Skip to Main Content
Cyber Forensics, 2nd Edition
book

Cyber Forensics, 2nd Edition

by Albert Marcella Jr., Doug Menendez
December 2010
Intermediate to advanced content levelIntermediate to advanced
528 pages
18h 51m
English
Auerbach Publications
Content preview from Cyber Forensics, 2nd Edition
Concealment Techniques 99
e RTP protocol is used to carry the actual audio stream of the voice conversation, which can-
not take place until the call has been setup via SIP. You can think of RTP as the letter inside an
envelope. It contains the actual message being delivered but could not get where it is going without
the envelope.
Because these calls are using IP packets to transmit the voice stream, IP packet capturing
software can be used to listen to them.  is is a three-step process that involves capturing the
packets, reassembling them into a stream, and then playing them back with an audio player
capable of handling RTP strea
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Digital Forensics and Incident Response - Second Edition

Digital Forensics and Incident Response - Second Edition

Gerard Johansen
Digital Forensics

Digital Forensics

John Sammons
Cyber Security and Digital Forensics

Cyber Security and Digital Forensics

Mangesh M. Ghonge, Sabyasachi Pramanik, Ramchandra Mangrulkar, Dac-Nhuong Le

Publisher Resources

ISBN: 9781439848234