January 2018
Intermediate to advanced
340 pages
8h 6m
English
Sometimes, a strange IP will show up in logs, and you will need to find out more information, or there can be a domain name that you need to geolocate based on an IP address. These examples demonstrate gathering information about hosts. Packet capturing is also an integral part of network forensic investigations, but there is so much to say about packet capturing, so Chapter 5, Packet Capturing and Injection dedicated just to packet capturing and injection.
Read now
Unlock full access