官术网_书友最值得收藏!

Analysis

Once the Examination phase has extracted the potentially relevant pieces of data, the digital forensic examiner then analyzes the data in light of any other relevant data obtained. For example, if the digital forensic analyst has discovered that a compromised host has on open connection to an external IP address, they would then correlate that information with an analysis of the packet capture taken from the network. Using the IP address as a starting point, the analyst would be able to isolate the particular traffic. From here, the analyst may be able to determine that the compromised host is sending out a beacon to a C2 server. From here, using additional sources, the analyst may be able to determine what the particular attack vector is tied with that IP address.

主站蜘蛛池模板: 巫溪县| 吉水县| 湖北省| 成安县| 鄂州市| 新田县| 蓝田县| 城市| 高阳县| 辽宁省| 江源县| 镇赉县| 邢台市| 共和县| 汽车| 西充县| 莱州市| 武城县| 凤台县| 新和县| 蒙自县| 鹤山市| 宜丰县| 桓仁| 石狮市| 沙河市| 德昌县| 香港| 台中县| 玉树县| 凌源市| 桂林市| 固阳县| 容城县| 泗阳县| 河源市| 道孚县| 昌乐县| 平舆县| 苍山县| 溆浦县|