- Digital Forensics and Incident Response
- Gerard Johansen
- 184字
- 2021-07-02 18:49:49
Network Evidence Collection
The traditional focus of digital forensics has been to locate evidence on the host hard drive. Law enforcement officers interested in criminal activity such as fraud or child exploitation can find the vast majority of evidence required for prosecution on a single hard drive. In the realm of incident response though, it is critical that the focus goes far beyond a suspected compromised system. For example, there is a wealth of information to be obtained within the points along the flow of traffic from a compromised host to an external C2 server.
This chapter focuses on the preparation, identification, and collection of evidence that is commonly found among network devices and along the traffic routes within an internal network. This collection is critical during an incident where an external threat source is in the process of commanding internal systems or is in the process of pilfering data out of the network. Network-based evidence is also useful when examining host evidence as it provides a second source of event corroboration, which is extremely useful in determining the root cause of an incident.
- 零基礎學Visual C++第3版
- Spring 5.0 Microservices(Second Edition)
- Java高并發核心編程(卷2):多線程、鎖、JMM、JUC、高并發設計模式
- 程序員面試筆試寶典
- Java Web開發之道
- Apache Spark 2 for Beginners
- Python數據分析(第2版)
- SQL經典實例(第2版)
- Building Microservices with .NET Core
- iPhone應用開發從入門到精通
- 零基礎學Python編程(少兒趣味版)
- C編程技巧:117個問題解決方案示例
- .NET 4.0面向對象編程漫談:應用篇
- INSTANT PLC Programming with RSLogix 5000
- 透視C#核心技術:系統架構及移動端開發