Quantcast
Channel: Forensic Focus - Articles » Network Forensics
Browsing all 11 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

How to Create an Open Source Network Forensics Appliance

By Ondrej Krehel Chief information security officer at Identity Theft 911 okrehel@IDT911.com IntroductionEncryption and anti-forensics attacker techniques are commonly encountered in incident response...

View Article


Image may be NSFW.
Clik here to view.

Web History Visualisation for Forensic Investigations

Web History Visualisation for Forensic Investigations Sarah Lowman (1) and Ian Ferguson (2) (1) – sarah@lowmanio.co.uk (2) – University of Abertay I.Ferguson@abertay.ac.uk Abstract. Current tools for...

View Article


Image may be NSFW.
Clik here to view.

An Introduction to Penetration Testing – Part 1

Information Security Wordle: RFC2196 – Site Security Handbook (Photo credit: purpleslog) In an earlier article, many moons ago (Sorry Jamie !), I stated my opinion that Forensics and Security were...

View Article

Image may be NSFW.
Clik here to view.

Introduction to Penetration Testing – Part 2 – The Discovery Phase – Passive...

Beschreibung, Quelle Quelle: selbst fotografiert, 01/2006 Fotograf: Späth Chr. Lizenzstatus: license (Photo credit: Wikipedia) PenTest, like forensics, is almost as much an art as it is a science – you...

View Article

Image may be NSFW.
Clik here to view.

Introduction to Penetration Testing – Part 3a – Active Reconnaissance

wi-fi garbage (Photo credit: Yuba College Public Space Apologies in advance, this is a bit of a connective blog entry – this is a big topic, and it needs some scene setting, basic understanding and...

View Article


Image may be NSFW.
Clik here to view.

Book Review: Mastering Windows Network Forensics & Investigations

Mastering Windows Network Forensics and Investigations fills an interesting niche not well addressed in the pantheon of digital forensics resources.  The material is well suited for beginning and...

View Article

Image may be NSFW.
Clik here to view.

From iPhone to Access Point

Introduction A wireless Access Point (AP) is a device that allows wireless devices to connect to internet using Wi-Fi. With the remarkable increase in number of wireless devices the number of APs has...

View Article

Image may be NSFW.
Clik here to view.

Cyber Security Challenge in Scotland

Towards the end of August, I was part of the team who were offered to help out and participate at an exciting event held at Glasgow Caledonian University. The event ran over five days with each day...

View Article


Image may be NSFW.
Clik here to view.

Analysis Of iOS Notes App

As part of my third year studying Digital Security,Forensics & Ethical Hacking at GCU, I took part in a group research project to study the artifacts created when using the notes app on an iPad...

View Article


Image may be NSFW.
Clik here to view.

Man In The Middle Attack: Forensics

Yes, that’s right! Mr. Upset did not post ‘I am hating my new job’ as it appears in Figure 2, instead he wrote ‘I am loving my new job’. Then how did it happen and who did it? This article aims at...

View Article

Image may be NSFW.
Clik here to view.

Investigation and Intelligence Framework (IIF) – an evidence extraction model...

Authors Alan, Kelvin, Anthony and Zetta (VXRL) Disclaimer This framework was first introduced in DFRWS EU 2014 (the first DFRWS conference in Europe) at Amsterdam held in May and later presented at...

View Article
Browsing all 11 articles
Browse latest View live