0% found this document useful (0 votes)
16 views104 pages

Module 1 - Introduction To Network Hunting

Uploaded by

beckbeck20177
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views104 pages

Module 1 - Introduction To Network Hunting

Uploaded by

beckbeck20177
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 104

1.

1 Introduction

1.2 TCP/IP & Networking Primer

1.3 Packet Analysis & Tools


Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
In this section we’ll start looking through the eyes of a threat
hunter who doesn’t have threat intelligence (cyber threat
intelligence or CTI) to aid him on what specifics to look for
within the environment.

Note: Threat Intelligence will be referenced as CTI throughout


the remainder of the course.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Within this course we’re helping you look at things from a top
down approach. Meaning, if you have CTI then you’ll be
expected to use it to aid you in the hunt.

After using CTI to aid you in the hunt where would you begin
looking for threats? You’ll look at the network through
network analysis to find any signs of a threat.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Threat Intelligence would be
a great aid to us hunters but we CTI
must not rely solely on CTI.

Network

We will be looking at endpoints


Endpoints in the next section.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Most small-medium sized businesses has a IT Security person
or team and a Infrastructure/Network person or team as well.
Unfortunately in some cases the IT Security “Team” is the
Network “Team”.

In any case within this course we’ll assume that the IT


Security Team is not the same person as the Network Team.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


When it comes to Threat Hunters they are typically part of a
subset of the IT Security Team. In large organizations a
dedicated IR Team might be staffed. In smaller organizations
the hunter might be a on-call Incident Responder. In most
cases the task of IR is committed to a 3rd party and hunter will
typically be a Cybersecurity Analyst with a myriad of duties.
Of those duties typically it will not involve monitoring day to
day network traffic or anything relating to the network.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Again, the only time this is not the case is when the individual
is a Jack, or Jane, of all trades and he/she is responsible for
multiple functions within the organization that would
typically be broken up into different groups within the IT
Team.

This would typically fall under smaller organizations.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


So let’s build the scenario a threat hunter would
encounter that would involve network hunting:
• The Network Team would alert the hunter of odd traffic in a
specific subnet or within the network.
• Note: The organization doesn’t have to go into full
blown IR mode at this point.

• The Network Team or Threat Hunter would begin capturing


packets.

• The hunter would analyze the packet captures in order to


confirm if there is an active threat in the network.
Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
How would the Network Team know if something suspicious
is happening?

Of course they’ll know through an alert from an appliance,


such as an IDS/IPS. Other methods the Network Team can see
that something odd is happening on the network is through
statistical flow analysis (statistical modeling) and full packet
capturing/analysis.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Statistical Flow Analysis will provide
visibility as to what is happening on the
network. Graphs and advanced
statistical analysis will aid the Network
Team visually see what is happening in
the network historically (historical
timeline) or in real time.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


So this, along with network baselines (if any), the Network
Team will be able to see if anything is suspect within the
network, such as large unusual spikes which can represent an
exfiltration.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


We will not discuss in great detail the tools that will aid the
Network Team with statistical flow analysis, network
baselining, or alerting.

Keep in mind that alerts can also arise within the SIEM as well
which will be visible to the IT Security Team. So the
notification can come from within the IT Security Team in
addition to the Network Team.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


We will only be discussing tools that will aid the hunter with
full packet logging in order to investigate further, to confirm
the suspicion.

Before doing so, let’s briefly talk about TCP/IP, packets,


network traffic and network appliances.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
Understanding how hosts communicate and more specifically
how they communicate within your environment is important
because:
• We need to know/understand the TCP/IP stack and normal network
communication within the guides of the protocol.
– Example: With this knowledge it will guide us to spot something out of the
ordinary.
• We also need to know/understand what is normal network
communication within the organization.
– Example: A forgotten workstation within the network sending data to an
outside vendor via FTP every Saturday at midnight.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


A Threat Hunter should be an experienced individual.
They should know and be familiar with the following:
• TCP/IP protocol stack and how it works.

• Port numbers and typical applications that use


those ports.

• Normal behavior of typical applications as they


transmit through the corporate network.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


With that being said, the following few slides will be a brief
overview of TCP/IP & Networking that will serve as a
refresher.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Most individuals in the IT field typically know and understand
that information travels through the internal network and
from network to network through packets.

These packets are broken up at the source host and they are
reconstructed at the receiving host. These packets contain a
header and is followed by the payload.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


The header for each protocol has a specific structure.

This will ensure that the receiving host can correctly interpret
the payload and handle the overall communication.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
The payload is the actual information to be sent to the
destination host.

This information can be part of an email or part of a


download/upload of a file.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Understanding the structure of packets will aid the hunter
when analyzing large packet captures, especially if it’s a live
capture, using various packet analysis tools.

