術(shù)導(dǎo)論
- 中國網(wǎng)絡(luò)空間安全前沿科技發(fā)展報告(2018)