- Hands-On Network Forensics
- Nipun Jaswal
- 112字
- 2021-06-24 16:04:17
DNS servers logs
Name server query logs can help understand IP-to-hostname resolution at specific times. Consider a scenario where, as soon as a system got infected with malware on the network, it tried to connect back to a certain domain for command and control. Let's see an example as follows:

We can see in the preceding screenshot that a DNS request was resolved for malwaresamples.com website and the resolved IP address was returned.
Having access to the DNS query packets can reveal Indicators of Compromise for a particular malware on the network while quickly revealing the IP address of the system making the query, and can be dealt with ease.
推薦閱讀
- 數(shù)據(jù)恢復(fù)方法及案例分析
- 黑客大曝光:無線網(wǎng)絡(luò)安全(原書第3版)
- 黑客攻防技巧
- 計(jì)算機(jī)使用安全與防護(hù)
- 代碼審計(jì):企業(yè)級(jí)Web代碼安全架構(gòu)
- 計(jì)算機(jī)網(wǎng)絡(luò)安全技術(shù)研究
- 計(jì)算機(jī)網(wǎng)絡(luò)安全基礎(chǔ)(第5版)
- 解密數(shù)據(jù)恢復(fù)
- 網(wǎng)絡(luò)安全設(shè)計(jì)、配置與管理大全
- 情報(bào)驅(qū)動(dòng)應(yīng)急響應(yīng)
- 黑客攻防從入門到精通
- 網(wǎng)絡(luò)安全實(shí)戰(zhàn)詳解(企業(yè)專供版)
- 交換機(jī)·路由器·防火墻(第2版)
- 網(wǎng)絡(luò)空間安全法律問題研究
- 黑客攻防入門