CF
CF
FROM: TO:
Himanshu AMAR SARASWAT
2201830014 ASSISTANT
PROFESSOR
School of Engineering & Technology
K.R. Mangalam University, Gurugram (Haryana)
Network forensics
Network forensics is the process of capturing,
recording, and analyzing network events to
uncover the source of security incidents or
unauthorized activity.
Packet Capture
• Purpose: Capturing network packets provides a detailed view of the data
being transmitted across the network, including the content of
communications and the metadata.
• Tools: Tools like Wireshark, tcpdump, and NetworkMiner are commonly
used for capturing packets. .
Techniques
1. Full Packet Capture: Capturing every packet that passes through a
network interface. This method is data-intensive but provides the most
comprehensive view.
2. Selective Capture: Capturing only traffic related to specific protocols, IP
addresses, or ports to focus on relevant data.
Log Collection
• Purpose: Logs from network devices, servers, and applications provide records of events and
activities, which are crucial for understanding what happened on the network.
• Routers and Firewalls: These devices log traffic flow, access control events, and potential
intrusions. Router and firewall logs can indicate attempted breaches or unusual traffic patterns.
• Switches: Logs from switches can provide information on network traffic at the data link layer,
including MAC addresses and VLAN activity.
• Servers and Endpoints: Logs from operating systems, applications, and security software can
provide additional context for network activities.
Network Flow Data
• Purpose: Network flow data provides a high-level summary
of traffic patterns, including information about
communication between IP addresses and ports over time.
Types:
• NetFlow: Developed by Cisco, NetFlow records information
about IP traffic flows, such as source/destination IP
addresses, ports, and protocols.
Examples:
• ARP Tables: Show the mapping between IP addresses and MAC
addresses, which can help identify devices on the network.
• DNS Logs: Record DNS queries and responses, which can be used to
track domain lookups and identify potential command and control (C2)
communications in malware infections.
Network Device Configuration Files
• Purpose: Configuration files from routers, switches, and
firewalls can provide evidence of how a network was set up,
including security policies, access control lists (ACLs), and
routing protocols.
• Techniques:
• Traffic Logs: Routers can log data about the traffic that passes
through them, including source and destination IP addresses,
ports, and protocols used.
The Hypertext Transfer Protocol (HTTP) is the foundation of the World Wide
Web, and is used to load webpages using hypertext links.
HTTP is an application layer protocol designed to transfer information
between networked devices and runs on top of other layers of the network
protocol stack.
HTTPS
• This makes ICMP an important aspect of the error reporting process and
testing to see how well a network is transmitting data.
SNMP (Simple Network Management Protocol):
• Simple Network Management Protocol
(SNMP) is a widely used protocol for
network management that provides a
standardized framework for monitoring and
managing network devices such as
routers, switches, servers, and printers.
• Signature-Based Detection:
Using known patterns of malicious traffic for specific protocols (e.g., exploit
signatures, malware C2 communication) to detect threats.
Encrypted Traffic and Forensics
• Challenges:
Encryption (e.g., SSL/TLS) can obscure payloads, making it difficult to
inspect the content of communications.
• Analysis Techniques:
Metadata Inspection: Analyzing unencrypted portions like headers,
certificates, and handshake messages for anomalies.
• Identifying Attacks:
• Protocol analysis can reveal various types of attacks, including:
• Man-in-the-Middle (MITM):
Interception of communications.
Using Network Protocols for Incident Response
• tcpdump:
Command-line packet analyzer for capturing and analyzing network packets.
Useful for quick analysis and scripting.
Tools for Protocol Analysis
• Snort/Suricata:
Network intrusion detection systems (NIDS) that use predefined
rules to detect malicious activity at the protocol level.
• Bro/Zeek:
A network analysis framework that provides high-level analysis of
network traffic, including protocol analysis and anomaly
detection.
Case Studies and Examples
• Malware Communication:
How malware uses protocols like HTTP/HTTPS or DNS for C2
communication, avoiding detection by mimicking normal traffic.
• Data Exfiltration:
Use of protocols such as FTP or HTTP to exfiltrate sensitive data from the
network, often hidden within legitimate-looking traffic.
• Encryption and Privacy: Balancing the need for deep inspection with
privacy concerns and encryption challenges.