1 / 5

Network Forensics

Dive into the essential concepts of network forensics with expert Laura Chappell. Learn about the various aspects of network security, including the placement of wiretaps, legal implications of wiretapping, and techniques for evidence examination. Explore detailed cases such as TCP connection overflow attacks, OS fingerprinting, and malware infections. Gain insights into the operational techniques used in network forensics, as well as the importance of maintaining evidence integrity. For further inquiries, contact the Protocol Analysis Institute.

Télécharger la présentation

Network Forensics

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Network Forensics Laura Chappell Sr. Protocol/Security Analyst Protocol Analysis Institute www.packet-level.com

  2. Contents • What is “network forensics” • Where to place the wiretap • Legal issues of wiretapping • Evidence examination • TCP connection overflow attack (justascan.dmp) • OS fingerprinting (osfingeprinting.dmp) • Malware infection (evilprogram.dmp) • Back-door IRS channel (clientdying.dmp) • Network flood attack (macof.dmp)

  3. I Could Show You Screenshots…

  4. Or We Could Work Live…

  5. Contact Details • Laura Chappell • Protocol Analysis Institute, LLC • 5339 Prospect Road, Suite 343 • San Jose, CA 95129 • Phone (408) 378-7841 Fax (408) 378-7891 • Web: www.packet-level.com • Email: lcahppell@packet-level.com

More Related