Forensic Approach to Packet Traffic

GhostWins

Katılımcı Üye
29 Şub 2020
539
575
Today, we will briefly touch on the subject of "Forensic Computing Approach to Package Traffic".


turk_hack_team_.gif


As a result of attacks on today's systems, the development and spread of the tools used is increasing rapidly. Because of this, the importance of information security is increasing in all sectors. Many institutions today have taken into account this important factor of information security and resorted to many different protection methods in order to take precautions.
Firewalls, encryption tools, penetration detection systems, anti-virus software and similar tools such as port scanners are aimed at ensuring information security. The only method of detecting what is happening on the network system is to measure the data moving on the network and the component contents in critical sections and compare the measurements of the detections with the previous data.




What-is-Cyber-Security.png




Network Traffic

There are different kinds of information that can be collected over network protocols such as HTTPS - HTTP - SSH - POP - SMTP and Telnet. It is very important for system users responsible for network flow such as network traffic and e-mail data. The difference in the content collected through the network can create a very negative sensitivity for the people who examine it during the analysis.


preview-69839TEYfaEXv7t_0007.png


Examples of these scenarios are proxy servers, TCP routing, web and e-mail names, packet routing, IP address and e-mail hijacking, DNS spoofing and session blocking.




Network Traffic Control

With the examination you will make on the systems, it is possible to access the running applications, users and services and the user's hardware information, operating system, web browser and software.

The data that can be accessed as a result of the examination on the network data are as follows;



network infrastructure
Network topology
Access to resources on the network
Access to other devices on the network

1593008063-ko-tu-amac-l-yaz-l-mlar-n-3-te-2-si-s-ifreli-ve-https-denetimi-gerc-ekles-mezse-go-ru-nmu-yor-2-.png



turk_hack_team_.gif



Have a nice day
 

cyber knight

Katılımcı Üye
30 Ağu 2021
711
438
Root@Cyberknight
Today, we will briefly touch on the subject of "Forensic Computing Approach to Package Traffic".


turk_hack_team_.gif


As a result of attacks on today's systems, the development and spread of the tools used is increasing rapidly. Because of this, the importance of information security is increasing in all sectors. Many institutions today have taken into account this important factor of information security and resorted to many different protection methods in order to take precautions.
Firewalls, encryption tools, penetration detection systems, anti-virus software and similar tools such as port scanners are aimed at ensuring information security. The only method of detecting what is happening on the network system is to measure the data moving on the network and the component contents in critical sections and compare the measurements of the detections with the previous data.




What-is-Cyber-Security.png




Network Traffic

There are different kinds of information that can be collected over network protocols such as HTTPS - HTTP - SSH - POP - SMTP and Telnet. It is very important for system users responsible for network flow such as network traffic and e-mail data. The difference in the content collected through the network can create a very negative sensitivity for the people who examine it during the analysis.


preview-69839TEYfaEXv7t_0007.png


Examples of these scenarios are proxy servers, TCP routing, web and e-mail names, packet routing, IP address and e-mail hijacking, DNS spoofing and session blocking.




Network Traffic Control

With the examination you will make on the systems, it is possible to access the running applications, users and services and the user's hardware information, operating system, web browser and software.

The data that can be accessed as a result of the examination on the network data are as follows;


network infrastructure
Network topology
Access to resources on the network
Access to other devices on the network

1593008063-ko-tu-amac-l-yaz-l-mlar-n-3-te-2-si-s-ifreli-ve-https-denetimi-gerc-ekles-mezse-go-ru-nmu-yor-2-.png



turk_hack_team_.gif




Have a nice day
Good job, good job for your work.
Have a nice day and good forum.
 

7as

Uzman üye
15 May 2021
1,706
1,159
En el universo
Today, we will briefly touch on the subject of "Forensic Computing Approach to Package Traffic".


turk_hack_team_.gif


As a result of attacks on today's systems, the development and spread of the tools used is increasing rapidly. Because of this, the importance of information security is increasing in all sectors. Many institutions today have taken into account this important factor of information security and resorted to many different protection methods in order to take precautions.
Firewalls, encryption tools, penetration detection systems, anti-virus software and similar tools such as port scanners are aimed at ensuring information security. The only method of detecting what is happening on the network system is to measure the data moving on the network and the component contents in critical sections and compare the measurements of the detections with the previous data.




What-is-Cyber-Security.png




Network Traffic

There are different kinds of information that can be collected over network protocols such as HTTPS - HTTP - SSH - POP - SMTP and Telnet. It is very important for system users responsible for network flow such as network traffic and e-mail data. The difference in the content collected through the network can create a very negative sensitivity for the people who examine it during the analysis.


preview-69839TEYfaEXv7t_0007.png


Examples of these scenarios are proxy servers, TCP routing, web and e-mail names, packet routing, IP address and e-mail hijacking, DNS spoofing and session blocking.




Network Traffic Control

With the examination you will make on the systems, it is possible to access the running applications, users and services and the user's hardware information, operating system, web browser and software.

The data that can be accessed as a result of the examination on the network data are as follows;


network infrastructure
Network topology
Access to resources on the network
Access to other devices on the network

1593008063-ko-tu-amac-l-yaz-l-mlar-n-3-te-2-si-s-ifreli-ve-https-denetimi-gerc-ekles-mezse-go-ru-nmu-yor-2-.png



turk_hack_team_.gif




Have a nice day
Nice topic It always comes out of you about Internoal
 
Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.