This section focuses on enhancing skills in terms of acquiring and processing the evidence obtained. It covers strategies and methodologies in handling sophisticated protocols, packet structures, and anonymous traffic in investigation scenarios.
The following chapters will be covered in this section:
- Chapter 3, Deep Packet Inspection
- Chapter 4, Statistical Flow Analysis
- Chapter 5, Combatting Tunneling and Encryption