DF Iii Unit
DF Iii Unit
Key Features/Functions:
1. SMB (Server Message Block): Used for file and printer sharing.
2. LDAP (Lightweight Directory Access Protocol): Used for querying and modifying AD
objects.
3. Kerberos: Default authentication protocol for AD.
4. RDP (Remote Desktop Protocol): Allows remote access to Windows machines.
5. DNS (Domain Name System): Resolves hostnames to IP addresses.
6. DHCP (Dynamic Host Configuration Protocol): Assigns IP addresses dynamically.
1. VPN (Virtual Private Network): Secure remote access over the internet.
2. RDP (Remote Desktop Protocol): Allows remote access to Windows desktops and
servers.
A. Authentication Methods
B. Access Control
In Windows networks, Users and Groups are essential for managing access control,
security, and authentication. They help network administrators define who can access
resources and what actions they can perform.
Definition: Windows manages access control through user accounts and groups. Users can be
local or domain-based; groups help assign permissions collectively.
Key Components:
● Users: Individual login accounts (e.g., Administrator, Guest)
● Groups: Collections of users with common privileges (e.g., Administrators, Users)
● Tools: lusrmgr.msc, net user, net localgroup
Function:
A user in a Windows network is an individual account that can log in and perform actions based
on assigned permissions.
In Windows Server environments, Active Directory (AD) is used to manage users and
groups.
Types of AD Groups
Network investigation is the process of analyzing network traffic, logs, and digital evidence
to detect security breaches, cybercrimes, or unauthorized activities. It plays a vital role in
cybersecurity, incident response, and forensic analysis.
Definition: The process of analyzing network activity to detect anomalies, breaches, or
malicious behavior.
Purpose:
Tools/Techniques:
✅
activity to detect security breaches, unauthorized access, and cybercrimes. It helps in:
✅
Identifying intrusions (e.g., malware infections, hacking attempts).
✅
Tracing digital evidence (e.g., IP addresses, timestamps).
✅
Recovering compromised data.
Understanding attack methods (e.g., phishing, denial-of-service attacks).
B. Log Analysis
1. Detecting malware-infected traffic using Intrusion Detection Systems (IDS) and
Intrusion Prevention Systems (IPS).
2. Common IDS/IPS tools:
a. Snort: Open-source network intrusion detection.
b. Suricata: Advanced network threat detection.
3. Network Traffic Analysis – Examines real-time and stored network packets using
tools like Wireshark, tcpdump, and Suricata to detect suspicious activities.
4. Log Analysis – Investigates logs from firewalls, routers, and servers to track user
authentication and system activity.
5. IP Address & Geolocation Tracking – Traces attacker locations using tools like
WHOIS, Traceroute, and GeoIP lookup.
6. Intrusion Detection & Malware Analysis – Uses Intrusion Detection Systems (IDS)
like Snort and Suricata to detect malware, phishing, and botnet attacks.
7. Network Device Forensics – Examines routers, switches, and network appliances
to reconstruct attack scenarios.
1. Data Collection – Capturing logs and network traffic from servers, firewalls, and
endpoints using tools like Wireshark, Splunk.
2. Data Analysis – Examine logs and network packets for suspicious patterns. Identify
attack methods like brute-force attacks and DNS spoofing.
3. Timeline Reconstruction – Correlate timestamps from logs and network events.
Understand when and how an attack happened.
4. Attribution & Reporting – Identifying the source of attacks (IP tracing, malware
signatures)and generating reports for legal action.
Conclusion:
Network investigations are critical for detecting cyber threats, recovering evidence, and
improving cybersecurity.
Server roles
A server role defines the specific function a server performs within a network.
Definition: Server roles define the primary function of a Windows Server within a network.
Common Roles:
● Active Directory Domain Services (AD DS) – Manages domain authentication and
policies
● DNS Server – Resolves domain names
● DHCP Server – Assigns IP addresses dynamically
● File/Print Server – Shares files and printers
● Web Server (IIS) – Hosts websites/applications
Windows Server Roles
Windows servers are widely used in enterprise environments, supporting Active Directory, file
sharing, and web services.
✔ Active Directory Domain Services (AD DS) – Manages users, groups, and authentication.
✔ File Server – Provides centralized file storage and sharing.
✔ Web Server (IIS) – Hosts websites and applications.
✔ DNS Server – Translates domain names into IP addresses.
✔ DHCP Server – Assigns IP addresses dynamically.
✔ Mail Server (Microsoft Exchange) – Handles corporate emails.
✔ SQL Server – Manages and processes databases.
✔ Remote Desktop Services (RDS) – Enables remote access to applications..
Linux servers are known for stability, security, and open-source flexibility.
Server analysis
Tools:
Overall summary
Windows Registry,
Definition
The Windows Registry is like a settings database for your computer. It stores information
about how Windows and installed programs should work
(or) A hierarchical database that stores low-level OS and application settings.
Key Paths:
● HKEY_LOCAL_MACHINE (HKLM)
● HKEY_CURRENT_USER (HKCU)
Function:
Tools:
Why is it Important?
