官术网_书友最值得收藏!

Analysis

Once the Examination phase has extracted the potentially relevant pieces of data, the digital forensic examiner then analyzes the data in light of any other relevant data obtained. For example, if the digital forensic analyst has discovered that a compromised host has on open connection to an external IP address, they would then correlate that information with an analysis of the packet capture taken from the network. Using the IP address as a starting point, the analyst would be able to isolate the particular traffic. From here, the analyst may be able to determine that the compromised host is sending out a beacon to a C2 server. From here, using additional sources, the analyst may be able to determine what the particular attack vector is tied with that IP address.

主站蜘蛛池模板: 霍州市| 双鸭山市| 区。| 蕲春县| 濉溪县| 浮山县| 益阳市| 策勒县| 鹰潭市| 府谷县| 海兴县| 平湖市| 乐山市| 奈曼旗| 三门峡市| 卓资县| 东乡县| 从江县| 苏尼特左旗| 大关县| 普兰县| 安平县| 安新县| 武清区| 上虞市| 达孜县| 平罗县| 巫山县| 天水市| 巴彦淖尔市| 鹤岗市| 巴楚县| 泸西县| 常宁市| 莱芜市| 定远县| 中超| 民乐县| 阳山县| 白沙| 涿州市|