ISDF_Network_Forensics
ISDF_Network_Forensics
Experiment/assignment / tutorial
No. 3
Grade: AA / AB / BB / BC / CC / CD /DD
Experiment No.: 3
Objectives:
1. Reconstruct Communication Sessions: Analyze captured packets to rebuild
communication between network endpoints.
2. File Extraction: Extract transmitted files (e.g., images, documents,
executables) from network traffic.
3. Identify Credentials: Recover login credentials or sensitive data transmitted in
clear text.
4. IP and Host Identification: Determine which IP addresses and hosts
communicate on the network.
CO .
1. https://www.netresec.com/?page=NetworkMiner
2. https://www.geeksforgeeks.org/computer-network-tutorials/
3. https://www.youtube.com/watch?v=vo9tK3ABw8o
Related Theory:
1. Network Forensics:
• Network forensics is a branch of digital forensics focusing on monitoring and
analyzing network traffic for evidence of cybercrime or unauthorized activities.
It helps identify the source and nature of incidents such as data breaches,
malware infections, or policy violations.
• The process typically includes capturing data, analyzing the traffic, and
reconstructing events or sessions to understand what transpired on a network.
2. Packet Capture and Analysis:
• Network packets are the smallest units of data transmitted over a network. Tools
like Wireshark and tcp dump capture these packets in PCAP files, allowing
forensic investigators to analyze them later.
• Packet analysis involves dissecting these packets to extract information such as
source/destination IP addresses, protocols, payloads (data carried in the packet),
and timestamps. These insights help reconstruct communication and trace the
movement of data across the network.
• The tool can also parse out sensitive information such as usernames and
passwords that might have been transmitted in plaintext, helping in credential
recovery and assessing network vulnerabilities.
6. Session Reconstruction:
• Network Miner helps rebuild entire sessions, which include a series of packets
exchanged between two endpoints (e.g., a client and a server). This allows
investigators to view web browsing activities, email exchanges, or chat
communications that took place on the network.
• Session reconstruction is crucial for investigating user behavior, tracing
unauthorized access, or determining the exfiltration of sensitive data.
7. Malware Analysis:
• Network Miner can identify and extract files transferred across a network,
including malware. By inspecting the payloads of network packets, it can detect
signatures of malicious files or abnormal traffic patterns that indicate a network
compromise.
• The ability to extract and analyze these files helps forensic experts reverse-
engineer malware and understand how it propagated through the network.
8. Digital Evidence Collection and Legal Compliance:
• The goal of network forensics is to gather legally admissible evidence. This
includes extracting and preserving data in a forensically sound manner. The
metadata and timestamps of network traffic, session logs, and extracted files are
often crucial in building a timeline of events for investigations.
• Tools like Network Miner assist in this process by presenting the data in a
structured and easy-to-understand format, making it suitable for legal
proceedings or internal investigations.
9. Passive Network Monitoring:
• Unlike active monitoring tools that probe the network and might interfere with
traffic, Network Miner is a passive tool, meaning it only analyzes captured
network data without interacting with live network traffic. This reduces the risk
of alerting attackers or affecting network performance during the investigation.
Implementation details:
Case-1:-
this computer.
• What is the brand of the stranger's computer, if you trust the MAC address of his
wireless network card?
• What is the filename of the file sent over IM to the wireless laptop?
Case-2:-
network activity before she skipped town. “We believe Ann may
left,” says the police chief. “The packet capture may contain
• What two items did Ann tell her secret lover to bring?
-Ann tell her secret lover to Bring fake passport and a bathing suit
Case :- 3
suspicious activity.
computer have?
running Linux?
-Operating System of the System is Linux, p0f (NetSA): Linux 2.6 (older, 6)
(possibly Mandriva 2010.x, Ubuntu 7.x) [Linux] (100.00%)
• What message did the email contain that Steve Vogon sent
• How did Steve find the email address to which he sent his
email?
• One web page opened by Steve contains a map, what region does the map
show?
Case:-4
- ipv6sun
- dlp
- 111085-02.zip
- Solbnc
-Wget
• What usernames and passwords did the attacker use for his FTP
- Username: bobzz
Password: joka
- Username: anonymous
Password: [email protected]
• Why did the attacker run FTP rather than HTTP to perform his initial
downloads?
• What is the full DNS name of the IRC server to which the victim
machine connected?
Conclusion: