官术网_书友最值得收藏!

Analysis

Once the Examination phase has extracted the potentially relevant pieces of data, the digital forensic examiner then analyzes the data in light of any other relevant data obtained. For example, if the digital forensic analyst has discovered that a compromised host has on open connection to an external IP address, they would then correlate that information with an analysis of the packet capture taken from the network. Using the IP address as a starting point, the analyst would be able to isolate the particular traffic. From here, the analyst may be able to determine that the compromised host is sending out a beacon to a C2 server. From here, using additional sources, the analyst may be able to determine what the particular attack vector is tied with that IP address.

主站蜘蛛池模板: 大竹县| 缙云县| 海盐县| 木兰县| 容城县| 镶黄旗| 娄烦县| 陈巴尔虎旗| 保山市| 石屏县| 双柏县| 蓬安县| 新余市| 隆化县| 若尔盖县| 文昌市| 海盐县| 惠水县| 十堰市| 内丘县| 安阳市| 洛川县| 萨迦县| 宁城县| 茌平县| 祁连县| 拉孜县| 河东区| 芜湖县| 裕民县| 封丘县| 神木县| 上饶市| 潮州市| 本溪| 汝南县| 汉源县| 浪卡子县| 农安县| 鸡东县| 道孚县|