Difference between pages "Email Headers" and "Network forensics"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
m
 
(Tips.)
 
Line 1: Line 1:
Man shot dead at vehicle checkpoint
+
'''Network forensics''' is the process of capturing information that moves over a [[network]] and trying to make sense of it in some kind of forensics capacity. A [[network forensics appliance]] is a device that automates this process.
A man has been shot dead by police at a vehicle checkpoint in Northern Ireland. Officers fired a number of rounds during the incident on Church Street in Ballynahinch, County Down. The man shot dead was the
+
 
 +
There are both open source and proprietary network forensics systems available.
 +
 
 +
== Open Source Network Forensics ==
 +
 
 +
* [[Snort]]
 +
 
 +
== Proprietary Network Forensics ==
 +
 
 +
* Sandstorm's [[NetIntercept]]
 +
* NIKSUN's [[NetDetector]]
 +
 
 +
== Tips and Tricks ==
 +
 
 +
* The time between two events triggered by an intruder (as seen in logfiles, for example) can be helpful. If it is very short, you can be pretty sure that the actions were performed by an automated script and not by a human user.

Revision as of 18:43, 24 March 2006

Network forensics is the process of capturing information that moves over a network and trying to make sense of it in some kind of forensics capacity. A network forensics appliance is a device that automates this process.

There are both open source and proprietary network forensics systems available.

Open Source Network Forensics

Proprietary Network Forensics

Tips and Tricks

  • The time between two events triggered by an intruder (as seen in logfiles, for example) can be helpful. If it is very short, you can be pretty sure that the actions were performed by an automated script and not by a human user.