- Digital Forensics and Incident Response
- Gerard Johansen
- 184字
- 2021-07-02 18:49:49
Network Evidence Collection
The traditional focus of digital forensics has been to locate evidence on the host hard drive. Law enforcement officers interested in criminal activity such as fraud or child exploitation can find the vast majority of evidence required for prosecution on a single hard drive. In the realm of incident response though, it is critical that the focus goes far beyond a suspected compromised system. For example, there is a wealth of information to be obtained within the points along the flow of traffic from a compromised host to an external C2 server.
This chapter focuses on the preparation, identification, and collection of evidence that is commonly found among network devices and along the traffic routes within an internal network. This collection is critical during an incident where an external threat source is in the process of commanding internal systems or is in the process of pilfering data out of the network. Network-based evidence is also useful when examining host evidence as it provides a second source of event corroboration, which is extremely useful in determining the root cause of an incident.
- FuelPHP Application Development Blueprints
- 深度學習經典案例解析:基于MATLAB
- Rust編程從入門到實戰
- Practical Game Design
- 微信公眾平臺開發:從零基礎到ThinkPHP5高性能框架實踐
- INSTANT OpenNMS Starter
- Nexus規模化Scrum框架
- Spring Boot Cookbook
- Hands-On Natural Language Processing with Python
- 持續輕量級Java EE開發:編寫可測試的代碼
- Go語言編程
- Odoo 10 Implementation Cookbook
- 小程序從0到1:微信全棧工程師一本通
- 深度實踐KVM:核心技術、管理運維、性能優化與項目實施
- 高性能PHP 7