Learning Network Forensics (eBook)
274 Seiten
Packt Publishing (Verlag)
978-1-78528-212-6 (ISBN)
Identify and safeguard your network against both internal and external threats, hackers, and malware attacks
About This Book
- Lay your hands on physical and virtual evidence to understand the sort of crime committed by capturing and analyzing network traffic
- Connect the dots by understanding web proxies, firewalls, and routers to close in on your suspect
- A hands-on guide to help you solve your case with malware forensic methods and network behaviors
Who This Book Is For
If you are a network administrator, system administrator, information security, or forensics professional and wish to learn network forensic to track the intrusions through network-based evidence, then this book is for you. Basic knowledge of Linux and networking concepts is expected.
What You Will Learn
- Understand Internetworking, sources of network-based evidence and other basic technical fundamentals, including the tools that will be used throughout the book
- Acquire evidence using traffic acquisition software and know how to manage and handle the evidence
- Perform packet analysis by capturing and collecting data, along with content analysis
- Locate wireless devices, as well as capturing and analyzing wireless traffic data packets
- Implement protocol analysis and content matching; acquire evidence from NIDS/NIPS
- Act upon the data and evidence gathered by being able to connect the dots and draw links between various events
- Apply logging and interfaces, along with analyzing web proxies and understanding encrypted web traffic
- Use IOCs (Indicators of Compromise) and build real-world forensic solutions, dealing with malware
In Detail
We live in a highly networked world. Every digital device-phone, tablet, or computer is connected to each other, in one way or another. In this new age of connected networks, there is network crime. Network forensics is the brave new frontier of digital investigation and information security professionals to extend their abilities to catch miscreants on the network.
The book starts with an introduction to the world of network forensics and investigations. You will begin by getting an understanding of how to gather both physical and virtual evidence, intercepting and analyzing network data, wireless data packets, investigating intrusions, and so on. You will further explore the technology, tools, and investigating methods using malware forensics, network tunneling, and behaviors. By the end of the book, you will gain a complete understanding of how to successfully close a case.
Style and approach
An easy-to-follow book filled with real-world case studies and applications. Each topic is explained along with all the practical tools and software needed, allowing the reader to use a completely hands-on approach.
Identify and safeguard your network against both internal and external threats, hackers, and malware attacksAbout This BookLay your hands on physical and virtual evidence to understand the sort of crime committed by capturing and analyzing network trafficConnect the dots by understanding web proxies, firewalls, and routers to close in on your suspectA hands-on guide to help you solve your case with malware forensic methods and network behaviorsWho This Book Is ForIf you are a network administrator, system administrator, information security, or forensics professional and wish to learn network forensic to track the intrusions through network-based evidence, then this book is for you. Basic knowledge of Linux and networking concepts is expected.What You Will LearnUnderstand Internetworking, sources of network-based evidence and other basic technical fundamentals, including the tools that will be used throughout the bookAcquire evidence using traffic acquisition software and know how to manage and handle the evidencePerform packet analysis by capturing and collecting data, along with content analysisLocate wireless devices, as well as capturing and analyzing wireless traffic data packetsImplement protocol analysis and content matching; acquire evidence from NIDS/NIPSAct upon the data and evidence gathered by being able to connect the dots and draw links between various eventsApply logging and interfaces, along with analyzing web proxies and understanding encrypted web trafficUse IOCs (Indicators of Compromise) and build real-world forensic solutions, dealing with malwareIn DetailWe live in a highly networked world. Every digital device-phone, tablet, or computer is connected to each other, in one way or another. In this new age of connected networks, there is network crime. Network forensics is the brave new frontier of digital investigation and information security professionals to extend their abilities to catch miscreants on the network.The book starts with an introduction to the world of network forensics and investigations. You will begin by getting an understanding of how to gather both physical and virtual evidence, intercepting and analyzing network data, wireless data packets, investigating intrusions, and so on. You will further explore the technology, tools, and investigating methods using malware forensics, network tunneling, and behaviors. By the end of the book, you will gain a complete understanding of how to successfully close a case.Style and approachAn easy-to-follow book filled with real-world case studies and applications. Each topic is explained along with all the practical tools and software needed, allowing the reader to use a completely hands-on approach.
| Erscheint lt. Verlag | 29.2.2016 |
|---|---|
| Sprache | englisch |
| Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
| ISBN-10 | 1-78528-212-3 / 1785282123 |
| ISBN-13 | 978-1-78528-212-6 / 9781785282126 |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belletristik und Sachbüchern. Der Fließtext wird dynamisch an die Display- und Schriftgröße angepasst. Auch für mobile Lesegeräte ist EPUB daher gut geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich