Reader small image

You're reading from  Learning Network Forensics

Product typeBook
Published inFeb 2016
Publisher
ISBN-139781782174905
Edition1st Edition
Concepts
Right arrow
Author (1)
Samir Datt
Samir Datt
author image
Samir Datt

Samir Datt has been dabbling with digital investigations since 1988, which was around the time he solved his first case with the help of an old PC and Lotus 123. He is the Founder CEO of Foundation Futuristic Technologies (P) Ltd, better known as ForensicsGuru.com. He is widely credited with evangelizing computer forensics in the Indian subcontinent and has personally trained thousands of law enforcement officers in the area. He has the distinction of starting the computer forensics industry in South Asia and setting up India's first computer forensic lab in the private sector. He is consulted by law enforcement agencies and private sector on various technology-related investigative issues. He has extensive experience in training thousands of investigators as well as examining a large number of digital sources of evidence in both private and government investigations.
Read more about Samir Datt

Right arrow

Analyzing network logs using Splunk


Now that we have the logs, it is high time we understood how to collect and analyze them from a network forensic's perspective.

The tool of choice is Splunk. This is a very versatile tool (it also has a free version) that offers users the ability to collect log files from multiple sources, index and normalize the data within, then carry out an in-depth analysis to look for anomalies, prepare reports, and visualize the results. Lets take a look at it:

Splunk offers the facility to import and index data in a multitude of formats. This includes structured data, web services, network devices, Microsoft servers, application services, the cloud, and a host of others. The following are the steps to download and start using Splunk:

  1. To get started, we need to download Splunk from http://www.splunk.com/, as shown in the following screenshot:

  2. All we need to get started is to download the relevant binary based on the operating system that we intend to use for the analysis...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Learning Network Forensics
Published in: Feb 2016Publisher: ISBN-13: 9781782174905

Author (1)

author image
Samir Datt

Samir Datt has been dabbling with digital investigations since 1988, which was around the time he solved his first case with the help of an old PC and Lotus 123. He is the Founder CEO of Foundation Futuristic Technologies (P) Ltd, better known as ForensicsGuru.com. He is widely credited with evangelizing computer forensics in the Indian subcontinent and has personally trained thousands of law enforcement officers in the area. He has the distinction of starting the computer forensics industry in South Asia and setting up India's first computer forensic lab in the private sector. He is consulted by law enforcement agencies and private sector on various technology-related investigative issues. He has extensive experience in training thousands of investigators as well as examining a large number of digital sources of evidence in both private and government investigations.
Read more about Samir Datt