- Hands-On Network Forensics
- Nipun Jaswal
- 60字
- 2021-06-24 16:04:17
IDS/IPS logs
From a forensic standpoint, intrusion detection/prevention system logs are the most helpful. IDS/IDPS logs provide not only the IP address, but also the matched signatures, on-going attacks, malware presence, command-and-control servers, the IP and port for the source and destination systems, a timeline, and much more. We will cover IDS/IPS scenarios in the latter half of this book.
推薦閱讀
- Android應用安全實戰:Frida協議分析
- 黑客大曝光:無線網絡安全(原書第3版)
- Metasploit Penetration Testing Cookbook(Second Edition)
- Kali Linux CTF Blueprints
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- 特種木馬防御與檢測技術研究
- Enterprise Cloud Security and Governance
- 工業物聯網安全
- VMware vCloud Security
- CTF快速上手:PicoCTF真題解析(Web篇)
- Mastering Metasploit
- Mastering Malware Analysis
- 計算機網絡安全與應用技術(第2版)
- 企業安全建設入門:基于開源軟件打造企業網絡安全
- 網站入侵與腳本技術快速防殺