Network Forensics

Network Forensics
Автор книги: id книги: 818274     Оценка: 0.0     Голосов: 0     Отзывы, комментарии: 0 3386 руб.     (33,9$) Читать книгу Купить и читать книгу Купить бумажную книгу Электронная книга Жанр: Зарубежная образовательная литература Правообладатель и/или издательство: Автор Дата добавления в каталог КнигаЛит: ISBN: 9781119329183 Возрастное ограничение: 0+ Оглавление Отрывок из книги

Реклама. ООО «ЛитРес», ИНН: 7719571260.

Оглавление

Messier Ric. Network Forensics

Introduction

What This Book Covers

How This Book Is Organized

1. Introduction to Network Forensics

What Is Forensics?

Incident Response

The Need for Network Forensic Practitioners

Summary

References

2. Networking Basics

Protocols

Request for Comments

Internet Registries

Internet Protocol and Addressing

Transmission Control Protocol (TCP)

User Datagram Protocol (UDP)

Ports

Domain Name System

Support Protocols (DHCP)

Support Protocols (ARP)

Summary

References

3. Host-Side Artifacts

Services

Connections

Tools

Summary

4. Packet Capture and Analysis

Capturing Packets

Packet Analysis with Wireshark

Network Miner

Summary

5. Attack Types

Denial of Service Attacks

Vulnerability Exploits

Insider Threats

Evasion

Application Attacks

Summary

6. Location Awareness

Time Zones

Using whois

Traceroute

Geolocation

Location-Based Services

WiFi Positioning

Summary

7. Preparing for Attacks

NetFlow

Logging

Antivirus

Incident Response Preparation

Security Information and Event Management

Summary

8. Intrusion Detection Systems

Detection Styles

Host-Based versus Network-Based

Architecture

Alerting

Summary

9. Using Firewall and Application Logs

Syslog

Event Viewer

Firewall Logs

Common Log Format

Summary

10. Correlating Attacks

Time Synchronization

Packet Capture Times

Log Aggregation and Management

Timelines

Security Information and Event Management

Summary

11. Network Scanning

Port Scanning

Vulnerability Scanning

Port Knocking

Tunneling

Passive Data Gathering

Summary

12. Final Considerations

Encryption

Cloud Computing

The Onion Router (TOR)

Summary

About the Author

About the Technical Editor

Credits

WILEY END USER LICENSE AGREEMENT

Отрывок из книги

One of the best things about the different technology fields, should you have the stomach for it – and many don't – is the near constant change. Over the decades I have been involved in technology-based work, I've either had to or managed to reinvent myself and my career every handful of years or less. The world keeps changing and in order to maintain pace, we have to change too. In one of my incarnations that ended not many months ago now, I ran graduate and undergraduate programs at Champlain College in its online division. One of my responsibilities within that role was overseeing development of course materials. Essentially, either I or someone I hired developed the course and then I hired people who could teach it, often the people who did the development, though not always.

In the process of developing a course on network forensics, I discovered that there wasn't a lot of material around that covered it. At the time, I was able to find a single book but it wasn't one that we could make use of at the college because of policies focused on limiting costs to students. As a result, when I was asked what my next book would be, a book on network forensics that would explore in more detail the ideas I think are really important to anyone who is doing network investigations made the most sense to me.

.....

The MD5 hash value for that file is 2583a3fab8faaba111a567b1e44c2fa4. No matter how many times I run the MD5 hash utility against that file, I will get the same value back. The MD5 hash algorithm is non-linear, however. This means that a change to the file of a single bit will yield an entirely different result, and not just a result that is one bit different from the original hash. Every bit in the file will make a difference to the calculation. If you have an extra space or an end of line where there wasn't one in the original input, the value will be different. To demonstrate this, changing the first letter of the text file from an H to a G is a single-bit difference in how it is stored on the computer since the value for H is 72 and the value for G is 71 on the ASCII table. The hash value resulting from this altered file is 2a9739d833abe855112dc86f53780908. This is a substantive change, demonstrating the complexity of the hashing function.

One of the problems with the MD5 algorithm, though, is that it is only 128 bits. This isn't an especially large space in which to be generating values, leading it to be vulnerable to collisions. As a result, for many purposes, the MD5 hash has been superseded by the Secure Hash Algorithm 1 (SHA-1) hash. The SHA-1 hash generates a 160-bit value, which can be rendered using 40 hexadecimal digits. Even this isn't always considered large enough. As a result, the SHA-2 standard for cryptographic hashing has several alternatives that generate longer values. One that you may run into, particularly in the encryption space, is SHA-256, which generates a 256-bit value. Where the 128-bit MD5 hash algorithm has the potential to generate roughly 3.4 × 10^38 unique values, the SHA-256 hash algorithm can yield 1.15 × 10^77 unique values. It boggles the mind to think about how large those numbers are, frankly. Generating a SHA-1 hash against our original text file gives us a value of 286f55360324d42bcb1231ef5706a9774ed0969e. The SHA-256 hash value of our original file is 3ebcc1766a03b456517d10e315623b88bf41541595b5e9f60f8bd48e06bcb7ba. These are all different values that were generated against the same input file.

.....

Добавление нового отзыва

Комментарий Поле, отмеченное звёздочкой  — обязательно к заполнению

Отзывы и комментарии читателей

Нет рецензий. Будьте первым, кто напишет рецензию на книгу Network Forensics
Подняться наверх