ABSTRACT

The meaning of the word vulnerability is “weakness” or the “level of sensitivity”. In context of network forensics, vulnerability is the chance of getting exploited remotely. Vulnerability can be in any application: it can be at a code level, it could be system-based, it could be a system, or it could be something else. The weakness can be further explained as something that can change the physical structure of a system, an application, or a network but can be gratuitously controlled. It is similar to breaking into someone’s house and robbing it. Therefore, it is a must to detect and prevent the system, application, process, or network from such vulnerabilities. The assessment of vulnerability can be categorized into active vulnerability, passive vulnerability, internal vulnerability, external vulnerability, network vulnerability, host vulnerability, wireless vulnerability, and the application vulnerability. This chapter focuses on different vulnerabilities and their detection. It also provides knowledge on the acquisition and identification of network vulnerabilities. It makes the readers understand network forensic acquisition. It also provides a practical aspect of setting up an experiment for identifying the clues about flooding attacks through practical knowledge.