eBooks-it.org Logo
eBooks-IT.org Inner Image

Learning Network Forensics

Learning Network Forensics Image

Book Details:

Publisher:Packt Publishing
Series: Packt , Learning
Author:Samir Datt
Edition:1
ISBN-10:1782174907
ISBN-13:9781782174905
Pages:274
Published:Feb 29 2016
Posted:Apr 27 2017
Language:English
Book format:PDF
Book size:9.64 MB

Book Description:

Identify and safeguard your network against both internal and external threats, hackers, and malware attacks About This Book * Lay your hands on physical and virtual evidence to understand the sort of crime committed by capturing and analyzing network traffic * Connect the dots by understanding web proxies, firewalls, and routers to close in on your suspect * A hands-on guide to help you solve your case with malware forensic methods and network behaviors Who This Book Is For If you are a network administrator, system administrator, information security, or forensics professional and wish to learn network forensic to track the intrusions through network-based evidence, then this book is for you. Basic knowledge of Linux and networking concepts is expected. What You Will Learn * Understand Internetworking, sources of network-based evidence and other basic technical fundamentals, including the tools that will be used throughout the book * Acquire evidence using traffic acquisition software and know how to manage and handle the evidence * Perform packet analysis by capturing and collecting data, along with content analysis * Locate wireless devices, as well as capturing and analyzing wireless traffic data packets * Implement protocol analysis and content matching; acquire evidence from NIDS/NIPS * Act upon the data and evidence gathered by being able to connect the dots and draw links between various events * Apply logging and interfaces, along with analyzing web proxies and understanding encrypted web traffic * Use IOCs (Indicators of Compromise) and build real-world forensic solutions, dealing with malware In Detail We live in a highly networked world. Every digital device-phone, tablet, or computer is connected to each other, in one way or another. In this new age of connected networks, there is network crime. Network forensics is the brave new frontier of digital investigation and information security professionals to extend their abilities to catch miscreants on the network. The book starts with an introduction to the world of network forensics and investigations. You will begin by getting an understanding of how to gather both physical and virtual evidence, intercepting and analyzing network data, wireless data packets, investigating intrusions, and so on. You will further explore the technology, tools, and investigating methods using malware forensics, network tunneling, and behaviors. By the end of the book, you will gain a complete understanding of how to successfully close a case. Style and approach An easy-to-follow book filled with real-world case studies and applications. Each topic is explained along with all the practical tools and software needed, allowing the reader to use a completely hands-on approach.

Download Link:

Related Books:

Mastering Windows Network Forensics and Investigation

Mastering Windows Network Forensics and Investigation Image
2nd Edition
An authoritative guide to investigating high-technology crimesInternet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book--aimed at law enforcement personnel, prosecutors, and corporate investigators--provides you with the training you need in order to acquire the sophisticated skills and software solutions to stay one step ahead of computer criminals. Specifies the techniques needed to investigate, analyze, and document a criminal act on a Windows computer or networkPlaces a special emphasis on how to thoroughly investigate criminal activity ...

Network Forensics

Tracking Hackers through Cyberspace
Network Forensics Image
'This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field.' Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research. On the Internet, every action leaves a markin routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind. Throughout the text, step-by-step case studies guide you through the analysis of network...

Learning IOS Forensics

Learning IOS Forensics Image
A practical hands-on guide to acquire and analyze iOS devices with the latest forensic techniques and tools About This BookPerform logical, physical, and file system acquisition along with jailbreaking the deviceGet acquainted with various case studies on different forensic toolkits that can be usedA step-by-step approach with plenty of examples to get you familiarized with digital forensics in iOSWho This Book Is ForIf you are a digital forensics examiner daily involved in the acquisition and analysis of mobile devices and want to have a complete overview of how to perform your work on iOS devices, this book is definitely for you. In Detail Mobile device forensics relates to the recovery of data from a mobile device. It has an impact on many differe...



2007 - 2021 © eBooks-IT.org