Network Forensics
Home > Computing and Information Technology > Computer networking and communications > Network security > Network Forensics: Tracking Hackers through Cyberspace
19%
Network Forensics: Tracking Hackers through Cyberspace

Network Forensics: Tracking Hackers through Cyberspace


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

“This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field.” – Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research.   “It’s like a symphony meeting an encyclopedia meeting a spy novel.” –Michael Ford, Corero Network Security   On the Internet, every action leaves a mark–in routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind.   Learn to recognize hackers’ tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace.Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect’s web surfing history–and cached web pages, too–from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire.   Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors’ web site (lmgsecurity.com), and follow along to gain hands-on experience.   Hackers leave footprints all across the Internet. Can you find their tracks and solve the case? Pick up Network Forensicsand find out.  

Table of Contents:
Foreword          xvii Preface         xix Acknowledgments          xxv About the Authors         xxvii   Part I: Foundation          1 Chapter 1: Practical Investigative Strategies          3 1.1 Real-World Cases   3 1.2 Footprints   8 1.3 Concepts in Digital Evidence   9 1.4 Challenges Relating to Network Evidence   16 1.5 Network Forensics Investigative Methodology (OSCAR)   17 1.6 Conclusion   22   Chapter 2: Technical Fundamentals            23 2.1 Sources of Network-Based Evidence   23 2.2 Principles of Internetworking   30 2.3 Internet Protocol Suite   35 2.4 Conclusion   44   Chapter 3: Evidence Acquisition         45 3.1 Physical Interception   46 3.2 Traffic Acquisition Software   54 3.3 Active Acquisition   65 3.4 Conclusion  72   Part II: Traffic Analysis           73 Chapter 4: Packet Analysis          75 4.1 Protocol Analysis   76 4.2 Packet Analysis   95 4.3 Flow Analysis   103 4.4 Higher-Layer Traffic Analysis   120 4.5 Conclusion   133 4.6 Case Study: Ann’s Rendezvous   135   Chapter 5: Statistical Flow Analysis          159 5.1 Process Overview   160 5.2 Sensors   161 5.3 Flow Record Export Protocols   166 5.4 Collection and Aggregation   168 5.5 Analysis   172 5.6 Conclusion   183 5.7 Case Study: The Curious Mr. X   184   Chapter 6: Wireless: Network Forensics Unplugged           199 6.1 The IEEE Layer 2 Protocol Series   201 6.2 Wireless Access Points (WAPs)   214 6.3 Wireless Traffic Capture and Analysis   219 6.4 Common Attacks   224 6.5 Locating Wireless Devices   229 6.6 Conclusion   235 6.7 Case Study: HackMe, Inc.   236   Chapter 7: Network Intrusion Detection and Analysis          257 7.1 Why Investigate NIDS/NIPS?   258 7.2 Typical NIDS/NIPS Functionality   258 7.3 Modes of Detection   261 7.4 Types of NIDS/NIPSs   262 7.5 NIDS/NIPS Evidence Acquisition   264 7.6 Comprehensive Packet Logging   267 7.7 Snort   268 7.8 Conclusion   275 7.9 Case Study: Inter0ptic Saves the Planet (Part 1 of 2)   276   Part III: Network Devices and Servers           289 Chapter 8: Event Log Aggregation, Correlation, and Analysis   291 8.1 Sources of Logs   292 8.2 Network Log Architecture   306 8.3 Collecting and Analyzing Evidence   311 8.4 Conclusion   317 8.5 Case Study: L0ne Sh4rk’s Revenge   318   Chapter 9: Switches, Routers, and Firewalls           335 9.1 Storage Media   336 9.2 Switches   336 9.3 Routers   340 9.4 Firewalls   344 9.5 Interfaces   348 9.6 Logging   352 9.7 Conclusion   355 9.8 Case Study: Ann’s Coffee Ring   356   Chapter 10: Web Proxies         369 10.1 Why Investigate Web Proxies?   369 10.2 Web Proxy Functionality   371 10.3 Evidence   375 10.4 Squid   377 10.5 Web Proxy Analysis   381 10.6 Encrypted Web Traffic   392 10.7 Conclusion   401 10.8 Case Study: Inter0ptic Saves the Planet (Part 2 of 2)   402   Part IV: Advanced Topics          421 Chapter 11: Network Tunneling          423 11.1 Tunneling for Functionality   423 11.2 Tunneling for Confidentiality   427 11.3 Covert Tunneling   430 11.4 Conclusion   439 11.5 Case Study: Ann Tunnels Underground   441   Chapter 12: Malware Forensics         461 12.1 Trends in Malware Evolution   462 12.2 Network Behavior of Malware   484 12.3 The Future of Malware and Network Forensics   491 12.4 Case Study: Ann’s Aurora   492   Afterword         519   Index          521  

About the Author :
Sherri Davidoff is a founder of LMG Security, an information security consulting and research firm. Her specialties include network penetration testing, digital forensics, social engineering testing, and web application assessments. She holds her S.B. in Computer Science and Electrical Engineering from MIT.   Jonathan Ham has been commissioned to teach NCIS investigators how to use Snort, performed packet analysis from a facility more than two thousand feet underground, taught intrusion analysis to the NSA, and chartered and trained the CIRT for one of the largest U.S. civilian federal agencies. He is a founder of LMG Security. His favorite field is ip[6:2].


Best Sellers


Product Details
  • ISBN-13: 9780132565097
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Pearson
  • Language: English
  • Sub Title: Tracking Hackers through Cyberspace
  • ISBN-10: 0132565099
  • Publisher Date: 31 May 2012
  • Binding: Digital download
  • No of Pages: 576
  • Weight: 1 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Network Forensics: Tracking Hackers through Cyberspace
Pearson Education (US) -
Network Forensics: Tracking Hackers through Cyberspace
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Network Forensics: Tracking Hackers through Cyberspace

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!