Oblasti, naše knjige

Web design

Java, JavaScript, JScript, Perl

C++ Visual C++ C#

Apple - MAC OS X

Visual Basic .NET, VBA, V. Studio

Android

PHP I MYSQL

FULL STACK DEVELOPMENT

Python programiranje

WordPress

AutoCad, ArchiCAD, SolidWorks, Catia, Pro/Engineer

Mašinsko učenje

Access

Animacija

Audio, Multimedia, Video

Baze podataka

Cloud

CSS

Delphi

Digitalna fotografija

Django

E-komerc

ECDL

GOOGLE

Grafika, Dizajn, Štampa

Hardver

Internet

Joomla

jQuery

Mreže

MS Office

Obrada teksta

OFFICE 2013

Programiranje

Raspberry PI

Rečnici

Robotika

Ruby i Ruby on Rails

Sertifikati

SQL Server

Statistika

Tabele

Telekomunikacije

Unix, Linux

Windows

Windows 7

Windows 8

Zaštita i sigurnost

 

Oblasti, drugi izdavači

Alternativna učenja

Antropologija

Arheologija

Arhitektura

Astrologija

Astronomija

Audio kursevi + knjige

Autobiografija

Automobili

Bajke

Biografija

Biološke nauke

Botanika

Dečije knjige

Dizajn

Domaće pripovetke

Domaći roman

Drama

E-knjiga

Ekologija

Ekonomija

Elektrotehnika

Enciklopedija

Esejistika

Etika

Fantastika

Film

Filologija

Filozofija

Fizika

Fotografija

Geografija

Geologija

Građevinarstvo

Hemija

Hidrotehnika

Hobi

Horor

Humor

Intervju

Istorija

Istorija i teorija književnosti

Istorija umetnosti

Istorijski roman

Knjiga posle posla - Beletristika i ostala izdanja

Knjižare i naše knjige

Književna kritika

Kuvari, hrana i piće

Leksikografija

Lingvistika

Ljubavni roman

logo

Magija

Marketing

Mašinstvo

Matematika

Medicina

Memoari

Menadžment

Modeliranje podataka

Monografija

Muzika

Nagrađivanje knjige

Naučna fantastika

OpenOffice.org

Operativni sistemi

Oracle

Organizacione nauke

Pedagogija

Pisci u medijima

Ples

Poezija

Politika

Poljoprivreda

Popularna medicina

Popularna nauka

Popularna psihologija

Posao

Pozorište

Pravo

Pravoslavlje

Primenjene nauke

Pripovetke

Prirodne nauke

Priručnik

Psihologija

Publicistika

Putopis

Religija

Roman

Satira

Saveti

Slikarstvo

Socijalna mreža - Facebook

Sociologija

Sport

Sport i hobi

Strip

Tableti

Tehnologija

Triler

Turizam

Twitter

Udžbenici

Umetnost

Urbanizam

UX DIZAJN

Zoologija

 

Zaštita i sigurnost

 

Hands-On Network Forensics

 

Hands-On Network Forensics

Autor: Nipun Jaswal
Broj strana: 358
ISBN broj: 9781789344523
Izdavač: PACKT PUBLISHING
Godina izdanja: 2019.

Pregleda (30 dana / ukupno): 29 / 85

Predlog za prevod

  • Twitter
  • Facebook
  • Google plus
  • Linkedin
  • Pinterest
  • Email

 

 

  • Discover and interpret encrypted traffic
  • Learn about various protocols
  • Understand the malware language over wire
  • Gain insights into the most widely used malware
  • Correlate data collected from attacks
  • Develop tools and custom scripts for network forensics automation

Network forensics is a subset of digital forensics that deals with network attacks and their investigation. In the era of network attacks and malware threat, it’s now more important than ever to have skills to investigate network attacks and vulnerabilities. Hands-On Network Forensics starts with the core concepts within network forensics, including coding, networking, forensics tools, and methodologies for forensic investigations. You’ll then explore the tools used for network forensics, followed by understanding how to apply those tools to a PCAP file and write the accompanying report. In addition to this, you will understand how statistical flow analysis, network enumeration, tunneling and encryption, and malware detection can be used to investigate your network. Towards the end of this book, you will discover how network correlation works and how to bring all the information from different types of network devices together. By the end of this book, you will have gained hands-on experience of performing forensics analysis tasks.

  • Investigate network threats with ease
  • Practice forensics tasks such as intrusion detection, network analysis, and scanning
  • Learn forensics investigation at the network level

Table of contents

1 Introducing Network Forensics
Technical requirements
Network forensics investigation methodology
Source of network evidence
Wireshark essentials
Exercise 1 – a noob's keylogger
Exercise 2 – two too many
Summary
Questions and exercises
Further reading

2 Technical Concepts and Acquiring Evidence
Technical requirements
The inter-networking refresher
Log-based evidence
Case study – hack attempts
Summary
Questions and exercises
Further reading

3 Deep Packet Inspection
Technical requirements
Protocol encapsulation
Analyzing packets on TCP
Analyzing packets on UDP
Analyzing packets on ICMP
Case study – ICMP Flood or something else
Summary
Questions and exercises
Further reading

4 Statistical Flow Analysis
Technical requirements
The flow record and flow-record processing systems (FRPS) 
Sensor deployment types
Analyzing the flow
Summary
Questions
 Further reading

5 Combatting Tunneling and Encryption
Technical requirements
Decrypting TLS using browsers
Decoding a malicious DNS tunnel
Decrypting 802.11 packets
Decoding keyboard captures
Summary
Questions and exercises
Further reading

6 Investigating Good, Known, and Ugly Malware
Technical requirements
Dissecting malware on the network
Intercepting malware for fun and profit
Behavior patterns and analysis
A real-world case study – investigating a banking Trojan on the network
Summary
Questions and exercises
Further reading

7 Investigating C2 Servers
Technical requirements
Decoding the Metasploit shell
Case study – decrypting the Metasploit Reverse HTTPS Shellcode
Analyzing Empire C2
Case study – CERT.SE's major fraud and hacking criminal case, B 8322-16
Summary
Questions and exercises
Further reading

8 Investigating and Analyzing Logs
Technical requirements
Network intrusions and footprints
A case study – defaced servers
Summary
Questions and exercises
Further reading

9 WLAN Forensics
Technical requirements
The 802.11 standard
Packet types and subtypes
Locating wireless devices
Identifying rogue access points
Identifying attacks
Case study – identifying the attacker
Summary
Questions
Further reading

10 Automated Evidence Aggregation and Analysis
Technical requirements
Automation using Python and Scapy
Automation through pyshark – Python's tshark
Merging and splitting PCAP data
Large-scale data capturing, collection, and indexing
Summary
 Questions and exercises
Further reading

 

Budite prvi koji će ostaviti komentar.

Ostavite komentar Ostavite komentar

 

Preporučujemo

 

Zaštita od zlonamernih programa (Malware analysis)

1. Zaštita od zlonamernih programa (Malware analysis)

Naučite kako da borite protiv zlonamernih programa.

Cena 2200 RSD

Naša cena 2000 RSD

Više o knjizi Više o knjizi

 

Mastering Kali Linux for Advanced Penetration Testing - Second Edition

2. Mastering Kali Linux for Advanced Penetration Testing - Second Edition

A practical guide to testing your network’s security with Kali Linux, the preferred choice of penetration testers and hackers.

Predlog za prevod

Više o knjizi Više o knjizi