• Complain

Datt - Learning Network Forensics

Here you can read online Datt - Learning Network Forensics full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Birmingham, year: 2016, publisher: Packt Publishing, Limited, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Datt Learning Network Forensics
  • Book:
    Learning Network Forensics
  • Author:
  • Publisher:
    Packt Publishing, Limited
  • Genre:
  • Year:
    2016
  • City:
    Birmingham
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Learning Network Forensics: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Learning Network Forensics" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: Becoming Network 007s -- 007 characteristics in the network world -- Bond characteristics for getting to satisfactory completion of the case -- The TAARA methodology for network forensics -- Identifying threats to the enterprise -- Internal threats -- External threats -- Data breach surveys -- Locards exchange principle -- Defining network forensics -- Differentiating between computer forensics and network forensics -- Strengthening our technical fundamentals -- The seven-layer model -- The TCP/IP model -- Understanding the concept of interconnection between networks/Internet -- Internet Protocol (IP) -- Structure of an IP packet -- Transmission Control Protocol (TCP) -- User Datagram Protocol (UDP) -- Internet application protocols -- Understanding network security -- Types of threats -- Internal threats -- External threats -- Network security goals -- Confidentiality -- Integrity -- Availability -- How are networks exploited? -- Digital footprints -- Summary -- Chapter 2: Laying Hands on the Evidence -- Identifying sources of evidence -- Evidence obtainable from within the network -- Evidence from outside the network -- Learning to handle the evidence -- Rules for the collection of digital evidence -- Rule 1: never mishandle the evidence -- Rule 2: never work on the original evidence or system -- Rule 3: document everything -- Collecting network traffic using tcpdump -- Installing tcpdump -- Understanding tcpdump command parameters -- Capturing network traffic using tcpdump -- Collecting network traffic using Wireshark -- Using Wireshark -- Collecting network logs -- Acquiring memory using FTK Imager -- Summary -- Chapter 3: Capturing & Analyzing Data Packets -- Tapping into network traffic.;Identify and safeguard your network against both internal and external threats, hackers, and malware attacksAbout This Book Lay your hands on physical and virtual evidence to understand the sort of crime committed by capturing and analyzing network traffic Connect the dots by understanding web proxies, firewalls, and routers to close in on your suspect A hands-on guide to help you solve your case with malware forensic methods and network behaviorsWho This Book Is ForIf you are a network administrator, system administrator, information security, or forensics professional and wish to learn network forensic to track the intrusions through network-based evidence, then this book is for you. Basic knowledge of Linux and networking concepts is expected. What You Will Learn Understand Internetworking, sources of network-based evidence and other basic technical fundamentals, including the tools that will be used throughout the book Acquire evidence using traffic acquisition software and know how to manage and handle the evidence Perform packet analysis by capturing and collecting data, along with content analysis Locate wireless devices, as well as capturing and analyzing wireless traffic data packets Implement protocol analysis and content matching; acquire evidence from NIDS/NIPS Act upon the data and evidence gathered by being able to connect the dots and draw links between various events Apply logging and interfaces, along with analyzing web proxies and understanding encrypted web traffic Use IOCs (Indicators of Compromise) and build real-world forensic solutions, dealing with malwareIn DetailWe live in a highly networked world. Every digital devicephone, tablet, or computer is connected to each other, in one way or another. In this new age of connected networks, there is network crime. Network forensics is the brave new frontier of digital investigation and information security professionals to extend their abilities to catch miscreants on the network. The book starts with an introduction to the world of network forensics and investigations. You will begin by getting an understanding of how to gather both physical and virtual evidence, intercepting and analyzing network data, wireless data packets, investigating intrusions, and so on. You will further explore the technology, tools, and investigating methods using malware forensics, network tunneling, and behaviors. By the end of the book, you will gain a complete understanding of how to successfully close a case. Style and approachAn easy-to-follow book filled with real-world case studies and applications. Each topic is explained along with all the practical tools and software needed, allowing the reader to use a completely hands-on approach.

Datt: author's other books


Who wrote Learning Network Forensics? Find out the surname, the name of the author of the book and a list of all author's works by series.

Learning Network Forensics — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Learning Network Forensics" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Learning Network Forensics

Learning Network Forensics

Copyright 2016 Packt Publishing

All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.

Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book.

Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.

First published: February 2016

Production reference: 1230216

Published by Packt Publishing Ltd.

Livery Place

35 Livery Street

Birmingham B3 2PB, UK.

