• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]

  więcej...
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence

ISBN-13: 9781484292907 / Angielski / Miękka / 2023

Kevin Cardwell
Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence Cardwell, Kevin 9781484292907 APress - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence

ISBN-13: 9781484292907 / Angielski / Miękka / 2023

Kevin Cardwell
cena 241,50
(netto: 230,00 VAT:  5%)

Najniższa cena z 30 dni: 231,29
Termin realizacji zamówienia:
ok. 22 dni roboczych.

Darmowa dostawa!

Take a systematic approach at identifying intrusions that range from the most basic to the most sophisticated, using Wireshark, an open source protocol analyzer. This book will show you how to effectively manipulate and monitor different conversations and perform statistical analysis of these conversations to identify the IP and TCP information of interest.Next, you'll be walked through a review of the different methods malware uses, from inception through the spread across and compromise of a network of machines. The process from the initial “click” through intrusion, the characteristics of Command and Control (C2), and the different types of lateral movement will be detailed at the packet level.In the final part of the book, you'll explore the network capture file and identification of data for a potential forensics extraction, including inherent capabilities for the extraction of objects such as file data and other corresponding components in support of a forensics investigation.After completing this book, you will have a complete understanding of the process of carving files from raw PCAP data within the Wireshark tool.What You Will LearnUse Wireshark to identify intrusions into a networkExercise methods to uncover network data even when it is in encrypted formAnalyze malware Command and Control (C2) communications and identify IOCsExtract data in a forensically sound manner to support investigationsLeverage capture file statistics to reconstruct network eventsWho This Book Is ForNetwork analysts, Wireshark analysts, and digital forensic analysts.

Take a systematic approach at identifying intrusions that range from the most basic to the most sophisticated, using Wireshark, an open source protocol analyzer. This book will show you how to effectively manipulate and monitor different conversations and perform statistical analysis of these conversations to identify the IP and TCP information of interest.Next, you'll be walked through a review of the different methods malware uses, from inception through the spread across and compromise of a network of machines. The process from the initial “click” through intrusion, the characteristics of Command and Control (C2), and the different types of lateral movement will be detailed at the packet level.In the final part of the book, you'll explore the network capture file and identification of data for a potential forensics extraction, including inherent capabilities for the extraction of objects such as file data and other corresponding components in support of a forensics investigation.After completing this book, you will have a complete understanding of the process of carving files from raw PCAP data within the Wireshark tool.What You Will Learn

  • Use Wireshark to identify intrusions into a network
  • Exercise methods to uncover network data even when it is in encrypted form
  • Analyze malware Command and Control (C2) communications and identify IOCs
  • Extract data in a forensically sound manner to support investigations
  • Leverage capture file statistics to reconstruct network events
Who This Book Is For
Network analysts, Wireshark analysts, and digital forensic analysts.

Kategorie:
Informatyka, Bazy danych
Kategorie BISAC:
Computers > Programming - Open Source
Computers > Computer Science
Wydawca:
APress
Język:
Angielski
ISBN-13:
9781484292907
Rok wydania:
2023
Oprawa:
Miękka
Wolumenów:
01
Dodatkowe informacje:
Wydanie ilustrowane

Chapter 1:  Customization of the Wireshark Interface

Chapter Goal: - Learn how to edit the columns of the Wireshark user interface. Explore important items to include in the interface for performing intrusion and malware analysis

No of pages - 18        

Sub -Topics

1.      Identifying columns to delete from the default displays

2.      Adding the source and destination ports for easy traffic analysis

3.      Specialty column customization for malware analysis

 

Intrusions Chapter 2:  Capturing Network Traffic

Chapter Goal: Setup a network capture in Wireshark

No of pages: - 24

Sub - Topics  

1.      Prerequisites for capturing live network data

2.       Working with Network Interfaces

3.      Exploring the network capture options

4.      Filtering While Capturing

 

Chapter 3: Interpreting Network Protocols

Chapter Goal: A deep understanding of the network protocols at the packet level

No of pages : 30

Sub - Topics: 

1.      Investigating IP, the workhorse of the network

2.      Analyzing ICMP and UDP

3.      Dissection of TCP traffic

4.      Reassembly of packets

5.      Interpreting Name Resolution

 

Chapter 4: Analysis of Network Attacks

Chapter Goal: Understand the hacking mindset and leverage that to identify attacks

No of pages: 30

Sub - Topics:

1. Introducing a Hacking Methodology

2. Examination of reconnaissance network traffic artifacts

3. Leveraging the statistical properties of the capture file

4. Identifying SMB based attacks

5. Uncovering HTTP/HTTPS based attack traffic

 

Chapter 5: Effective Network Traffic Filtering

Chapter Goal: Use of the complex filtering capability of Wireshark to extract attack data

 

No of pages: 35

Sub - Topics:

1.      Identifying filter components

2.      Investigating the conversations

3.      Extracting the packet data

4.      Building Filter Expressions

5.      Decrypting HTTPS Traffic

 

  Chapter 6: Advanced Features of Wireshark

Chapter Goal: A fundamental review and understanding of the advanced features of Wireshark

 

No of pages: 35

Sub – Topics:

1.      Working with cryptographic information in a packet

2.      Exploring the protocol dissectors of Wireshark

3.      Viewing logged anomalies in Wireshark

4.      Capturing traffic from remote computers

5.      Command line tool tshark

6.      Creating Firewall ACL rules

 

 

 

Chapter 7: Scripting and interacting with Wireshark

Chapter Goal: Using scripts to extract and isolate data of interest from network capture files

No of pages: 30

Sub – Topics:

1.       Lua scripting

2.       Interaction with Pandas

3.      Leveraging PyShark

Malware Chapter 8: Basic Malware Traffic Analysis

Chapter Goal: Develop an understanding of the different stages of a malware infection

 

No of pages: 36

Sub – Topics:

1.       Customization of the interface for malware analysis

2.       Extracting the files

3.       Recognizing URL/Domains of an infected site

4.       Determining the connections as part of the infected machine

5.       Scavenging the infected machine meta data

6.       Exporting the data objects

 

Chapter 9: Analyzing Encoding, Obfuscated and ICS Malware Traffic

Chapter Goal: Identify the encoding or obfuscated method in network traffic

 

No of pages: 40

Sub – Topics:

1.       Investigation of njRAT

2.       Analysis of Wanna Cry

3.       Exploring Cryptolocker

4.       Dissecting TRITON

5.       Examining Trickbot

6.       Understanding exploit kits

 

 

Chapter 10: Dynamic Malware Network Activities

Chapter Goal: Review and understand malware network activity as it happens

 

No of pages: 40

Sub – Topics:

1.       Setting up network and service simulation

2.       Monitoring malware communications and connections at run time and beyond

3.       Detecting network evasion attempts

4.       Investigating Cobalt Strike Beacons

5.       Exploring C2 backdoor methods

6.       Identifying Domain Generation Algorithms

  Forensics Chapter 10: Extractions of Forensics Data with Wireshark

Chapter Goal: Learn different methods of extracting different types of case related and potential forensics evidence

 

No of pages: 30

Sub – Topics:

1.       Interception of telephony data

2.       Discovering DOS/DDoS

3.       Analysis of HTTP/HTTPS Tunneling over DNS

4.       Carving files from network data

 

Chapter 11: Network Traffic Forensics

Chapter Goal: An understanding of extraction of potential forensics data

 

No of pages: 30

Sub – Topics:

1.       Isolation of conversations

2.       Detection of Spoofing, port scanning and SSH attacks

3.       Reconstruction of timeline network attack data

4.       Extracting compromise data

 

Chapter 12: Conclusion

Chapter Goal: Review and summary of covered content

 

No of pages: 10


Kevin Cardwell is an Instructor, Curriculum Developer, Technical Editor and Author of Computer Forensics, and Hacking courses. He is the author of the EC Council Certified Penetration Testing Professional, Ethical Hacking Core Skills, Advanced Penetration Testing and ICS/SCADA Security courses. He has presented at the Blackhat USA, Hacker Halted, ISSA and TakeDownCon conferences as well as many others. He has chaired the Cybercrime and Cyberdefense Summit in Oman and was Executive Chairman of the Oil and Gas Cyberdefense Summit. He is the author of Defense and Deception: Confuse and Frustrate the Hackers, Building Virtual Pentesting Labs for Advanced Penetration Testing 1st and 2nd edition, and Backtrack: Testing Wireless Network Security. He holds a BS in Computer Science from National University in California and an MS in Software Engineering from the Southern Methodist University (SMU) in Texas.

Take a systematic approach at identifying intrusions that range from the most basic to the most sophisticated, using Wireshark, an open source protocol analyzer. This book will show you how to effectively manipulate and monitor different conversations and perform statistical analysis of these conversations to identify the IP and TCP information of interest.

Next, you'll be walked through a review of the different methods malware uses, from inception through the spread across and compromise of a network of machines. The process from the initial “click” through intrusion, the characteristics of Command and Control (C2), and the different types of lateral movement will be detailed at the packet level.

In the final part of the book, you'll explore the network capture file and identification of data for a potential forensics extraction, including inherent capabilities for the extraction of objects such as file data and other corresponding components in support of a forensics investigation.

After completing this book, you will have a complete understanding of the process of carving files from raw PCAP data within the Wireshark tool.

You will:

  • Use Wireshark to identify intrusions into a network
  • Exercise methods to uncover network data even when it is in encrypted form
  • Analyze malware Command and Control (C2) communications and identify IOCs
  • Extract data in a forensically sound manner to support investigations
  • Leverage capture file statistics to reconstruct network events



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia