Latest Blog Post

read more

News and Events

August 2-5, 2014 - "Network Forensics: Black Hat Release" at Black Hat USA in Las Vegas, NV (Sherri Davidoff and Jonathan Ham) Space is limited, so register today!
 
August 7-10, 2014 - Join us at DEF CON 22 and play our annual Network Forensics Puzzle Contest.
 
LinkedIn Reddit Delicious Technorati Twitter Digg Stumbleupon

 
Join our Email Newsletter

 
Class and Book

Want "Network Forensics" (the class) taught privately at your facilities? Request an Onsite

Order Network Forensics: Tracking Hackers Through Cyberspace!

read more
 
Need Expert Consulting?

Request a Quote

Email Us an RFP



Network Forensics: Tracking Hackers Through Cyberspace
 

Cover illustration by Jonah Elgart

By Sherri Davidoff and Jonathan Ham

Order Now


On the Internet, every action leaves a mark---in routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind.

Learn to recognize hackers' tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace. Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect's web surfing history---and cached web pages, too---from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire.

Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors' web site (lmgsecurity.com), and follow along to gain hands-on experience.

Hackers leave footprints all across the Internet. Can you find their tracks and solve the case? Pick up Network Forensics and find out!