SlideShare a Scribd company logo
Chapter 12
Searching the Network
1
Purpose of Investigation
Internal investigations
Misuse of company resources
Penetration analysis
Intrusion detection
Scope of the Investigation
Local area networks
Application Service Providers (ASP)
Cloud computing
Initial Response
Identify the actual problem
Decide on an action
Should the connections be broken or back-traced?
Is conviction worth the risk of data loss?
Lock down a time frame
Isolate the source of the nefarious activity
Identify the potential suspect(s)
Point of a Response Plan
Have a list of IT personnel available
Have tools in place for analyzing network activity
Prepare secure lines of communication that can’t be tapped
Create and test a plan of action for returning systems to normal
Have a good review process in place
When to do Proactive Collection
Current and ongoing intrusions
Ongoing theft of data
Misuse of company resources
Suspicion of data export
Internal systems may have been compromised
When ascertaining whether malicious software has been
embedded in the system
To determine how the intrusion was accomplished
Proactive Methods
Keyloggers
Can be hardware or software based
May be subject to legal challenge
System auditing
Know what to audit and how
Collect audit logs before they are automatically deleted
Network Capture
Determining authenticity
Proxy servers alter IP addresses
Onion routing encapsulates original packets
IP spoofing rewrites the originating IP address
Identifying traffic
Narrow the range of targeted traffic
Identify a specific acquisition window
Performing a Network Capture
Put network interface into promiscuous mode
Configure utility (such as Wireshark) to collect packets
Identify and configure a storage pool for captured traffic
Analyzing the Capture
Protocol identification
IP address inventory
Message sessionizing
A to B
B to A
A or B to any
Collecting Live Connection Data
A small batch file can collect:
Time/data information
NetBIOS connections
User statistics
File shares open
Open sessions
Collect information only as it currently exists
Post Incident Collection
Event logs
Application log
Security log
System log
Application logs (not Windows)
Router and Switch Forensics
Don’t analyze device over network
Enable logging before connecting to the device
Record all volatile information first
Record time-date stamps
Router Data to Collect
Router OS
Router logs
Startup and running configurations
Routing tables
Access lists
NAT translation tables
List of interfaces

More Related Content

PPT
Chapter 2
PPT
Ethical Hacking
PPT
Ethical hacking
PPT
Network forensics1
ODP
Unlock Security Insight from Machine Data
PPTX
Network scan
PPT
Introduction To Information Security
PPTX
Penetration testing
 
Chapter 2
Ethical Hacking
Ethical hacking
Network forensics1
Unlock Security Insight from Machine Data
Network scan
Introduction To Information Security
Penetration testing
 

Similar to Chapter 12Searching the Network1Purpose of Inves.docx (20)

PPTX
Intrusion detection system
PDF
Cisel1 d
PPTX
DC612 Day - Hands on Penetration Testing 101
PPTX
Examining computer and evidence collection
PDF
What is ethical hacking and complete cyber security presentation on this file
PDF
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
PPTX
Network Reconnaissance for Cybersecurity
PPTX
Anatomy Of Hack
PDF
Network Vulnerability and Patching
PPTX
Cyber warfare introduction
PPTX
Introduction to cyber forensics
PPTX
Network Forensics
PPTX
J_McConnell_LabReconnaissance
PPT
Meletis Belsis - Introduction to information security
PPTX
cyberforensicsv2-191113184409.pptx
PPTX
Forensic tools
PPT
Securitych1
PPTX
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
PPT
Hacking Fundamentals - Jen Johnson , Miria Grunick
DOCX
4777.team c.final
Intrusion detection system
Cisel1 d
DC612 Day - Hands on Penetration Testing 101
Examining computer and evidence collection
What is ethical hacking and complete cyber security presentation on this file
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
Network Reconnaissance for Cybersecurity
Anatomy Of Hack
Network Vulnerability and Patching
Cyber warfare introduction
Introduction to cyber forensics
Network Forensics
J_McConnell_LabReconnaissance
Meletis Belsis - Introduction to information security
cyberforensicsv2-191113184409.pptx
Forensic tools
Securitych1
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
Hacking Fundamentals - Jen Johnson , Miria Grunick
4777.team c.final

More from keturahhazelhurst (20)

