- Digital Forensics and Incident Response
- Gerard Johansen
- 131字
- 2021-07-02 18:49:47
Analysis
Once the Examination phase has extracted the potentially relevant pieces of data, the digital forensic examiner then analyzes the data in light of any other relevant data obtained. For example, if the digital forensic analyst has discovered that a compromised host has on open connection to an external IP address, they would then correlate that information with an analysis of the packet capture taken from the network. Using the IP address as a starting point, the analyst would be able to isolate the particular traffic. From here, the analyst may be able to determine that the compromised host is sending out a beacon to a C2 server. From here, using additional sources, the analyst may be able to determine what the particular attack vector is tied with that IP address.
- Learning NServiceBus(Second Edition)
- 數據結構習題精解(C語言實現+微課視頻)
- 精通軟件性能測試與LoadRunner實戰(第2版)
- 大模型RAG實戰:RAG原理、應用與系統構建
- Linux Shell核心編程指南
- Lift Application Development Cookbook
- BeagleBone Robotic Projects(Second Edition)
- Python大規模機器學習
- Groovy 2 Cookbook
- SOA Patterns with BizTalk Server 2013 and Microsoft Azure(Second Edition)
- R語言:邁向大數據之路
- Raspberry Pi開發實戰
- 深入實踐C++模板編程
- Python程序設計現代方法
- Go Programming Cookbook(Second Edition)