- Digital Forensics and Incident Response
- Gerard Johansen
- 184字
- 2021-07-02 18:49:49
Network Evidence Collection
The traditional focus of digital forensics has been to locate evidence on the host hard drive. Law enforcement officers interested in criminal activity such as fraud or child exploitation can find the vast majority of evidence required for prosecution on a single hard drive. In the realm of incident response though, it is critical that the focus goes far beyond a suspected compromised system. For example, there is a wealth of information to be obtained within the points along the flow of traffic from a compromised host to an external C2 server.
This chapter focuses on the preparation, identification, and collection of evidence that is commonly found among network devices and along the traffic routes within an internal network. This collection is critical during an incident where an external threat source is in the process of commanding internal systems or is in the process of pilfering data out of the network. Network-based evidence is also useful when examining host evidence as it provides a second source of event corroboration, which is extremely useful in determining the root cause of an incident.
- The Complete Rust Programming Reference Guide
- 計算機(jī)網(wǎng)絡(luò)
- Learning C# by Developing Games with Unity 2020
- PWA入門與實踐
- Getting Started with React
- OpenShift開發(fā)指南(原書第2版)
- Three.js開發(fā)指南:基于WebGL和HTML5在網(wǎng)頁上渲染3D圖形和動畫(原書第3版)
- Hands-On JavaScript High Performance
- Java 9模塊化開發(fā):核心原則與實踐
- Getting Started with NativeScript
- HTML+CSS+JavaScript網(wǎng)頁制作:從入門到精通(第4版)
- Android Game Programming by Example
- UI設(shè)計基礎(chǔ)培訓(xùn)教程(全彩版)
- Appcelerator Titanium:Patterns and Best Practices
- Java EE程序設(shè)計與開發(fā)實踐教程