DOCX
1. The ALIVE status of each SEX. (SEX needs to be integrated into th.docx
DOCX
1. Some potentially pathogenic bacteria and fungi, including strains.docx
DOCX
1. Terrestrial Planets                           2. Astronomical.docx
DOCX
1. Taking turns to listen to other students is not always easy f.docx
DOCX
1. The main characters names in The Shape of Things are Adam and E.docx
DOCX
1. Select one movie from the list belowShutter Island (2010; My.docx
DOCX
1. Select a system of your choice and describe the system life-cycle.docx
DOCX
1. Sensation refers to an actual event; perception refers to how we .docx
DOCX
1. The Institute of Medicine (now a renamed as a part of the N.docx
DOCX
1. The Documentary Hypothesis holds that the Pentateuch has a number.docx
DOCX
1. Search the internet and learn about the cases of nurses Julie.docx
DOCX
1. Search the internet and learn about the cases of nurses Julie Tha.docx
DOCX
1. Review the three articles about Inflation that are found below th.docx
DOCX
1. Review the following request from a customerWe have a ne.docx
DOCX
1. Research risk assessment approaches.2. Create an outline .docx
DOCX
1. Research has narrowed the thousands of leadership behaviors into .docx
DOCX
1. Research Topic Super Computer Data MiningThe aim of this.docx
DOCX
1. Research and then describe about The Coca-Cola Company primary bu.docx
DOCX
1. Prepare a risk management plan for the project of finding a job a.docx
DOCX
1. Please define the term social class. How is it usually measured .docx
1. The ALIVE status of each SEX. (SEX needs to be integrated into th.docx
1. Some potentially pathogenic bacteria and fungi, including strains.docx
1. Terrestrial Planets                           2. Astronomical.docx
1. Taking turns to listen to other students is not always easy f.docx
1. The main characters names in The Shape of Things are Adam and E.docx
1. Select one movie from the list belowShutter Island (2010; My.docx
1. Select a system of your choice and describe the system life-cycle.docx
1. Sensation refers to an actual event; perception refers to how we .docx
1. The Institute of Medicine (now a renamed as a part of the N.docx
1. The Documentary Hypothesis holds that the Pentateuch has a number.docx
1. Search the internet and learn about the cases of nurses Julie.docx
1. Search the internet and learn about the cases of nurses Julie Tha.docx
1. Review the three articles about Inflation that are found below th.docx
1. Review the following request from a customerWe have a ne.docx
1. Research risk assessment approaches.2. Create an outline .docx
1. Research has narrowed the thousands of leadership behaviors into .docx
1. Research Topic Super Computer Data MiningThe aim of this.docx
1. Research and then describe about The Coca-Cola Company primary bu.docx
1. Prepare a risk management plan for the project of finding a job a.docx
1. Please define the term social class. How is it usually measured .docx

Recently uploaded (20)

PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Cell Structure & Organelles in detailed.
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Classroom Observation Tools for Teachers
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Complications of Minimal Access Surgery at WLH
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Institutional Correction lecture only . . .
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
RMMM.pdf make it easy to upload and study
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
Anesthesia in Laparoscopic Surgery in India
Cell Structure & Organelles in detailed.
O7-L3 Supply Chain Operations - ICLT Program
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Classroom Observation Tools for Teachers
Final Presentation General Medicine 03-08-2024.pptx
human mycosis Human fungal infections are called human mycosis..pptx
Complications of Minimal Access Surgery at WLH
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
Institutional Correction lecture only . . .
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
RMMM.pdf make it easy to upload and study
202450812 BayCHI UCSC-SV 20250812 v17.pptx
O5-L3 Freight Transport Ops (International) V1.pdf
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
102 student loan defaulters named and shamed – Is someone you know on the list?

Chapter 12Searching the Network1Purpose of Inves.docx

  • 1. Chapter 12 Searching the Network 1 Purpose of Investigation Internal investigations Misuse of company resources Penetration analysis Intrusion detection Scope of the Investigation Local area networks Application Service Providers (ASP) Cloud computing Initial Response Identify the actual problem Decide on an action Should the connections be broken or back-traced? Is conviction worth the risk of data loss? Lock down a time frame Isolate the source of the nefarious activity Identify the potential suspect(s) Point of a Response Plan
  • 2. Have a list of IT personnel available Have tools in place for analyzing network activity Prepare secure lines of communication that can’t be tapped Create and test a plan of action for returning systems to normal Have a good review process in place When to do Proactive Collection Current and ongoing intrusions Ongoing theft of data Misuse of company resources Suspicion of data export Internal systems may have been compromised When ascertaining whether malicious software has been embedded in the system To determine how the intrusion was accomplished Proactive Methods Keyloggers Can be hardware or software based May be subject to legal challenge System auditing Know what to audit and how Collect audit logs before they are automatically deleted Network Capture Determining authenticity Proxy servers alter IP addresses Onion routing encapsulates original packets IP spoofing rewrites the originating IP address Identifying traffic Narrow the range of targeted traffic Identify a specific acquisition window
  • 3. Performing a Network Capture Put network interface into promiscuous mode Configure utility (such as Wireshark) to collect packets Identify and configure a storage pool for captured traffic Analyzing the Capture Protocol identification IP address inventory Message sessionizing A to B B to A A or B to any Collecting Live Connection Data A small batch file can collect: Time/data information NetBIOS connections User statistics File shares open Open sessions Collect information only as it currently exists Post Incident Collection Event logs Application log Security log System log Application logs (not Windows) Router and Switch Forensics
  • 4. Don’t analyze device over network Enable logging before connecting to the device Record all volatile information first Record time-date stamps Router Data to Collect Router OS Router logs Startup and running configurations Routing tables Access lists NAT translation tables List of interfaces