官术网_书友最值得收藏!

Summary

Over the course of this chapter, we learned about the basics of network forensics. We used Wireshark to analyze a keylogger and packets from a port scan. We discovered various types of network evidence sources and also learned the basics methodology that we should follow when performing network forensics.

In the next chapter, we will look at the basics of protocols and other technical concepts and strategies that are used to acquire evidence, and we will perform hands-on exercises related to them.

All credits for this above capture file goes to Chris Sanders GitHub repository at  https://github.com/chrissanders/packets .
主站蜘蛛池模板: 沐川县| 阿克| 治县。| 长岛县| 台前县| 雷波县| 淳安县| 沛县| 平南县| 河北区| 繁峙县| 赤壁市| 开原市| 永吉县| 隆德县| 元谋县| 平潭县| 吐鲁番市| 花垣县| 汽车| 密山市| 吴川市| 陆丰市| 梓潼县| 呼伦贝尔市| 光山县| 乌拉特中旗| 新源县| 应用必备| 柳江县| 克什克腾旗| 秦皇岛市| 项城市| 分宜县| 萨迦县| 临清市| 陇南市| 琼中| 方城县| 新建县| 磐石市|