- Hands-On Network Forensics
- Nipun Jaswal
- 358字
- 2021-06-24 16:04:16
Introducing Network Forensics
Network forensics is one of the sub-branches of digital forensics where the data being analyzed is the network traffic going to and from the system under observation. The purposes of this type of observation are collecting information, obtaining legal evidence, establishing a root-cause analysis of an event, analyzing malware behavior, and so on. Professionals familiar with digital forensics and incident response (DFIR) know that even the most careful suspects leave traces and artifacts behind. But forensics generally also includes imaging the systems for memory and hard drives, which can be analyzed later. So, how do network forensics come into the picture? Why do we need to perform network forensics at all? Well, the answer to this question is relatively simple.
Let's consider a scenario where you are hunting for some unknown attackers in a massive corporate infrastructure containing thousands of systems. In such a case, it would be practically impossible to image and analyze every system. The following two scenarios would also be problematic:
- Instances where the disk drives may not be available
- Cases where the attack is in progress, and you may not want to tip off the attackers
Whenever an intrusion or a digital crime happens over the wire, whether it was successful or not, the artifacts left behind can help us understand and recreate not only the intent of the attack, but also the actions performed by the attackers.
If the attack was successful, what activities were conducted by the attackers on the system? What happened next? Generally, most severe attacks, such as Advanced Package Tool (APT), ransomware, espionage, and others, start from a single instance of an unauthorized entry into a network and then evolve into a long-term project for the attackers until the day their goals are met; however, throughout this period the information flowing in and out of the network goes through many different devices, such as routers, firewalls, hubs, switches, web proxies, and others. Our goal is to identify and analyze all these different artifacts. Throughout this chapter, we will discuss the following:
- Network forensics methodology
- Sources of evidence
- A few necessary case studies demonstrating hands-on network forensics
- 數(shù)據(jù)恢復(fù)方法及案例分析
- 黑客大曝光:無線網(wǎng)絡(luò)安全(原書第3版)
- 暗戰(zhàn)亮劍:黑客滲透與防御全程實(shí)錄
- 計(jì)算機(jī)病毒分析與防范大全(第3版)
- 工業(yè)物聯(lián)網(wǎng)安全
- 硬黑客:智能硬件生死之戰(zhàn)
- 計(jì)算機(jī)網(wǎng)絡(luò)安全技術(shù)研究
- 局域網(wǎng)交換機(jī)安全
- 計(jì)算機(jī)網(wǎng)絡(luò)安全基礎(chǔ)(第5版)
- 網(wǎng)絡(luò)安全設(shè)計(jì)、配置與管理大全
- 情報(bào)驅(qū)動(dòng)應(yīng)急響應(yīng)
- 信息技術(shù)基礎(chǔ):提高篇·實(shí)驗(yàn)與習(xí)題
- 網(wǎng)絡(luò)安全實(shí)戰(zhàn)詳解(企業(yè)專供版)
- 交換機(jī)·路由器·防火墻(第2版)
- 網(wǎng)絡(luò)空間安全法律問題研究