ISBN 978-1-78217-490-5

www.packtpub.com

Credits

Author

Samir Datt

Reviewers

Nikhil Agarwal

Clinton Dsouza

Commissioning Editor

Priya Singh

Acquisition Editor

Tushar Gupta

Content Development Editor

Riddhi Tuljapurkar

Technical Editor

Manthan Raja

Copy Editor

Vibha Shukla

Project Coordinator

Sanchita Mandal

Proofreader

Safis Editing

Indexer

Monica Ajmera Mehta

Graphics

Jason Monteiro

Kirk D'Penha

Production Coordinator

Conidon Miranda

Cover Work

Conidon Miranda

About the Author

Samir Datt has been dabbling with digital investigations since 1988, which was around the time he solved his first case with the help of an old PC and Lotus 123. He is the Founder CEO of Foundation Futuristic Technologies (P) Ltd, better known as ForensicsGuru.com. He is widely credited with evangelizing computer forensics in the Indian subcontinent and has personally trained thousands of law enforcement officers in the area. He has the distinction of starting the computer forensics industry in South Asia and setting up India's first computer forensic lab in the private sector. He is consulted by law enforcement agencies and private sector on various technology-related investigative issues. He has extensive experience in training thousands of investigators as well as examining a large number of digital sources of evidence in both private and government investigations.

At last it is done,

A journey that long ago was begun,

Many lights there are that have helped on the way,

To everyone of them, my thanks I would say.

This book would never have seen the light of day had it not been for Tushar Gupta, acquisition editor at Packt Publishing. He tracked me down and invited and convinced me to write. He encouraged me, cajoled me, and finally pushed me into the mystic world of authoring. Thanks Tushar!

I would also like to convey my heartfelt thanks to Riddhi Tuljapurkar, my content development editor. She has been a beacon guiding me through the myriad steps that being an author involves. A first-time author has many moments of self-doubt and hesitation; never did she let me falter, always encouraging, always supportive, she is perhaps the single most important reason that the book is ready on time. Thank you!

My book reviewers have been my compass and their encouragements, suggestions, comments, and guidance have been instrumental in getting the book to its present state. Thank you Clinton D'Souza and Nikhil Agarwal. I am indeed deeply grateful.

My family has been my biggest cheerleader. A special thanks to my wife, Resham, who has had to put up with my extensive travel schedules and uncounted holidays and weekends devoted to meeting the chapter deadlines. She has been my rock and has always believed that I was destined to write. My son, Madhav, who despite his own hectic schedules at IIT, Kharagpur, took time out to help me with the illustrations, screenshots, chapter editing, and scenario environments. Without you this could never have been done. Many thanks!

I also owe a thank you to my parents, who have been encouraging throughout the course of this book. My dogs, Tuffy, Lucky, Lolu, and Chutki, have been a source of inspiration by constantly bombarding me with unlimited doses of love and affection.

Thanks are also due to the rock-solid team at ForensicsGuru.com, who helped me with my research and chapter illustrations. Great work, guys!

Last but not least, I thank the Creator; for without Him, no creation is possible.

About the Reviewers

Nikhil Agarwal , an InfoSec researcher, proactive, and performance-driven professional from India with more than three years of progressive expertise in management and IT security field, is dedicated to operational excellence, quality, safety, and respectful leadership. Nikhil is insightful and result-driven IT professional with notable success directing a broad range of corporate IT security initiatives while participating in planning, analyzing, and implementing solutions in support of business objectives. He excels at providing comprehensive secure network design, systems analysis, and complete life cycle project management.

By qualification, Nikhil possesses a bachelor's degree in engineering in the domain of electronic and communications from Swami Keshvanand Institute of Technology, Management and Gramothan (SKIT) (http://www.skit.ac.in/), Jaipur, Rajasthan. He has completed various projects during his studies and submitted a range of research papers along with the highest range of international certifications. By profession, Nikhil is an IT security engineer and trainer, and a multi-faceted professional with more than three years of experience living, studying, and working in international environments (Asia and Africa). He has undertaken and successfully completed many security projects ranging from providing services, auditing, to training.

The description of his professional journey can be found on his LinkedIn profile (https://za.linkedin.com/in/reachatnikhil).

Nikhil spends much of his leisure time writing technical articles for his blogs, Technocrat Club (http://technocratclub.blogspot.com), and answering queries over Quora, Stack Overflow, and GitHub. He also has a passion for photography and travelling to new places. He enjoys authoring technical/nontechnical articles for various blogs and websites, along with reviewing books from various IT technologies.

Apart from this, Nikhil has founded and holds the post of President for a global non-profit organization, Youth Cross Foundation, working for socially-challenged people to bring up their quality of living with technology as their weapon.

Things that set Nikhil apart are creativity, passion, and honesty towards his work. He has always had the support of his family, friends, and relatives, especially his mother. From time to time, Nikhil holds seminars for organizations wanting to explore or discover the possibilities of information security and help answer the spatial questions better. Nikhil is also a lecturer and enjoys teaching the wonderful powers of IT security and explaining how to solve problems on various platforms to the students and corporates. Nikhil's work has also found special mentioning in some national news headlines (http://www.thestatesman.com/mobi/news/features/checking-for-vulnerabilities/76087.html).

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Learning Network Forensics»

Look at similar books to Learning Network Forensics. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Learning Network Forensics»

Discussion, reviews of the book Learning Network Forensics and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.