Malicious Cryptography: Exposing Cryptovirology

 

Hackers have uncovered the dark side of cryptographythat device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. Its called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what youre up against and how to fight back. Continue reading “Malicious Cryptography: Exposing Cryptovirology” »

Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems

 

 

It’s easy to capture packets with Wireshark, the world’s most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what’s happening on your network

With an expanded discussion of network protocols and 45 completely new scenarios, this extensively revised second edition of the best-selling Practical Packet Analysis will teach you how to make sense of your PCAP data. You’ll find new sections on troubleshooting slow networks and packet analysis for security to help you better understand how modern exploits and malware behave at the packet level. Add to this a thorough introduction to the TCP/IP network stack and you’re on your way to packet analysis proficiency. Continue reading “Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems” »

The Art of Memory Forensics

 

Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst’s Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics—now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, Continue reading “The Art of Memory Forensics” »