Difference between pages "Network forensics" and "DeepSpar Disk Imager"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
m (added packet motion; broke out Q1 to new category)
 
 
Line 1: Line 1:
'''Network forensics''' is the process of capturing information that moves over a [[network]] and trying to make sense of it in some kind of forensics capacity. A [[network forensics appliance]] is a device that automates this process.
+
; [[DeepSpar Disk Imager]]
 
+
[[Image:DeepSpardiskimager.jpg]],
There are both open source and proprietary network forensics systems available.
+
:An independently written review of the DeepSpar Disk Imager written by Mike Montgomery of MJM Data Recovery in the UK is available at: http://www.deepspar.com/mjm-ds-disk-imager.html
 
+
:The whitepaper "Disk Imaging: A Vital Step in Data Recovery" is available to download from: http://www.deepspar.com/pdf/DeepSparDiskImagingWhitepaper3.pdf.
== Open Source Network Forensics ==
+
:The product data sheet can be downloaded from: http://www.deepspar.com/pdf/DeepSparDiskImager.pdf.
 
+
* [[Snort]]
+
* [[OSSEC]]
+
 
+
== Commercial Network Forensics ==
+
===Deep-Analysis Systems===
+
* Code Green Networks [http://www.codegreennetworks.com Content Inspection Appliance] - Passive monitoring and mandatory proxy mode. Simple to us Web GUI. Linux platform. Uses Stellent Outside In to access document content and metadata.  
+
* ManTech International Corporation [http://www.netwitness.com/ NetWitness]
+
* NIKSUN's [[NetDetector]]
+
* PacketMotion [http://www.packetmotion.com/]
+
* Sandstorm's [http://www.sandstorm.net/products/netintercept/ NetIntercept] - Passive monitoring appliance. Qt/X11 GUI. FreeBSD platform. Uses forensic parsers written by Sandstorm to access document content and metadata.
+
 
+
 
+
===Flow-Based Systems===
+
* Arbor Networks
+
* GraniteEdge Networks http://www.graniteedgenetworks.com/
+
* Lanscope http://www.lancope.com/
+
* Mazu Networks http://www.mazunetworks.com/
+
 
+
===Hybrid Systems===
+
These systems combine flow analysis, deep analysis, and security event monitoring and reporting.
+
* Q1 Labs  http://www.q1labs.com/
+
 
+
== Tips and Tricks ==
+
 
+
* The time between two events triggered by an intruder (as seen in logfiles, for example) can be helpful. If it is very short, you can be pretty sure that the actions were performed by an automated script and not by a human user.
+

Revision as of 14:07, 11 April 2007

DeepSpar Disk Imager

DeepSpardiskimager.jpg,

An independently written review of the DeepSpar Disk Imager written by Mike Montgomery of MJM Data Recovery in the UK is available at: http://www.deepspar.com/mjm-ds-disk-imager.html
The whitepaper "Disk Imaging: A Vital Step in Data Recovery" is available to download from: http://www.deepspar.com/pdf/DeepSparDiskImagingWhitepaper3.pdf.
The product data sheet can be downloaded from: http://www.deepspar.com/pdf/DeepSparDiskImager.pdf.