O'Reilly logo

Learning Network Forensics by Samir Datt

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter, we understood the concept of virtual private networks and their role in networks. We looked at the various types of VPNs and their tunneling protocols. We also studied how, just like smugglers, VPNs are used to ship foreign protocols via tunnels into a corporate network. At the end of the chapter, we looked at the ways in which the VPNs can be compromised and consequently, further lead to the compromise of our networks.

In the next chapter, we gear up to look at how to investigate malware, which is one of the major causes of network incidents. Malware has been on an evolutionary spiral and has emerged as a potent cyber weapon used to compromise digital resources across the globe.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required