In this chapter, we will review different characteristics of network connections and the traffic that is generated. It is an expansion on earlier topics as we need to extract the information from the communication traffic and identify what needs to be extracted from the data to be collected in a forensically sound manner.
12. Network Traffic Forensics
Get Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.