SlideShare a Scribd company logo
2
Most read
3
Most read
11
Most read
NETWORK FORENSICS
Network Forensics Overview
 Network forensics
 Process of collecting and analyzing raw network data and
tracking network traffic
 To ascertain how an attack was carried out or how an event
occurred on a network
 Intruders leave a trail behind
 Knowing your network’s typical traffic patterns is important in
spotting variations in network traffic
The Need for Established Procedures
 Network forensics examiners must establish standard
procedures for how to acquire data after an attack or
intrusion
 Essential to ensure that all comprised systems have been found
 Procedures must be based on an organization’s needs
and complement network infrastructure
 NIST created “Guide to Integrating Forensic Techniques
into Incident Response” to address these needs
Securing a Network
 Layered network defense strategy
 Sets up layers of protection to hide the most valuable data at the
innermost part of the network
 Defense in depth (DiD)
 Similar approach developed by the NSA
 Modes of protection
 People
 Technology
 Operations
Securing a Network
 Testing networks is as important as testing servers
 You need to be up to date on the latest methods intruders
use to infiltrate networks
 As well as methods internal employees use to sabotage
networks
 Small companies of fewer than 10 employees often don’t
consider security precautions against internal threats
necessary
 Can be more susceptible to problems caused by employees
revealing proprietary information
Developing Procedures for Network Forensics
 Network forensics can be a long, tedious process
 Standard procedure that is often used:
 Always use a standard installation image for systems on a
network
 Fix any vulnerability after an attack
 Attempt to retrieve all volatile data
 Acquire all compromised drives
 Compare files on the forensic image to the original installation
image
Developing Standard Procedures for Network
Forensics
 In digital forensics
 You can work from the image to find most of the deleted or
hidden files and partitions
 In network forensics
 You have to restore drives to understand attack
 Work on an isolated system
 Prevents malware from affecting other systems
Reviewing Network Logs
 Network logs record ingoing and outgoing
traffic
 Network servers
 Routers
 Firewalls
 Tcpdump and Wireshark - tools for
examining network traffic
 Can generate top 10 lists
 Can identify patterns
Using Network Tools
 Sysinternals
 A collection of free tools for examining Windows products
 Examples of the Sysinternals tools:
 RegMon shows Registry data in real time
 Process Explorer shows what is loaded
 Handle shows open files and processes using them
 Filemon shows file system activity
Using Network Tools
 Tools from PsTools suite created by
Sysinternals
 PsExec runs processes remotely
 PsGetSid displays security identifier (SID)
 PsKill kills process by name or ID
 PsList lists details about a process
 PsLoggedOn shows who’s logged locally
 PsPasswd changes account passwords
 PsService controls and views services
 PsShutdown shuts down and restarts PCs
 PsSuspend suspends processes
Using Packet Nalyzers
 Packet analyzers
 Devices or software that monitor network traffic
 Most work at layer 2 or 3 of the OSI model
 Most tools follow the Pcap (packet capture) format
 Some packets can be identified by examining the flags in their
TCP headers
 Tools
 Tcpdump
 Tshark
 Netflow
 Wireshark
Examining the Honeynet Project
 The Honeynet Project was developed to make information widely
available in an attempt to thwart Internet and network hackers
 Objectives are awareness, information, and tools
 Distributed denial-of-service (DDoS) attacks
 Hundreds or even thousands of machines (zombies) can be used
 Zero day attacks
 Another major threat
 Attackers look for holes in networks and OSs and exploit these weaknesses
before patches are available
 Honeypot
 Normal looking computer that lures attackers to it
 Honeywalls
 Monitor what’s happening to honeypots on your network and record what
attackers are doing
Summary
 Network forensics is the process of collecting
and analyzing raw network data and
systematically tracking network traffic to
ascertain how an attack took place
 Steps must be taken to harden networks
before a security breach happens
 Being able to spot variations in network traffic
can help you track intrusions
 Several tools are available for monitoring
network traffic, such as packet analyzers and
honeypots
 The Honeynet Project is designed to help
people learn the latest intrusion techniques that
attackers are using

