Digital forensics

Email analysis

In this article, we will explore the fundamentals concepts associated with email that will help us to perform email analysis. We will begin by understanding

Investigating wireless attacks

In an earlier article, we discussed the fundamentals of wireless networks: the common types of wireless devices, terminology used, WLAN security types, 802.1

Wireless networking fundamentals for forensics

With the evolution of Internet of Things (IoT) devices, there are countless wireless devices around us these days. Many people carry small-sized wireless net

Protocol analysis using Wireshark

Protocol analysis is examination of one or more fields within a protocol’s data structure during a network investigation. Understanding the bits and pieces o

Wireless analysis

In this article, we will discuss how to perform wireless analysis, specifically on Wi-Fi networks. We will perform active packet capturing by using an extern

Log analysis

Log analysis counts for a lot in an investigation, and this article provides a gentle introduction to log analysis. Log analysis is exactly what it sounds li

Network security tools (and their role in forensic investigations)

The effectiveness of network forensics is closely related to the network security tools used in an organization. We have covered common enterprise security s

Sources of network forensic evidence

One of the key aspects of any successful forensic investigation is the evidence collection phase. Identifying the sources of evidence while investigating an

Network Security Technologies

Knowledge of various network security technologies greatly aid in Network Forensic Investigations. This article outlines some network security technologies t

Network Forensics Tools

Various tools are available for Network forensics to investigate network attacks. In this article, we will discuss tools that are available for free. First,