![]() ![]() Some tools, like Moloch, allow you to “tag” some conversations. ![]() ![]() Many security tools can record samples of network traffic or you can maybe need a full-packet capture. Just keep in mind: it must be properly performed if your notes will be used as evidence later… With investigations, there are also chances to you will have to deal with packet captures. There is no “best” way to take notes, some people use electronic solutions while others are using good old paper and pencil. When you are investigating a security incident, a key element is to take notes and to document as much as possible. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |