Security Basics mailing list archives
RE: where should I start?
From: "dave kleiman" <dave () isecureu com>
Date: Wed, 1 Sep 2004 00:46:28 -0400
Here are few to get you started... http://www.cyberguard.com/news_room/news_newsletter_011904traffic.cfm http://www.robertgraham.com/pubs/sniffing-faq.html http://www.sans.org/rr/papers/38/244.pdf http://www.sans.org/rr/papers/33/1379.pdf http://www.packetwatch.net/documents/papers/layer2sniffing.pdf ______________________________________ Dave Kleiman, CISSP, CISM, CIFI, MCSE www.SecurityBreachResponse.com -----Original Message----- From: chang zhu [mailto:cyz2000 () yahoo com] Sent: Tuesday, August 31, 2004 10:10 To: security-basics () securityfocus com Subject: where should I start? hi,all I want to learn how to use sniffer tools such as Etherreal...but I do not know how to detect abnormal traffic...Any advice or link will be greatly appreciated. Thanks, Chang _______________________________ Do you Yahoo!? Win 1 of 4,000 free domain names from Yahoo! Enter now. http://promotions.yahoo.com/goldrush --------------------------------------------------------------------------- Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the source of computer crime and abuse so that it never happens again. http://www.infosecinstitute.com/courses/computer_forensics_training.html ---------------------------------------------------------------------------- --------------------------------------------------------------------------- Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the source of computer crime and abuse so that it never happens again. http://www.infosecinstitute.com/courses/computer_forensics_training.html ----------------------------------------------------------------------------
Current thread:
- where should I start? chang zhu (Aug 31)
- Re: where should I start? Liran Cohen (Sep 01)
- Re: where should I start? Ravi Kumar (Sep 02)
- RE: where should I start? dave kleiman (Sep 02)
- <Possible follow-ups>
- RE: where should I start? BĂ©noni MARTIN (Sep 02)
- RE: where should I start? Corey LeBleu (Sep 08)