More Related Content

PPTX
Network forensic
PPTX
Windows Forensic 101
PPTX
Network Miner Network forensics
PDF
CS6004 Cyber Forensics
PPTX
Network security (vulnerabilities, threats, and attacks)
PDF
Automatic Irrigation System Project Report
PPTX
Network forensics and investigating logs
PPTX
VAPT - Vulnerability Assessment & Penetration Testing
Network forensic
Windows Forensic 101
Network Miner Network forensics
CS6004 Cyber Forensics
Network security (vulnerabilities, threats, and attacks)
Automatic Irrigation System Project Report
Network forensics and investigating logs
VAPT - Vulnerability Assessment & Penetration Testing

What's hot (20)

PPTX
Digital forensic tools
PPTX
Email investigation
PPTX
Mobile Forensics
PPTX
Computer forensics toolkit
PPTX
Digital forensics
PDF
Incident response methodology
PPTX
mobile forensic.pptx
PPT
Mobile forensics
PPTX
Digital forensics
PDF
01 Computer Forensics Fundamentals - Notes
PPTX
Cyber Forensics Overview
PPTX
Memory forensics
PDF
Network Forensic
PPT
Preserving and recovering digital evidence
PPTX
Incident response process
PDF
Cloud-forensics
PPT
Introduction to computer forensic
PPTX
Memory forensics.pptx
PDF
Wired and Wireless Network Forensics
PPTX
Digital Evidence by Raghu Khimani
Digital forensic tools
Email investigation
Mobile Forensics
Computer forensics toolkit
Digital forensics
Incident response methodology
mobile forensic.pptx
Mobile forensics
Digital forensics
01 Computer Forensics Fundamentals - Notes
Cyber Forensics Overview
Memory forensics
Network Forensic
Preserving and recovering digital evidence
Incident response process
Cloud-forensics
Introduction to computer forensic
Memory forensics.pptx
Wired and Wireless Network Forensics
Digital Evidence by Raghu Khimani
Ad

Viewers also liked (17)

PPTX
Virtual Machine Forensics
PPT
P2P Forensics
PPTX
Oracle DBA Online Training in India
PDF
Bigtable and Boxwood
PPT
B-link-tree
PPT
Top 10 Oracle SQL tuning tips
PPT
1.9 b tree
PPT
Tpr star tree
PDF
Лекция 5: B-деревья (B-trees, k-way merge sort)
ZIP
Algorithm Introduction #18 B-Tree
PPTX
Web Browser Artifacts
PPTX
CAD: introduction to floorplanning
PPT
floor planning
PPTX
Social Media Forensics for Investigators
PPTX
Examining Mac File Structures
PPT
17. Trees and Graphs
Virtual Machine Forensics
P2P Forensics
Oracle DBA Online Training in India
Bigtable and Boxwood
B-link-tree
Top 10 Oracle SQL tuning tips
1.9 b tree
Tpr star tree
Лекция 5: B-деревья (B-trees, k-way merge sort)
Algorithm Introduction #18 B-Tree
Web Browser Artifacts
CAD: introduction to floorplanning
floor planning
Social Media Forensics for Investigators
Examining Mac File Structures
17. Trees and Graphs
Ad

Similar to Network Forensics (20)

PDF
Network forensics
PPTX
Cyber warfare introduction
DOCX
4777.team c.final
PPT
Data Mining and Intrusion Detection
PPTX
Penetration testing
 
PDF
Intrusion_Detection_By_loay_elbasyouni
PPTX
First Responders Course - Session 4 - Forensic Readiness [2004]
PDF
Intrusion detection
PPT
Chapter 12
DOCX
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
PPTX
Intrusion Detection System(IDS)
PPT
Modul 4 Intrusion Detection System IDS.ppt
PPTX
Enchaning system effiency through process scanning
PDF
Module 3.Infrastructure and Network Security:
PPT
Introduction To Information Security
PPTX
Final project.ppt
PPTX
Understanding Intrusion Detection & Prevention Systems (1).pptx
PPTX
Ethical hacking Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
PDF
Comparative Analysis: Network Forensic Systems
Network forensics
Cyber warfare introduction
4777.team c.final
Data Mining and Intrusion Detection
Penetration testing
 
Intrusion_Detection_By_loay_elbasyouni
First Responders Course - Session 4 - Forensic Readiness [2004]
Intrusion detection
Chapter 12
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Intrusion Detection System(IDS)
Modul 4 Intrusion Detection System IDS.ppt
Enchaning system effiency through process scanning
Module 3.Infrastructure and Network Security:
Introduction To Information Security
Final project.ppt
Understanding Intrusion Detection & Prevention Systems (1).pptx
Ethical hacking Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
Comparative Analysis: Network Forensic Systems

More from primeteacher32 (20)

PPT
Software Development Life Cycle
PPTX
Variable Scope
PPTX
Returning Data
PPTX
Intro to Functions
PPTX
Introduction to GUIs with guizero
PPTX
Function Parameters
PPTX
Nested Loops
PPT
Conditional Loops
PPTX
Introduction to Repetition Structures
PPTX
Input Validation
PPTX
Windows File Systems
PPTX
Nesting Conditionals
PPTX
Conditionals
PPT
Intro to Python with GPIO
PPTX
Variables and Statements
PPTX
Variables and User Input
PPT
Intro to Python
PPTX
Raspberry Pi
PPT
Hardware vs. Software Presentations
PPTX
Block chain security
Software Development Life Cycle
Variable Scope
Returning Data
Intro to Functions
Introduction to GUIs with guizero
Function Parameters
Nested Loops
Conditional Loops
Introduction to Repetition Structures
Input Validation
Windows File Systems
Nesting Conditionals
Conditionals
Intro to Python with GPIO
Variables and Statements
Variables and User Input
Intro to Python
Raspberry Pi
Hardware vs. Software Presentations
Block chain security

Recently uploaded (20)

PDF
シュアーイノベーション採用ピッチ資料|Company Introduction & Recruiting Deck
PPTX
normal_menstrual_cycle_,,physiology.PPTX
PPTX
1-4 Chaptedjkfhkshdkfjhalksjdhfkjshdljkfhrs.pptx
PDF
HR Jobs in Jaipur: 2025 Trends, Banking Careers & Smart Hiring Tools
PPTX
Nervous_System_Drugs_PPT.pptxXXXXXXXXXXXXXXXXX
PDF
Prostaglandin E2.pdf orthoodontics op kharbanda
PDF
esg-supply-chain-webinar-nov2018hkhkkh.pdf
PPTX
The Stock at arrangement the stock and product.pptx
PDF
313302 DBMS UNIT 1 PPT for diploma Computer Eng Unit 2
PPTX
1751884730-Visual Basic -Unitj CS B.pptx
PPTX
microtomy kkk. presenting to cryst in gl
DOC
field study for teachers graduating samplr
PDF
Understanding the Rhetorical Situation Presentation in Blue Orange Muted Il_2...
PDF
Manager Resume for R, CL & Applying Online.pdf
PPTX
Sports and Dance -lesson 3 powerpoint presentation
PDF
Josh Gao Strength to Strength Book Summary
PPT
Gsisgdkddkvdgjsjdvdbdbdbdghjkhgcvvkkfcxxfg
PPTX
Overview Planner of Soft Skills in a single ppt
PPTX
cse couse aefrfrqewrbqwrgbqgvq2w3vqbvq23rbgw3rnw345
PPTX
chapter 3_bem.pptxKLJLKJLKJLKJKJKLJKJKJKHJH
シュアーイノベーション採用ピッチ資料|Company Introduction & Recruiting Deck
normal_menstrual_cycle_,,physiology.PPTX
1-4 Chaptedjkfhkshdkfjhalksjdhfkjshdljkfhrs.pptx
HR Jobs in Jaipur: 2025 Trends, Banking Careers & Smart Hiring Tools
Nervous_System_Drugs_PPT.pptxXXXXXXXXXXXXXXXXX
Prostaglandin E2.pdf orthoodontics op kharbanda
esg-supply-chain-webinar-nov2018hkhkkh.pdf
The Stock at arrangement the stock and product.pptx
313302 DBMS UNIT 1 PPT for diploma Computer Eng Unit 2
1751884730-Visual Basic -Unitj CS B.pptx
microtomy kkk. presenting to cryst in gl
field study for teachers graduating samplr
Understanding the Rhetorical Situation Presentation in Blue Orange Muted Il_2...
Manager Resume for R, CL & Applying Online.pdf
Sports and Dance -lesson 3 powerpoint presentation
Josh Gao Strength to Strength Book Summary
Gsisgdkddkvdgjsjdvdbdbdbdghjkhgcvvkkfcxxfg
Overview Planner of Soft Skills in a single ppt
cse couse aefrfrqewrbqwrgbqgvq2w3vqbvq23rbgw3rnw345
chapter 3_bem.pptxKLJLKJLKJLKJKJKLJKJKJKHJH

