Summary

In this chapter, you learned how to acquire evidence from different sources. You were also exposed to a number of tools such as tcpdump, Wireshark, Event Viewer, and FTK Imager. We have also studied how to use these tools to acquire evidence that could be relevant to our case.

The next chapter moves us along our journey of acquiring knowledge and skills in the network forensics arena. You will learn how to intercept and analyze network traffic using a number of tools. We will also get an opportunity to look at a case study, where we will see how this knowledge has been put into practice in the real world.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.141.47.25