Packet analysis tools and methodology (Part 4)

by Don Parker
Sept. 1, 2017 0 comments TechGenix Detection & Response hacking & cyberattacks

Over the course of the past three articles we have seen how to set up our own little intrusion detection system and analysis lab. In this final part we will see how we can use these very same tools to do some analysis. Not many people actually do packet analysis for several reasons. A lot of people are not familiar with TCP/IP at the packet level, and there are not many jobs that actually require you to do this. If you have followed this article series you can mitigate these reasons to an extent, and advance your skills.