Useful Links
Computer Science
Cybersecurity
Digital Forensics
1. Foundations of Digital Forensics
2. Evidence Collection and Preservation (Acquisition)
3. Computer Forensics
4. Network Forensics
5. Mobile Device Forensics
6. Advanced Forensic Topics
7. Reporting and Presentation
Network Forensics
Principles of Network Forensics
Sources of Network Evidence
Network Devices (Routers, Switches)
Configuration Files
Log Files
ARP Tables
Routing Tables
Endpoints
Network Interface Logs
Connection Logs
Application Logs
Cloud Services
API Logs
Access Logs
Configuration Changes
Network Security Topologies
Segmentation and Zones
Network Boundaries
Trust Zones
Access Controls
DMZs and Firewalls
Traffic Filtering
Rule Analysis
Bypass Detection
Network Protocols and Standards
OSI Model Application
TCP/IP Stack Analysis
Protocol Behavior
Evidence Acquisition in Networks
Packet Capture (PCAP)
Tools for Packet Capture
Wireshark
tcpdump
Network Taps
SPAN Ports
Storage and Management of Captures
File Formats
Compression Techniques
Indexing Methods
Legal Considerations
Wiretapping Laws
Privacy Expectations
Consent Requirements
Flow Data (NetFlow, IPFIX)
Flow Collection and Analysis
Flow Exporters
Flow Collectors
Flow Analysis Tools
Flow Record Components
Sampling Considerations
Log Files
Firewall Logs
Connection and Block Events
Rule Matching
Traffic Statistics
Intrusion Detection/Prevention System (IDS/IPS) Logs
Alert Types and Signatures
False Positive Analysis
Attack Pattern Recognition
Proxy Server Logs
Web Access and Filtering
Content Analysis
User Activity Tracking
DHCP and DNS Logs
IP Address Assignments
Lease Information
Domain Resolution Records
Query Analysis
Web Server Logs
Email Server Logs
VPN Logs
Network Traffic Analysis
Protocol Analysis (TCP, UDP, ICMP)
Packet Structure and Headers
Session Reconstruction
Protocol Anomaly Detection
Fragmentation Analysis
Application Layer Protocol Analysis (HTTP, FTP, SMTP)
Content Inspection
Data Extraction
File Recovery
Communication Analysis
Credential and Data Leakage Detection
Password Transmission
Sensitive Data Identification
Exfiltration Detection
Identifying Anomalous Traffic
Baseline Establishment
Normal Traffic Patterns
Statistical Analysis
Behavioral Modeling
Detection of Suspicious Patterns
Unusual Protocols
Abnormal Data Volumes
Timing Anomalies
Reconstructing Network Events
Timeline Creation
Event Correlation
Chronological Analysis
Gap Identification
Correlation with Host Events
Multi-Source Analysis
Event Synchronization
Causal Relationships
Advanced Traffic Analysis
Encrypted Traffic Analysis
Covert Channel Detection
Botnet Communication Analysis
APT Traffic Patterns
Wireless Network Forensics
Capturing Wireless Traffic
Tools and Adapters
Monitor Mode Capabilities
Antenna Considerations
Frequency Coverage
Channel Hopping
Coverage Strategies
Timing Considerations
Data Loss Mitigation
Analyzing Wireless Protocols (802.11)
Frame Types and Fields
Management Frames
Control Frames
Data Frames
Encryption and Authentication
WEP Analysis
WPA/WPA2 Analysis
WPA3 Considerations
Enterprise Authentication
Identifying Rogue Access Points
Detection Techniques
Signal Analysis
MAC Address Analysis
SSID Monitoring
Mitigation Strategies
Containment Methods
Legal Considerations
Bluetooth Forensics
Pairing Analysis
File Transfer Investigation
Device Identification
Cellular Network Forensics
IMSI/IMEI Analysis
Cell Tower Data
Location Tracking
Previous
3. Computer Forensics
Go to top
Next
5. Mobile Device Forensics