- Hands-On Network Forensics
- Nipun Jaswal
- 113字
- 2021-06-24 16:04:16
Technical requirements
To perform the exercises covered in this chapter, you will require the following:
- A laptop/desktop computer with an i5/i7 processor or any other equivalent AMD processor with at least 8 GB RAM and around 100 GB of free space.
- VMware Player/VirtualBox installation with Kali OS installed. You can download it from https://www.offensive-security.com/kali-linux-vm-vmware-virtualbox-image-download/.
- Installing Wireshark on Windows: https://www.wireshark.org/docs/wsug_html_chunked/ChBuildInstallWinInstall.html.
- Netcat From Kali Linux (already installed).
- Download NetworkMiner from https://www.netresec.com/?page=Networkminer.
- The PCAP files for this chapter, downloaded from https://github.com/nipunjaswal/networkforensics/tree/master/Ch1.
Every investigation requires a precise methodology. We will discuss the popular network forensics methodology used widely across the industry in the next section.
To install Wireshark on Windows, go to https://www.wireshark.org/docs/wsug_html_chunked/ChBuildInstallWinInstall.html.
推薦閱讀
- 工業(yè)物聯(lián)網(wǎng)安全
- 硬黑客:智能硬件生死之戰(zhàn)
- 計算機(jī)網(wǎng)絡(luò)安全技術(shù)研究
- 學(xué)電腦安全與病毒防范
- 情報驅(qū)動應(yīng)急響應(yīng)
- 網(wǎng)絡(luò)安全設(shè)計、配置與管理大全
- 互聯(lián)網(wǎng)企業(yè)安全高級指南
- 黑客攻防從入門到精通
- 交換機(jī)·路由器·防火墻(第2版)
- 安全網(wǎng)絡(luò)構(gòu)建
- 黑客攻防入門
- 網(wǎng)絡(luò)入侵檢測系統(tǒng)原理與應(yīng)用
- 動態(tài)賦能網(wǎng)絡(luò)空間防御
- Web前端黑客技術(shù)揭秘
- 企業(yè)安全建設(shè)入門:基于開源軟件打造企業(yè)網(wǎng)絡(luò)安全