- Hands-On Network Forensics
- Nipun Jaswal
- 190字
- 2021-06-24 16:04:18
Identifying conversations and endpoints
You may want to view the list of IP endpoints that your system is communicating with. To achieve this, you can navigate to the Statistics tab and select Conversations, as shown in the following screenshot:

We can see that we have a variety of endpoints that are having conversations, the number of bytes transferred between the endpoints, and the duration of their data exchange. These options become extremely handy when you want to investigate malicious traffic and identify the key endpoints that are being contracted. Additionally, we can see that most of the conversations in the preceding screenshot involves 192.168.1.15 but we may not recognize the IP addresses its talking to.
We can also make use of the Endpoints option from the Statistics tab, as shown in the following screenshot:

From the preceding screenshot, we can see all the endpoints, and sorting them using the number of packets will give us a clear understanding of the endpoints that are transmitting the highest number of packets, which is again quite handy when it comes to analyzing anomalous network behavior.
- 工業互聯網安全
- 網絡空間攻防技術原理
- 零信任網絡:在不可信網絡中構建安全系統
- 黑客攻防入門秘笈
- 計算機使用安全與防護
- 黑客攻防與無線安全從新手到高手(超值版)
- Learning Veeam? Backup & Replication for VMware vSphere
- Kali Linux Network Scanning Cookbook(Second Edition)
- 硬黑客:智能硬件生死之戰
- 網絡空間安全導論
- 從實踐中學習Nmap滲透測試
- 紅藍攻防:技術與策略(原書第3版)
- Manga Studio 5 Beginner's Guide
- 惡意軟件、Rootkit和僵尸網絡
- Python Penetration Testing Essentials