By Sherri Davidoff, Jonathan Ham
“This is a must have paintings for anyone in info safeguard, electronic forensics, or concerned with incident dealing with. As we stream clear of conventional disk-based research into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that may act as a seminal paintings during this constructing field.”
– Dr. Craig S. Wright (GSE), Asia Pacific Director at worldwide Institute for Cyber protection + Research.
“It’s like a symphony assembly an encyclopedia assembly a undercover agent novel.”
–Michael Ford, Corero community Security
On the web, each motion leaves a mark–in routers, firewalls, net proxies, and inside community site visitors itself. whilst a hacker breaks right into a financial institution, or an insider smuggles secrets and techniques to a competitor, facts of the crime is often left behind.
Learn to acknowledge hackers’ tracks and discover network-based facts in Network Forensics: monitoring Hackers via Cyberspace. Carve suspicious electronic mail attachments from packet captures. Use circulate documents to trace an outsider as he pivots throughout the community. learn a real-world instant encryption-cracking assault (and then crack the major yourself). Reconstruct a suspect’s net browsing history–and cached websites, too–from an online proxy. discover DNS-tunneled site visitors. Dissect the Operation Aurora make the most, stuck at the wire.
Throughout the textual content, step by step case reports consultant you thru the research of network-based proof. you could obtain the facts documents from the authors’ site (lmgsecurity.com), and persist with alongside to achieve hands-on experience.
Hackers go away footprints all around the web. are you able to locate their tracks and clear up the case? decide up Network Forensics and locate out.