The hunter can search specific fields within the packet to


narrow down the search or alert the hunter when the search
criteria is met during a live capture.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


OSI & TCP/IP MODEL

Different protocols operate at different layers of the OSI


Model.

The OSI Model consists of 7 layers and is used as a reference


for implementation of actual protocols.

You can find more information regarding the OSI model here.
Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
OSI & TCP/IP MODEL

The TCP/IP Model consists of only 4 layers instead of 7 layers


like the OSI but they mesh together even though it’s less
layers and named differently.

You can read more about the TCP/IP and how it relates to the
OSI model here.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


OSI & TCP/IP MODEL

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


OSI & TCP/IP MODEL

We need to remember that different protocols operate at


different layers of the OSI & TCP/IP Models and as packets are
broken up to be prepared to be sent to the destination host
that each layer of the models will perform encapsulation.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


TCP/IP MODEL

Application Layer • FTP, SMTP, DNS, SNMP

Transport Layer • TCP, UDP

Internet Layer • IP, ARP, ICMP

Network Layer • Ethernet, Token Ring, Frame Relay

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


In the next few slides we’ll go through a visual reminder as to
what encapsulation means and how it relates to the TCP/IP
Model.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
During encapsulation every protocol adds its own header to
the packet, treating it as a payload.

This happens to every packet.

At the destination host, which is receiving the packets, this


process is done as well but in reverse order.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
Routers

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Routers

Routing protocols are used to determine the best path to


reach a network.

A router inspects the destination address of every incoming


packet and then forwards it through one of its interfaces.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Routers

To choose the right forwarding interface, a router performs a


lookup in the routing table. In the routing table is where it
will find an IP-to-interface binding.

The table will also contain an entry with a default address


(0.0.0.0). This is used when the router receives a packet
whose destination is unknown.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Routers

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Switches

In the same way as routers, which work with IP addresses, switches work
with MAC addresses.

Switches have multiple interfaces, so they need to keep a forwarding


table that binds 1 or more MAC addresses to an interface.

The forwarding table is called Content Addressable Memory (CAM)


table.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


In order to be comfortable analyzing network packets you
should be familiar with ARP (Address Resolution Protocol),
along with protocols such as TCP (Transmission Control
Protocol), UDP (User Datagram Protocol), & DNS (Domain
Name Service) to name a few.

You should know how the protocol communicates as well the


similarities and differences between the protocols.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


ARP Traffic

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


ARP Traffic

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


TCP Traffic

Regarding TCP, remember that there is a 3-way handshake


involved in order to establish communication between 2
hosts because the protocol is connection-orientated.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


TCP Header

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


TCP Header

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


TCP Traffic

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


TCP Traffic

Below we can see the 3-way handshake through WireShark.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


UDP Header

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Common Ports

Lastly each common protocol has a well-known port.

Not only should you be knowledgeable on common protocols


but you should be familiar with which port they typically
communicate on.

Ports are assigned by IANA and are referenced here.


Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
Common Ports

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
With full packet logging we’re capturing the raw packets as
they traverse the network.

It’s the actual communication passed between nodes on the


network.

As hunters we can perform a live packet capture or obtain a


PCAP (packet capture) file from the Network Team.
Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
Packet captures are typically saved as a PCAP file and nearly
all packet capturing and analysis tools will export network
traffic as a PCAP and will be able to import a PCAP file.

Other formats are available and packet capturing and analysis


tools can work with those formats as well aside from PCAP
but PCAP is the standard format for packet captures.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Now let’s recall the typical scenario as to when the hunter
can be called to implement network analysis.
• The Network Team is alerted or observes unusual traffic in the
network or a particular network segment.
• They notify the IT Security Team and the hunter begins the hunt.
• The Network Team can provide a PCAP file to analyze or the hunter
can conduct a live packet capture. The Network Team can do the
same and provide a PCAP file.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


So typically a hunter is not expected to scour through
terabytes of network traffic to find something odd during
scheduled hunts and they are not expected to monitor traffic
as it traverses the network.

That is equivalent to standing on the corner of the busiest


intersection during rush hour and trying to spot suspicious
individuals.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


That is the benefit from implementing defense-in-depth and
creating a security monitoring program.

Appliances should already be in place to catch or at least alert of


something awry if the appliance and the ruleset are configured
properly.

CTI would assist greatly with adding emerging threats to the


ruleset.
Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
One situation where the hunter might need inspect traffic is
when something occurs, such as the IDS/IPS appliance goes
down for a certain amount of time and analysis of the packets
that traversed the network during that time would be
inspected to see if any malicious traffic can be seen while the
security appliances were/are down.

Again, this is not an everyday occurrence and might be a task


that a hunter might have to undertake.
Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
As a member of the IT Security Team, you’re a native of the land (so to
speak).

That means you should be very familiar with the network infrastructure,
different network segments, IP addressing scheme, any specific internal
network rules, egress points, etc. as mentioned before.

It can’t be said the same regarding an outside security consultant who


comes in and knows nothing of the network.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


So being a native of the land, you should know where to
strategically tap into the network segment in order to begin a
live network traffic capture.

If not then that information and/or assistance needs to be


obtained from the Network Team.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Typically in enterprise networks, the IT Security Staff use Windows
machines.

Red Teamers normally use Linux as their platform whereas Blue


Teamers normally use Windows as their primary platform.

As a Threat Hunter, you’re more of a Purple Teamer. So you must


be familiar with both.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Within this module we’ll briefly introduce you to some well
known tools used for capturing, filtering, and analyzing
network traffic both Windows and Linux platforms.

Within the next module we’ll use these tools and analyze
different variations of network traffic.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Albeit you might be familiar with these tools but we can’t
assume that you are.

A good portion of IT Security Professionals are aware of


certain tools and when is an occasion to use these tools but
that doesn’t necessarily mean they know how to use the tool
in a real life situation.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Before we begin looking at the various tools to capture
network traffic it is important to note a few things to consider
during a LIVE network capture.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Live Network Captures

1. Capture and test to confirm that you’re indeed capturing


the traffic you intend to capture. It’s live and the packet(s)
you’re looking for might not be captured.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Live Network Captures

2. Confirm that you have enough computing power to handle


all the packets you’ll be capturing, especially in a heavy traffic
network segment. You will think you’re capturing all packets
but you’ll only be capturing what your device can handle.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Live Network Captures

3. Make sure you have enough disk space on your device. It


would be bad if you’re running a live network capture and
your device or VM only has a few GBs left of disk space. It will
only get that large if you’re capturing data for an extended
period of time.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Live Network Captures

4. Lastly, don’t forget the fundamentals of network hardware


such as switches. Remember with switches that traffic
destined for a particular host is point-to-point, even while
technically on the same segment. To capture data you will
need to be connected to a mirrored port.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Live Network Captures
Port Mirroring

Port Mirroring is the process of replicating traffic destined for one


or more ports to this specific port, mirrored port, which will be
used for network analysis or more specifically packet analysis.

In the Cisco World, this port is known as Cisco Switched Port


Analyzer or a SPAN port.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Live Network Captures
Port Mirroring

The Network Team or Network Administrator would be


responsible to provide this access to the Threat Hunter,
unless the Network Admin IS the Threat Hunter, then he/she
would configure the switch accordingly based on the
capabilities of the switch of course.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Live Network Captures
Port Mirroring

If the port mirroring option is not available there are other


options to sniff network traffic on the switch:
• Tapping the network cable
• MAC flooding (red team tactic)
• ARP spoofing (red team tactic)

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Live Network Captures
Network Tap

Network Taps entails physically tapping the wire or network cable,


whether it’s a copper cable or fiber.

Hardware is available that will allow us to tap the wire and


intercept the traffic as it traverses the cable.

An example of this would be a Vampire Tap.


Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
Live Network Captures
Network Tap

You can also use an Inline Network Tap. This type of tap would be
inserted ‘inline’ between to physically network devices, such as a
firewall and a switch.

The Inline Network Tap would replicate copies of packets on a


separate port, or ports, as it passes along the packets to it’s
destination.
Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
Live Network Captures
MAC Floods

MAC flooding is considered active sniffing and a tactic used


by Red Teams. This should only be used unless extremely
necessary. You don’t want to cause unnecessary stress to the
network equipment when you don’t need to. Authorization
would be required from management to go this route.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Live Network Captures
MAC Floods

MAC Flooding is meant to stress the switch and fill its CAM
table. When the space in the CAM table is filled with fake
MAC addresses the switch can no longer learn new MAC
addresses. The only way to keep the network alive is to
forward the frames meant to be delivered to the unknown
MAC address on all ports of the switch, thus making it fail
open and act like a hub.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Live Network Captures
ARP Poisoning

APR poisoning or ARP spoofing is another active technique


but can be considered stealthy. It doesn’t bring down the
functionalities of the switch, as MAC Flooding, but instead it
exploits the concept of traffic redirection. It is also considered
a Red Team technique.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Live Network Captures
ARP Poisoning

By exploiting the network via ARP Poisoning, we can redirect


the traffic of the host(s) we want to monitor to our machine.
This will allow us to monitor the traffic intended for the
host(s) of interest. It’s important to note that this technique is
used to perform Man in the Middle attacks.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Remember that these options are only listed as alternatives if
for some reason you can’t get hooked to a SPAN port or
obtain network taps.

Again, you will need authorization from management to


perform these tasks on the corporate network.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


libpcap

Libpcap is a Unix C library that provides the capabilities for


packet sniffing and analysis tools to capture and filter
packets. Wireshark and tcpdump are libpcap-based tools.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


libpcap

Many other packet sniffing and analysis tools that are based
on libpcap were created for special functions, such as:
tcpflow and ngrep. There are many libpcap-based tools but
we are only focusing on the most popular within this course.

For Windows systems WinPcap was created. WinPcap is a


libpcap library that was designed for Windows.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Wireshark

The first tool we’ll look at is Wireshark. Wireshark is a


network sniffer and a protocol analyzer.

This means that you can use it to analyze every packet, traffic
stream, or connection that hits your computer’s network
interface(s).

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Wireshark

Wireshark is free software and can be installed on practically


all modern operating systems.

You can download Wireshark from here.

In the following slides we are going briefly go over how to


configure it to use its main features.
Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
Wireshark

This is the Wireshark


main window.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Wireshark

On the main screen you can select the interface you would
like to use to capture network traffic and you can also enter
any filters you would like to narrow down the specific traffic
you would like capture.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Wireshark
By selecting the
green ribbon
and Manage Capture
Filters
you will be taken to
the screen
shown.

At this screen you


can select
a Capture Filter or
create an
entirely new one for
later use.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Wireshark

You can also go to CAPTURE > OPTIONS on the menu bar to


open a new window, Wireshark – Capture Interfaces.

At this window we’ll be able to configure more options such


as Output and other Options.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Wireshark

You can choose specific output settings:


1. Give name & location
to PCAP file. 1
2. Output format. 2
3. Specify when to create 3
a new file, on either based
on size or time.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Wireshark

Below is a snippet of the Wireshark window showing 1 packet


within the local network. We will be looking and using
Wireshark more in the next module.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Wireshark

Wireshark is a great tool for those beginning with network


analysis. It uses a graphical user-friendly tool but don’t let the
GUI fool you. It’s still a powerful tool for even the most
experienced network analysts. You can extend Wireshark’s
capabilities by writing your own plugins in C or Lua.
Wireshark also supports PDML (Packet Description Markup
Language) which is used to save network packet dissections.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Dumpcap

It should also be noted that other tools are bundled within the
Wireshark distribution, such as tshark and dumpcap.

Both of these tools are command-line based tools and can be used
to capture packets.

Dumpcap uses fewer system resources compared to Wireshark.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Tcpdump

Next tool we’ll look at is Tcpdump. Tcpdump is a powerful


packet sniffer that was designed as a Unix tool.

It allows the user to intercept and display TCP/IP and other


packets being transmitted or received over a network, to
which the computer is attached.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Tcpdump

Much like Wireshark, tcpdump has the ability to filter traffic and
save packets to a file for later analysis.

Tcpdump offers a very great amount of options and arguments.

The best way to learn more about it is by going through its man
page.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Tcpdump

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Tcpdump

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Berkley Packet Filter

Before we began discussing Wireshark and tcpdump we


looked into libpcap and briefly described what it is. Included
within the libpcap library is a filtering language called the
Berkley Packet Filter (BPF). With BPF we can use simple
expressions to capture and filter packets. In order to make
complex expressions we can use nested logical ANDs and
ORs. You should become very familiar with BPF.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Berkley Packet Filter

Within the remainder of course we’ll use different BPF filters


and it will be pointed out when it is used but feel free to read
up further and get a grasp on BPF. As mentioned before it’s a
technique you should know.

You can see list of BPF syntax here. Also check out these
display filter cheat sheets for tcpdump and Wireshark.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


In the next module we’ll dive deeper into the topic of packet
analysis and look at various PCAP files to identify normal
traffic in contrast to malicious traffic using the various tools &
techniques discussed in this module.

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


This concludes this module on TCP/IP and Network
Primer & Full Packet Logging (including tools).
We have covered:

✓ The concepts and foundation to networking today


• OSI & TCP/IP Model
• Packet Structure and Encapsulation
• Routers & Switches

✓ Full Packet Logging, including tools for analysis

Threat Hunting - © Caendra Inc 2017 - All Rights Reserved


Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
OSI Model OSI & TCP/IP Model

IANA Wireshark Download

Tcpdump Man Page Berkley Packet Filter

Display Filters
Display Filters (tcpdump)
(Wireshark)
Threat Hunting - © Caendra Inc 2017 - All Rights Reserved

You might also like