Computer Forensics Module 8
Computer Forensics Module 8
www.quickheal.com
Introduction to Linux Forensics
Network forensics involves capturing and analyzing network traffic to identify security
incidents and potential attackers, aiding in the identification of attack vectors and
sources of breaches.
It plays a crucial role in detecting malicious activities, tracing attackers, and preventing
future incidents by helping investigators understand attack methods and vulnerabilities
exploited.
The complexity of network traffic and the need for detailed analysis make network
forensics a resource-intensive and challenging task, requiring significant time, tools, and
expertise for accurate results.
Network forensics can reveal the following information
Source of security incidents Intrusion techniques used by
attackers
Path of intrusion
Traces and evidence of the attack
Handles high-level protocols, issues of File Transfer (TFTP, FTP, NFS), Email
Servers/Desktops, Anti-virus, Business
representation, encoding, and dialog Application layer (SMTP), Network Management
Applications, Databases
control (SNMP), Name Management (DNS)
Event aggregation
Event masking
Steps in event
correlation: Event filtering
Cross-Platform Correlation
Same-Platform Correlation
This method is applied when
This method is used when all devices different operating systems and
in the network operate on the same hardware platforms are used within
OS, allowing for straightforward an organization's network, requiring
event analysis across the entire integration of diverse event data.
network.
Example: An organization with
Example: An organization running Windows-based client systems,
Microsoft Windows on all servers can Linux-based firewalls, and a Linux-
collect event logs and perform trend based email gateway must correlate
analysis on system behaviors using a events from all these different
single OS platform. platforms to detect issues across the
network.
Open-Port-Based Correlation: Correlates the list of open ports on a host with those
under attack, determining the likelihood of a successful attack based on exposed
services and potential vulnerabilities.
1. Red: Blocks connections per the security policy. Connection Dropped The firewall dropped a connection.
2. Orange: Marks suspicious but accepted traffic. Connection Encrypted The firewall encrypted a connection.
3. Blue: Represents accepted traffic. Connection Rejected The firewall rejected a connection.
Icons for Actions: The log viewer employs various A security event was monitored but not blocked due to the current
icons to represent actions like accepted connections, Connection Monitored
configuration.
blocked URLs, detected viruses, and more, offering
quick identification of events. URL Allowed The firewall allowed a URL.
Detailed Log Features: Check Point logs provide URL Filtered The firewall blocked a URL.
fields such as predefined and custom queries, time-
based search capabilities, log statistics, and detailed Virus Detected A virus was detected in an email.
result panes to streamline investigation.
Potential Spam Stamped An email was marked as potential spam.
Real-Time Analysis: The log viewer helps
investigators correlate activities like dropped Potential Spam Detected An email was rejected as potential spam.
connections or detected malware with potential threats
for actionable insights. Mail Allowed A non-spam email was logged.
2. Host Name
3. Program Name 1 2 3 4 5 6 7
4. Log Message
5. Username
6. Source IP Address
7. Port Number
Source:https://www.checkpoint.com
1. Date
2. Time
3. Source IP address
4. Source-port
5. URL accessed
6. URL IP address
7. Port Used
Informational 6 Informational messages 4 The system could not process the packet due to insufficient room for all desired
%SEC-4-TOOMANY
IP header options. The packet has been discarded.
Debug 7 Debugging messages
%IPV6-6-ACCESSLOGP 6 A packet matching the log criteria for the given access list was detected.
%IPV6-6-ACCESSLOGDP 6 A packet matching the log criteria for the given access list was detected.
%IPV6-6-ACCESSLOGNP 6 A packet matching the log criteria for the given access list was detected.
3. Status
4. Message
1. Logs
2. Fields Pane
3. Index Pattern
4. Search Bar
5. Time Filter
6. Time Interval
7. TOP Bar
Traffic Layer Focus: Packet sniffers primarily collect data from the
network and transport layers, excluding the physical and data link layers,
to focus on relevant evidence.
Monitoring Specific Ports: Filters can isolate traffic for specific ports or
IP addresses, such as tcp.port==23, ip.addr==192.168.1.100, or
combinations like ip.addr==192.168.1.100 && tcp.port==23.
Filter for HTTP GET Requests: The filter Filter for SMTP and ICMP Traffic: Use
http.request isolates all HTTP GET requests tcp.port eq 25 or icmp to isolate packets for
from captured traffic. SMTP (port 25) or ICMP traffic.
Active Sniffing: Active sniffing occurs over a switched network where attackers inject packets
to manipulate the switch’s ARP cache (CAM) and gain unauthorized access to network traffic.
Passive Sniffing: Passive sniffing is performed on a hub where the attacker captures all
broadcasted packets within the same collision domain without injecting any traffic.
Techniques Used: Common sniffing techniques include MAC flooding and ARP poisoning, which
allow attackers to intercept and analyze network traffic.
Detection with Wireshark: Investigators can use Wireshark to detect signs of sniffing
attempts, including unusual ARP requests or MAC address anomalies, which may indicate MAC
flooding or ARP poisoning.
NetFlow-enabled Device
Traffic flow Traffic flow
Traffic
Nagios Network
Analyzer
https://www.nagios.com
Auvik
https://www.auvik.com
Free Network
Analyzer
https://freenetworkanalyzer
.com
CapLoader
https://www.netresec.com
https://www.datadoghq Elastic
.com
LogRhythm https://www.elastic.
Other SIEM co
https://logrhythm.co
Tools: m
Datadog Cloud
SIEM
Splunk Alerts: Tools like Splunk can trigger alerts Event Investigation: After detecting a brute-force
when a significant number of failed login attempts attack, examine event details such as the host name,
are detected, such as 15 or more failed attempts, source IP, account name, and time stamps to gather
signaling a possible brute-force attack. more context and identify the nature of the attack.
Examine IP Addresses and Ports: Investigate the Search Queries for Further Investigation: Use search
specific IP addresses and ports involved in the attack by queries in SIEM tools to further analyze the traffic and pinpoint
examining the pcap file in Wireshark, and identify unusual the attack source, such as detecting abnormal traffic patterns
traffic, such as high volume traffic from a single client IP to between specific IP addresses and ports, as seen with the client
a server IP on non-standard ports. IP 10.10.10.10 sending traffic to port 63657 on the server IP.
Identify Active Connections: Identify active Measure Signal Strength: Determine the
connections and collect details such as IP signal strength of access points using tools
addresses, MAC addresses, SSIDs, and signal like NetSpot to map network infrastructure
levels using tools like Wi-Fi Scanner, enabling and pinpoint access point locations, assisting
investigators to map network traffic. in visualizing the network layout.
Connect to the Suspected Wireless Sniff and Analyze Packets: Use tools like
Network: Connect the forensic workstation to Wireshark to capture and analyze network
the compromised network after determining packets, extracting relevant artifacts like
signal strength to begin capturing network source/destination IPs, ports, protocols, and
traffic, facilitating the collection of relevant timestamps, crucial for identifying suspicious
data. activities.
com rk.co
We explored Linux memory analysis techniques to gather valuable insights from system memory.
The module also discussed Mac forensics, including data collection from macOS systems.
Mac memory forensics and tools were examined to understand how to analyze volatile data in
macOS.
In the next module, we will focus on detailed techniques for performing network forensics.