Chapter 3. Other Network Evidence
Chapter 2, “Capturing Network Traffic,” covered network evidence collection that occurs in real time as network traffic transits the network. This chapter will cover pockets of network evidence that exist throughout the network on routers, switches, servers, clients, and appliances. It will describe client logs, enterprise logs, and cloud artifacts with evidence potential. It will cover dynamic, static, and behavioral (from sandbox or observations) evidence. This chapter will introduce ...

Get Digital Forensics for Network, Internet, and Cloud Computing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.