Network Forensics Tracking Hackers through Cyberspace


Network Forensics: Tracking Hackers through Cyberspace
by: Sherri Davidoff and Jonathan Ham
Pages: 576 pages
Publisher finelybook 出版社:‏ Prentice Hall; 01 edition (13 Jun. 2012)
Language 语言: English
ISBN-10: 0132564718
ISBN-13: 9780132564717

Book Description


On the Internet,every action leaves a mark–in routers,firewalls,web proxies,and within network traffic itself. When a hacker breaks into a bank,or an insider smuggles secrets to a competitor,evidence of the crime is always left behind.
Learn to recognize hackers’ tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace. Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect’s web surfing history–and cached web pages,too–from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit,caught on the wire.
Throughout the text,step-by: -step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors’ web site (lmgsecurity.com),and follow along to gain hands-on experience.
Hackers leave footprints all across the Internet. Can you find their tracks and solve the case? Pick up Network Forensics and find out

打赏
未经允许不得转载:finelybook » Network Forensics Tracking Hackers through Cyberspace

评论 抢沙发

觉得文章有用就打赏一下

您的打赏,我们将继续给力更多优质内容

支付宝扫一扫

微信扫一扫