From the course: Network Forensics

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Fundamentals

Fundamentals

From the course: Network Forensics

Start my 1-month free trial

Fundamentals

- [Instructor] Let's take a closer look at how network traffic is generated. A big part of a network forensics investigation is traffic analysis. A clear understanding of how a packet travels from it's source to a destination is a must for network forensics specialists because they often have to trace attack packets to their sources. We say that assault application is a network application when it relies on a computer network to function properly. Take a web browser, it's useless without Internet connectivity. When an end user types a URL and presses enter, the web browser passes the information to the operating system or OS of it's host. Before handing the raw user input to the OS, by putting it into a specific format and by adding more information, the web browser turns it into a HyperText Transfer Protocol or HTTP request. Each type of Network Applications use different different rules of engagement when communicating with each other. Which are referred to as protocols. Web…

Contents