Summary

In this chapter, we worked with a variety of log types and gathered inputs to aid our network forensics exercise. In the next chapter, we will learn how we can identify rogue access points, which can allow an attacker to view all your communication logs, and we will also look at strategies to identify and physically find those rogue devices.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset