4 min read
Network Forensics, Part 5: Wi-Fi (802.11) Forensics
Welcome back my aspiring DFIR analysts! In recent recent years, Wi-Fi has become ubiquitous throughout our home and working environments....
3,663 views
4 min read
Network Forensics, Part 2: Packet-Level Analysis of the NSA's EternalBlue Exploit
Welcome back, my aspiring cyber warriors! In April 2017, a nefarious group known only as the Shadow Brokers, released to the world a...
19,532 views
4 min read
Network Forensics, Part 3: tcpdump for Network Analysis
Welcome back, my aspiring network forensic analysts! tcpdump in Action Tcpdump was among the very first (1988) Linux/UNIX based sniffers...
7,246 views
4 min read
Network Forensics: Wireshark Basics, Part 2
Welcome back, my aspiring network forensics investigators! In my previous post in this series, I introduced you to the most widely-used...
4,873 views
4 min read
Network Forensics, Part 2: Detecting and Analyzing a SCADA DoS Attack
Welcome back, my aspiring network forensic investigators! Now that you have a basic understanding of Wireshark and have conducted an...
5,311 views
5 min read
Network Forensics, Wireshark Basics, Part 1
Welcome back, my aspiring Digital Forensics Investigators! Although Wireshark is the most widely used network and protocol analyzer, it...
46,287 views
4 min read
Network Forensics, Part 1
Welcome back, my hacker apprentices! ​ ​ Network forensics is key element of most digital forensics and incident response (DFIR)...
5,521 views