Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to att
Cisco Router and Switch Forensics. Investigating and Analyzing Malicious Network Activity
โ Scribed by Dale Liu (Auth.)
- Publisher
- Syngress
- Year
- 2009
- Tongue
- English
- Leaves
- 580
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Table of Contents
Content:
Copyright, Page ii
Lead Author and Technical Editor, Page iii
Contributing Authors, Pages iv-ix
Introduction: An Overview of Cisco Router and Switch Forensics, Pages 1-14
Chapter 1 - Digital Forensics and Analyzing Data, Pages 15-38
Chapter 2 - Seizure of Digital Information, Pages 39-74
Chapter 3 - The Mindset of a Network Administrator, Pages 75-84
Chapter 4 - Arrival on the Scene, Pages 85-110
Chapter 5 - Diagramming the Network Infrastructure, Pages 111-147
Chapter 6 - Cisco IOS Router Basics, Pages 149-206
Chapter 7 - Understanding the Methods and Mindset of the Attacker, Pages 207-249
Chapter 8 - Collecting the Non-Volatile Data from a Router, Pages 251-303
Chapter 9 - Collecting the Volatile Data from a Router, Pages 305-389
Chapter 10 - Cisco IOS Switch Basics, Pages 391-436
Chapter 11 - Collecting the Non-Volatile and Volatile Data from a Switch, Pages 437-463
Chapter 12 - Preparing Your Report, Pages 465-476
Chapter 13 - Preparing to Testify, Pages 477-498
Index, Pages 499-504
Appendix - Cisco Wireless Device Forensics, Pages 1-73
๐ SIMILAR VOLUMES
<i>Malware Forensics: Investigating and Analyzing Malicious Code</i> covers the emerging and evolving field of "live forensics," where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that dis
Malware Forensics: Investigating and Analyzing Malicious Code covers the emerging and evolving field of "live forensics," where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss
Cisco Systems, 2007. โ 260 pages.<div class="bb-sep"></div>Securing Networks with Cisco Routers and Switches (SNRS) v2.0 is a five-day, instructor-led, lab-intensive course that is delivered by Cisco Learning Partners. It is aimed at providing network specialists with the knowledge and skills needed