Wireshark as a Forensics tool
The types of information that can be gathered through Wireshark are:-
- Wireshark can be used to identify who initiated the attack, as we know that in forensic how important it is to identify a culprit or an accused to get the investigation started.
- Wireshark can be used to know how exactly the attack has been implemented on a system.
- Wireshark can be used to identify what all information or Data has been compromised from a device or network.
- It is helpful in finding out if the attacker has left anything in the system like a Trojan horse or a botware which can be used later to compromise the system.
- It also tracks the amount of the data collected and what all has been analyzed and should be analyzed. In short, determines whether there is enough data to analyze the network.
#wireshark #forensics #digitalforensics #networkforensics
Other Videos By VIEH Group
2021-03-31 | 5 Tools that every SOC Analyst should know about |
2021-03-31 | SOC Challenges |
2021-03-31 | What does a SOC do ? |
2021-03-31 | What is SOC - Security Operation Center |
2021-03-31 | What is SOC ? | Security Operation Center | Everything that you need to know |
2021-03-30 | Encase Forensics tool |
2021-03-30 | SANS SIFT Forensics tool |
2021-03-30 | FTK imager Forensics tool |
2021-03-30 | Magnet RAM Capture |
2021-03-30 | Volatility Framework |
2021-03-30 | Wireshark as a Forensics tool |
2021-03-30 | Paladin Forensics tool |
2021-03-30 | CAINE Forensics tool |
2021-03-30 | Autopsy/ Sleuth kit Forensics tool |
2021-03-30 | Pro-discover Forensics tool |
2021-03-30 | 10 best Digital Forensics tool in 2021 |
2021-03-28 | How to become a hacker | Everything that you need to know |
2021-03-28 | Top 30 Bug Bounty Program in 2021 | Part- III |
2021-03-27 | Top 30 Bug Bounty Programs in 2021 | Part- II |
2021-03-26 | Top 30 Bug Bounty Program in 2021 | Part- I |
2021-01-23 | Top 20 Critical Security Controls For Effective Cyber Defense | Cyber Vlogs |