Learning Network Forensics (Paperback)
暫譯: 學習網路取證 (平裝本)
Samir Datt
- 出版商: Packt Publishing
- 出版日期: 2016-02-29
- 定價: $1,650
- 售價: 6.0 折 $990
- 語言: 英文
- 頁數: 274
- 裝訂: Paperback
- ISBN: 1782174907
- ISBN-13: 9781782174905
-
相關分類:
資訊安全、駭客 Hack
立即出貨 (庫存 < 3)
買這商品的人也買了...
-
$1,250$1,188 -
$720$648 -
$980$774 -
$880$695 -
$450$351 -
$880$695 -
$520$411 -
$910$865 -
$600$468
商品描述
Key Features
- Lay your hands on physical and virtual evidence to understand the sort of crime committed by capturing and analyzing network traffic
- Connect the dots by understanding web proxies, firewalls, and routers to close in on your suspect
- A hands-on guide to help you solve your case with malware forensic methods and network behaviors
Book Description
We live in a highly networked world. Every digital device―phone, tablet, or computer is connected to each other, in one way or another. In this new age of connected networks, there is network crime. Network forensics is the brave new frontier of digital investigation and information security professionals to extend their abilities to catch miscreants on the network.
The book starts with an introduction to the world of network forensics and investigations. You will begin by getting an understanding of how to gather both physical and virtual evidence, intercepting and analyzing network data, wireless data packets, investigating intrusions, and so on. You will further explore the technology, tools, and investigating methods using malware forensics, network tunneling, and behaviors. By the end of the book, you will gain a complete understanding of how to successfully close a case.
What you will learn
- Understand Internetworking, sources of network-based evidence and other basic technical fundamentals, including the tools that will be used throughout the book
- Acquire evidence using traffic acquisition software and know how to manage and handle the evidence
- Perform packet analysis by capturing and collecting data, along with content analysis
- Locate wireless devices, as well as capturing and analyzing wireless traffic data packets
- Implement protocol analysis and content matching; acquire evidence from NIDS/NIPS
- Act upon the data and evidence gathered by being able to connect the dots and draw links between various events
- Apply logging and interfaces, along with analyzing web proxies and understanding encrypted web traffic
- Use IOCs (Indicators of Compromise) and build real-world forensic solutions, dealing with malware
About the Author
Samir Datt has been dabbling with digital investigations since 1988, which was around the time he solved his first case with the help of an old PC and Lotus 123. He is the Founder CEO of Foundation Futuristic Technologies (P) Ltd, better known as ForensicsGuru.com. He is widely credited with evangelizing computer forensics in the Indian subcontinent and has personally trained thousands of law enforcement officers in the area. He has the distinction of starting the computer forensics industry in South Asia and setting up India's first computer forensic lab in the private sector. He is consulted by law enforcement agencies and private sector on various technology-related investigative issues. He has extensive experience in training thousands of investigators as well as examining a large number of digital sources of evidence in both private and government investigations.
Table of Contents
- Becoming Network 007s
- Laying Hands on the Evidence
- Capturing & Analyzing Data Packets
- Going Wireless
- Tracking an Intruder on the Network
- Connecting the Dots – Event Logs
- Proxies, Firewalls, and Routers
- Smuggling Forbidden Protocols – Network Tunneling
- Investigating Malware – Cyber Weapons of the Internet
- Closing the Deal – Solving the Case
商品描述(中文翻譯)
關鍵特點
- 透過捕獲和分析網路流量,掌握實體和虛擬證據,以了解所犯的罪行類型
- 透過理解網路代理伺服器、防火牆和路由器,將線索串聯起來,鎖定嫌疑人
- 一本實用指南,幫助您利用惡意程式取證方法和網路行為來解決案件
書籍描述
我們生活在一個高度網路化的世界中。每一個數位設備——手機、平板電腦或電腦,彼此以某種方式相連。在這個連接網路的新時代,網路犯罪隨之而來。網路取證是數位調查和資訊安全專業人員勇敢的新前沿,擴展他們的能力以抓捕網路上的不法分子。
本書首先介紹網路取證和調查的世界。您將開始了解如何收集實體和虛擬證據,攔截和分析網路數據、無線數據封包、調查入侵等。您將進一步探索使用惡意程式取證、網路隧道和行為的技術、工具和調查方法。到本書結束時,您將全面了解如何成功結案。
您將學到的內容
- 理解網際網路互聯、網路證據的來源及其他基本技術基礎,包括本書中將使用的工具
- 使用流量獲取軟體來獲取證據,並了解如何管理和處理這些證據
- 通過捕獲和收集數據進行封包分析,並進行內容分析
- 定位無線設備,並捕獲和分析無線流量數據封包
- 實施協議分析和內容匹配;從 NIDS/NIPS 獲取證據
- 根據收集到的數據和證據採取行動,能夠將各種事件串聯起來
- 應用日誌記錄和介面,分析網路代理伺服器並理解加密的網路流量
- 使用 IOC(妥協指標)並建立現實世界的取證解決方案,處理惡意程式
關於作者
**Samir Datt** 自 1988 年以來一直從事數位調查,當時他利用一台舊電腦和 Lotus 123 解決了他的第一個案件。他是 Foundation Futuristic Technologies (P) Ltd 的創始人兼首席執行官,更廣為人知的是 ForensicsGuru.com。他被廣泛認為是印度次大陸電腦取證的推廣者,並親自培訓了數千名執法官員。他在南亞創立了電腦取證行業,並在私營部門設立了印度第一個電腦取證實驗室。他為執法機構和私營部門提供有關各種技術相關調查問題的諮詢。他在培訓數千名調查員以及檢查大量數位證據來源方面擁有豐富的經驗,涵蓋私營和政府調查。
目錄
1. 成為網路 007
2. 觸碰證據
3. 捕獲與分析數據封包
4. 無線網路
5. 追蹤網路上的入侵者
6. 串聯線索 – 事件日誌
7. 代理伺服器、防火牆和路由器
8. 走私禁用協議 – 網路隧道
9. 調查惡意程式 – 網路的網路武器
10. 完成交易 – 解決案件