Network Forensics

  • 2. Network Forensics Overview  Network forensics  Process of collecting and analyzing raw network data and tracking network traffic  To ascertain how an attack was carried out or how an event occurred on a network  Intruders leave a trail behind  Knowing your network’s typical traffic patterns is important in spotting variations in network traffic
  • 3. The Need for Established Procedures  Network forensics examiners must establish standard procedures for how to acquire data after an attack or intrusion  Essential to ensure that all comprised systems have been found  Procedures must be based on an organization’s needs and complement network infrastructure  NIST created “Guide to Integrating Forensic Techniques into Incident Response” to address these needs
  • 4. Securing a Network  Layered network defense strategy  Sets up layers of protection to hide the most valuable data at the innermost part of the network  Defense in depth (DiD)  Similar approach developed by the NSA  Modes of protection  People  Technology  Operations
  • 5. Securing a Network  Testing networks is as important as testing servers  You need to be up to date on the latest methods intruders use to infiltrate networks  As well as methods internal employees use to sabotage networks  Small companies of fewer than 10 employees often don’t consider security precautions against internal threats necessary  Can be more susceptible to problems caused by employees revealing proprietary information
  • 6. Developing Procedures for Network Forensics  Network forensics can be a long, tedious process  Standard procedure that is often used:  Always use a standard installation image for systems on a network  Fix any vulnerability after an attack  Attempt to retrieve all volatile data  Acquire all compromised drives  Compare files on the forensic image to the original installation image
  • 7. Developing Standard Procedures for Network Forensics  In digital forensics  You can work from the image to find most of the deleted or hidden files and partitions  In network forensics  You have to restore drives to understand attack  Work on an isolated system  Prevents malware from affecting other systems
  • 8. Reviewing Network Logs  Network logs record ingoing and outgoing traffic  Network servers  Routers  Firewalls  Tcpdump and Wireshark - tools for examining network traffic  Can generate top 10 lists  Can identify patterns
  • 9. Using Network Tools  Sysinternals  A collection of free tools for examining Windows products  Examples of the Sysinternals tools:  RegMon shows Registry data in real time  Process Explorer shows what is loaded  Handle shows open files and processes using them  Filemon shows file system activity
  • 10. Using Network Tools  Tools from PsTools suite created by Sysinternals  PsExec runs processes remotely  PsGetSid displays security identifier (SID)  PsKill kills process by name or ID  PsList lists details about a process  PsLoggedOn shows who’s logged locally  PsPasswd changes account passwords  PsService controls and views services  PsShutdown shuts down and restarts PCs  PsSuspend suspends processes
  • 11. Using Packet Nalyzers  Packet analyzers  Devices or software that monitor network traffic  Most work at layer 2 or 3 of the OSI model  Most tools follow the Pcap (packet capture) format  Some packets can be identified by examining the flags in their TCP headers  Tools  Tcpdump  Tshark  Netflow  Wireshark
  • 12. Examining the Honeynet Project  The Honeynet Project was developed to make information widely available in an attempt to thwart Internet and network hackers  Objectives are awareness, information, and tools  Distributed denial-of-service (DDoS) attacks  Hundreds or even thousands of machines (zombies) can be used  Zero day attacks  Another major threat  Attackers look for holes in networks and OSs and exploit these weaknesses before patches are available  Honeypot  Normal looking computer that lures attackers to it  Honeywalls  Monitor what’s happening to honeypots on your network and record what attackers are doing
  • 13. Summary  Network forensics is the process of collecting and analyzing raw network data and systematically tracking network traffic to ascertain how an attack took place  Steps must be taken to harden networks before a security breach happens  Being able to spot variations in network traffic can help you track intrusions  Several tools are available for monitoring network traffic, such as packet analyzers and honeypots  The Honeynet Project is designed to help people learn the latest intrusion techniques that attackers are using