- Hands-On Network Forensics
- Nipun Jaswal
- 99字
- 2021-06-24 16:04:20
Summary
Over the course of this chapter, we learned about the basics of network forensics. We used Wireshark to analyze a keylogger and packets from a port scan. We discovered various types of network evidence sources and also learned the basics methodology that we should follow when performing network forensics.
In the next chapter, we will look at the basics of protocols and other technical concepts and strategies that are used to acquire evidence, and we will perform hands-on exercises related to them.
All credits for this above capture file goes to Chris Sanders GitHub repository at https://github.com/chrissanders/packets .
推薦閱讀
- Node Security
- 大型互聯(lián)網(wǎng)企業(yè)安全架構(gòu)
- 網(wǎng)絡(luò)安全保障能力研究
- INSTANT Windows PowerShell
- 物聯(lián)網(wǎng)安全滲透測(cè)試技術(shù)
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 隱私計(jì)算:推進(jìn)數(shù)據(jù)“可用不可見(jiàn)”的關(guān)鍵技術(shù)
- Mastering Python for Networking and Security
- 信息內(nèi)容安全管理及應(yīng)用
- Learn Azure Sentinel
- Practical Internet of Things Security
- Kali Linux無(wú)線網(wǎng)絡(luò)滲透測(cè)試詳解
- 網(wǎng)絡(luò)安全滲透測(cè)試
- 業(yè)務(wù)安全關(guān)鍵技術(shù)與應(yīng)用實(shí)踐
- 計(jì)算機(jī)網(wǎng)絡(luò)安全