10
Implementing Recon Monitoring and Detection Systems
The longer an organization takes to discover that its network infrastructure and systems are compromised, the more time adversaries spend in their network compromising additional systems to expand their foothold within the victim’s network. Implementing and working with network security tools helps Security Operation Centers (SOCs) and Digital Forensic and Incident Response (DFIR) teams to effectively monitor network traffic, detect potential threats, and provide real-time alerts for faster response times, containment, and eradication of threats.
In this chapter, you will learn the fundamentals of using Wireshark to perform packet analysis as an ethical hacker. Additionally, you will learn ...
Get Reconnaissance for Ethical Hackers now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.