Security Basics mailing list archives

RE: where should I start?


From: "dave kleiman" <dave () isecureu com>
Date: Wed, 1 Sep 2004 00:46:28 -0400

 Here are few to get you started...

http://www.cyberguard.com/news_room/news_newsletter_011904traffic.cfm

http://www.robertgraham.com/pubs/sniffing-faq.html

http://www.sans.org/rr/papers/38/244.pdf

http://www.sans.org/rr/papers/33/1379.pdf

http://www.packetwatch.net/documents/papers/layer2sniffing.pdf 


______________________________________
Dave Kleiman, CISSP, CISM, CIFI, MCSE
www.SecurityBreachResponse.com

-----Original Message-----
From: chang zhu [mailto:cyz2000 () yahoo com] 
Sent: Tuesday, August 31, 2004 10:10
To: security-basics () securityfocus com
Subject: where should I start?

hi,all

I want to learn how to use sniffer tools such as Etherreal...but I do not
know how to detect abnormal traffic...Any advice or link will be greatly
appreciated.

Thanks,

Chang


                
_______________________________
Do you Yahoo!?
Win 1 of 4,000 free domain names from Yahoo! Enter now.
http://promotions.yahoo.com/goldrush

---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------



---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------


Current thread: