By Sherri Davidoff   /   Jun 5th, 2013

Network Forensics Protocol | Handy Cheatsheet | LMG Security


tcp-croppedSince many of you asked, here’s the Network Forensics Protocol Handy Cheat Sheet that we use in the Network Forensics class. Jonathan Ham made the protocol charts. (I really like the way he marked the bits and bytes– super handy for protocol dissection or writing BPF filters.)

Print double-sided and fold down the middle. Cheers!

About the Author

Sherri Davidoff

Sherri Davidoff is the CEO of LMG Security and the author of “Data Breaches: Crisis and Opportunity.” As a recognized expert in cybersecurity, she has been called a “security badass” by the New York Times. Sherri is a regular instructor at the renowned Black Hat trainings and a faculty member at the Pacific Coast Banking School. She is also the co-author of Network Forensics: Tracking Hackers Through Cyberspace (Prentice Hall, 2012), and has been featured as the protagonist in the book, Breaking and Entering: The Extraordinary Story of a Hacker Called “Alien.” Sherri is a GIAC-certified forensic examiner (GCFA) and penetration tester (GPEN) and received her degree in Computer Science and Electrical Engineering from MIT.  Her latest book, “Ransomware and Cyber Extortion,” will be published this year.