✔ HKEY_USERS (HKU) – Stores user-specific settings for all users on the system.
Unlike Windows, Linux does not have a centralized registry. Instead, it stores system and
user configurations in text-based configuration files.
Event logs record system activities, security events, and errors, helping administrators and
forensic analysts troubleshoot and investigate issues.
Windows Event Logs
Definition: Logs that record system, application, and security events.
Types:
Function:
Windows logs events using Event Viewer (eventvwr.msc), which categorizes logs into
different sections.
✅ System Logs record OS-related events such as hardware issues, driver failures, and
shutdowns. These logs are useful for troubleshooting system crashes and performance issues.
✅ Security Logs track logins, failed login attempts, and access control changes. They are
critical for intrusion detection and compliance auditing.
✅ Application Logs store events from installed applications, including software crashes and
updates. These logs help diagnose program failures and compatibility issues.
✅ Setup Logs record Windows installation and update activities. They are useful for
troubleshooting failed updates or installations.
✅ Forwarded Logs collect logs from remote computers for centralized monitoring.
> Access Windows Logs:
Open Run (Win + R) → Type eventvwr → Press Enter
Use PowerShell (Get-EventLog or Get-WinEvent) for log analysis.
🔹 Definition:
A file system manages how data is stored and retrieved. Linux uses various file systems.
🔹 Features:
● Inodes: Store metadata (permissions, timestamps, etc.)
● Journaling (ext3/ext4): Logs changes before applying them (useful for recovery).
● Mount Points: Attach file systems to directories.
● Permissions & Ownership: Controls access (user/group/others).
🔹 Tools:
extundelete, debugfs, fsstat, fls, blkls (TSK tools)
Autopsy or sleuthkit for timeline creation and file recovery
🔹 Definition:
Configuration files control the behavior of services, users, permissions, and startup processes
in a Linux server.
🔹 Features:
● /etc/passwd, /etc/shadow: User info and password hashes.
● /etc/ssh/sshd_config: SSH settings.
● /etc/sudoers: Privilege escalation.
● Crontab Files: Scheduled tasks (may indicate persistence).
● Systemd and init.d: Manage system services and startup scripts.
🔹 Forensic Function:
● Detect unauthorized users or changes.
● Identify privilege escalation paths.
● Spot persistence mechanisms (cron jobs, rc.local, systemd services).
● Analyze service configurations for security issues.
3️⃣ Linux Artifacts
🔹 Definition:
Artifacts are traces left by user/system activity, useful in forensic investigations.
🔹 Features:
● Bash History: ~/.bash_history
● Login Records: last, who, w, lastlog
● Log Files: /var/log/auth.log, /var/log/syslog, /var/log/messages
● Process Info: /proc, ps, top
● Package Info: /var/log/apt/history.log, dpkg, rpm
🔹 Forensic Function:
● Reconstruct user activity.
● Identify intrusion attempts or suspicious logins.
● Detect unauthorized processes or network activity.
● Trace file changes and application installs.
Definition: Apache is one of the most widely used open-source web servers. Forensics focuses
on investigating attacks or misuse of web services hosted using Apache.
(or) Apache is a widely used web server on Linux. Forensics involves analyzing logs and
configurations for attack traces.
🔑 Key Features:
● Access Logs (/var/log/apache2/access.log or
/var/log/httpd/access_log)
○ Records every HTTP request made to the server (IP, URL, timestamp, status
code, user agent).
● Error Logs (/var/log/apache2/error.log)
○ Captures server-side issues, misconfigurations, script errors.
● .htaccess files
○ Local directory access rules—can be abused to hide malware or redirect
requests.
● Config Files (/etc/apache2/apache2.conf, httpd.conf)
○ Defines virtual hosts, directories, ports, and modules.
Forensic Functions:
● Detect attacks:
○ SQL injection, XSS, path traversal, log poisoning, file uploads.
● Log Analysis:
○ Find anomalies in user-agents, IPs, or repetitive request patterns.
● Backdoor Traces:
○ Look for unusual .php, .cgi, or .pl files in web directories.
● Check for web shells:
○ Files like cmd.php, shell.php, etc.
● Timeline Creation:
○ Reconstruct attacker steps from logs
🔹 Definition:
LAMP is a popular stack for web applications. Forensics involves analyzing all components for
compromise signs. (or)
● Linux:
○ System logs, bash history, file changes.
● Apache:
○ Access/Error logs, configuration, .htaccess, suspicious scripts.
● MySQL:
○ Query history, database dumps, logs (/var/log/mysql/error.log).
● PHP:
○ Application code, logs (/var/log/php_errors.log), suspicious eval/exec
commands.
Forensic Functions:
🔹 Definition:
SMB (Server Message Block) is used for file and printer sharing, implemented on Linux using
Samba. (or)
SMB (Server Message Block) is a file-sharing protocol originally from Windows. On Linux, it's
implemented using Samba to allow sharing files/folders over a network.
Key Components:
Forensic Functions: