Control Systems Learn to recognize hackers tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace. Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyse a real-world wireless encryption cracking attack and then crack the key yourself. Reconstruct a suspects web surfing history and cached web pages, too from a web proxy. Uncover DNS tunnelled traffic. Dissect the Operation Aurora exploit, caught on the wire.
Table of Contents * Part I: Foundation * Part II: Traffic Analysis * Part III: Network Devices and Servers * Part IV: Advanced Topics