scenario of attack ...
 
Notifications
Clear all

scenario of attack and forensic procedures

4 Posts
3 Users
0 Reactions
315 Views
chinigami
(@chinigami)
Active Member
Joined: 18 years ago
Posts: 17
Topic starter  

hello
please do u know some websites that give samples of attacks and the forensic procedures that have been taken to resolve these cases.i could'nt find interresting examples in google treating real attacks and investigation solutions.
Sorry for desturbing and thanks for giving a hand


   
Quote
azrael
(@azrael)
Honorable Member
Joined: 19 years ago
Posts: 656
 

Have a look at the honeynet project http//www.honeynet.org/

Their "Scan of the Month" - http//www.honeynet.org/scans/index.html - gives both an example attack, and several analyses. Not "forensically sound" per se, as that wasn't the object. But many of the methods are interesting and original.

Correct me if I am wrong, but you seem to be interested in Incident Response and Network Security based forensics …

If you have a look at things like IDS rules, you can discover some of the signatures that are characteristic of certain attacks for example. Similarly, provided you have a safe environment to play/experiment in, download some of the attacks and run them yourself -) I'd suggest metasploit as as good a place as any to start ( http//www.metasploit.com/ )

Have Fun -D


   
ReplyQuote
chinigami
(@chinigami)
Active Member
Joined: 18 years ago
Posts: 17
Topic starter  

yes am starting studying network security and actually am working on computer forensics and using helix tools,that am interresting in finding some simple attacks which will give me the opurtinity to try some helix tools.

and thanks *azrael* for all the help u gave me and going to give meD


   
ReplyQuote
keydet89
(@keydet89)
Famed Member
Joined: 21 years ago
Posts: 3568
 

There really aren't any places that address attacks, and the forensic methodology to investigate them….the forensic methodology generally remains the same regardless of the attack.


   
ReplyQuote
Share: