60 likes | 178 Vues
Dive into the essential concepts of network forensics with expert Laura Chappell. Learn about the various aspects of network security, including the placement of wiretaps, legal implications of wiretapping, and techniques for evidence examination. Explore detailed cases such as TCP connection overflow attacks, OS fingerprinting, and malware infections. Gain insights into the operational techniques used in network forensics, as well as the importance of maintaining evidence integrity. For further inquiries, contact the Protocol Analysis Institute.
E N D
Network Forensics Laura Chappell Sr. Protocol/Security Analyst Protocol Analysis Institute www.packet-level.com
Contents • What is “network forensics” • Where to place the wiretap • Legal issues of wiretapping • Evidence examination • TCP connection overflow attack (justascan.dmp) • OS fingerprinting (osfingeprinting.dmp) • Malware infection (evilprogram.dmp) • Back-door IRS channel (clientdying.dmp) • Network flood attack (macof.dmp)
Contact Details • Laura Chappell • Protocol Analysis Institute, LLC • 5339 Prospect Road, Suite 343 • San Jose, CA 95129 • Phone (408) 378-7841 Fax (408) 378-7891 • Web: www.packet-level.com • Email: lcahppell@packet-level.com