Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the techniques used to investigate network-based intrusions, particularly those originating from the public Internet, in this 1-hour 2-minute conference talk by Peter Stephenson at Black Hat USA 1999. Gain insights into methods that provide an acceptable chain of evidence for law enforcement or civil litigation purposes. Delve into topics such as back-tracing, forensic tools, end-to-end tracing, and evidence collection and preservation. Learn about the forensic use of RMON2-based tools for documenting the path of an attack, equipping yourself with essential knowledge in cyber forensic analysis.