官术网_书友最值得收藏!

Summary

Over the course of this chapter, we learned about the basics of network forensics. We used Wireshark to analyze a keylogger and packets from a port scan. We discovered various types of network evidence sources and also learned the basics methodology that we should follow when performing network forensics.

In the next chapter, we will look at the basics of protocols and other technical concepts and strategies that are used to acquire evidence, and we will perform hands-on exercises related to them.

All credits for this above capture file goes to Chris Sanders GitHub repository at  https://github.com/chrissanders/packets .
主站蜘蛛池模板: 尤溪县| 小金县| 克什克腾旗| 富裕县| 木里| 紫金县| 上栗县| 贵德县| 福泉市| 泸溪县| 广灵县| 文山县| 运城市| 泌阳县| 西宁市| 西丰县| 大邑县| 泽普县| 永济市| 鞍山市| 金沙县| 罗平县| 洛浦县| 伊通| 同江市| 迭部县| 东阿县| 奉贤区| 南和县| 绥江县| 江都市| 叶城县| 伊川县| 都昌县| 将乐县| 南开区| 开远市| 准格尔旗| 钦州市| 神木县| 荣昌县|