Explore the techniques used to investigate network-based intrusions, particularly those originating from the public Internet, in this 1-hour 2-minute conference talk by Peter Stephenson at Black Hat USA 1999. Gain insights into methods that provide an acceptable chain of evidence for law enforcement or civil litigation purposes. Delve into topics such as back-tracing, forensic tools, end-to-end tracing, and evidence collection and preservation. Learn about the forensic use of RMON2-based tools for documenting the path of an attack, equipping yourself with essential knowledge in cyber forensic analysis.
Overview
Syllabus
Black Hat USA 1999 - Introduction to Cyber Forensic Analysis
Taught by
Black Hat