100% found this document useful (2 votes)
238 views

Network Forensics

The document discusses network forensics and the use of Wireshark. It provides an overview of network forensics as collecting and analyzing raw network data to determine how an attack occurred. Standard procedures for network forensics include always using a standard installation image, fixing vulnerabilities after attacks, and acquiring all compromised drives. Wireshark is an open-source packet analyzer that monitors network traffic and allows users to examine security problems, troubleshoot issues, and analyze dropped packets. It displays packet information through color coding and filtering and is useful for network security and troubleshooting.

Uploaded by

Saeed Arif
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
238 views

Network Forensics

The document discusses network forensics and the use of Wireshark. It provides an overview of network forensics as collecting and analyzing raw network data to determine how an attack occurred. Standard procedures for network forensics include always using a standard installation image, fixing vulnerabilities after attacks, and acquiring all compromised drives. Wireshark is an open-source packet analyzer that monitors network traffic and allows users to examine security problems, troubleshoot issues, and analyze dropped packets. It displays packet information through color coding and filtering and is useful for network security and troubleshooting.

Uploaded by

Saeed Arif
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

Network Forensics

Network Forensics Overview 2

Guide to Computer Forensics and Investigations, Fifth Edition


 Network forensics
 Process of collecting and analyzing raw network data and tracking network traffic
 To ascertain how an attack was carried out or how an event occurred on a network
 Intruders leave a trail behind
 Knowing your network’s typical traffic patterns is important in spotting variations in
network traffic
Developing Procedures for Network 3

Forensics

Guide to Computer Forensics and Investigations, Fifth Edition


 Network forensics can be a long, tedious process
 Standard procedure that is often used:
 Always use a standard installation image for systems on a network
 Fix any vulnerability after an attack
 Attempt to retrieve all volatile data
 Acquire all compromised drives
 Compare files on the forensic image to the original installation image
Developing Standard Procedures for 4

Network Forensics

Guide to Computer Forensics and Investigations, Fifth Edition


 In digital forensics
 You can work from the image to find most of the deleted or hidden files and partitions
 In network forensics
 You have to restore drives to understand attack
 Work on an isolated system
 Prevents malware from affecting other systems
Reviewing Network Logs 5

Guide to Computer Forensics and Investigations, Fifth Edition


 Network logs record incoming and outgoing traffic
 Network servers
 Routers
 Firewalls
 Tcpdump and Wireshark - tools for examining network traffic
 Can generate top 10 lists
 Can identify patterns
Using Network Tools 6

Guide to Computer Forensics and Investigations, Fifth Edition


 Sysinternals
 A collection of free tools for examining Windows products
 Examples of the Sysinternals tools:
 RegMon shows Registry data in real time
 Process Explorer shows what is loaded
 Handle shows open files and processes using them
 Filemon shows file system activity
Using Packet Analyzers 7

Guide to Computer Forensics and Investigations, Fifth Edition


 Packet analyzers
 Devices or software that monitor network traffic
 Most work at layer 2 or 3 of the OSI model
 Most tools follow the Pcap (packet capture) format
 Some packets can be identified by examining the flags in their TCP headers
 Tools
 Tcpdump
 Tethereal
What is Wireshark?

 Wireshark is an open-source packet analyzer, which is used for education,


analysis, software development, communication protocol development, and
network troubleshooting.
 It is used to track the packets so that each one is filtered to meet our specific
needs. It is commonly called as a sniffer, network protocol analyzer, and
network analyzer. It is also used by network security engineers to examine
security problems.
Uses of Wireshark:
Wireshark can be used in the following ways:

 It is used by network security engineers to examine security problems.


 It allows the users to watch all the traffic being passed over the network.
 It is used by network engineers to troubleshoot network issues.
 It also helps to troubleshoot latency issues and malicious activities on your
network.
 It can also analyze dropped packets.
 It helps us to know how all the devices like laptop, mobile phones, desktop,
switch, routers, etc., communicate in a local network or the rest of the world.
What is a packet?
 A packet is a unit of data which is transmitted over a network between the origin
and the destination. Network packets are small, i.e., maximum 1.5 Kilobytes for
Ethernet packets and 64 Kilobytes for IP packets. The data packets in the
Wireshark can be viewed online and can be analyzed offline.
What is color coding in Wireshark?

 The packets in the Wireshark are highlighted with blue, black, and purple etc


color. These colors help users to identify the types of traffic. It is also called
as packet colorization. The kinds of coloring rules in the Wireshark
are temporary rules and permanent rules.
• The temporary rules are there until the program is in active mode or until we quit
the program.
• The permanent color rules are available until the Wireshark is in use or the next
time you run the Wireshark.
Features of Wireshark

 It is multi-platform software, i.e., it can run on Linux, Windows, OS X, FreeBSD, NetBSD, etc.
 It performs deep inspection of the hundreds of protocols.
 It often involves live analysis, i.e., from the different types of the network like the Ethernet,
loopback, etc., we can read live data.
 It has sort and filter options which makes ease to the user to view the data.
 It can also capture raw USB traffic.
 Various settings, like timers and filters, can be used to filter the output.
 It can only capture packet on the PCAP (an application programming interface used to capture the
network) supported networks.
 Wireshark supports a variety of well-documented capture file formats such as the PcapNg and
Libpcap. These formats are used for storing the captured data.
 It is the no.1 piece of software for its purpose. It has countless applications ranging from the tracing
down, unauthorized traffic, firewall settings, etc.
The screen/interface of the Wireshark is divided
into five parts:
 First part contains a menu bar and the options displayed below it. This part is at the top of the
window.
 The second part is the packet listing window. It includes the packet number, time, source,
destination, protocol, length, and info. We can sort the packet list by clicking on the column name.
 Next comes the packet header- detailed window (Bottom Left). It contains detailed information about
the components of the packets. The protocol info can also be expanded or minimized according to the
information required.
 The bottom right window called the packet contents window, which displays the content in ASCII
and hexadecimal format.
 At last, is the filter field which is at the top of the display. The captured packets on the screen can be
filtered based on any component according to your requirements.
Most used Filters in Wireshark

 Whenever we type any commands in the filter command box, it turns green if
your command is correct. It turns red if it is incorrect or the Wireshark does not
recognize your command.
Common Filters
Filters Description

ip.addr It is used to specify the IP address as the source or the


Example- ip.addr==10.0.10.142 destination.
ip.src This example will filter based on this IP address as a
ip.dst source and a destination.

protocol This command filters based on the protocol.


Example- dns or http It requires the packet to be either dns protocol or http
'Dns and http' is never used. protocol and will display the traffic based on this.
We would not use the command 'dns and http' because it
requires the packet to be both, dns as well as http, which
is impossible.
Filters Cont….
tcp.port It sets filter based on the specific port number.
Example: tcp.port==443 It will filter all the packets with this port number.

tcp.analysis.flags Wireshark can flag TCP problems. This command will only display the issues that
Wireshark identifies.
Example, packet loss, tcp segment not captured, etc. are some of the problems.

6.!() It is used to filter the list of protocols or applications, in which we are not
For example, !(arp or dns or icmp) interested.
It will remove arp, dns, and icmp, and only the remaining will be left or it
clean the things that may not be helpful.
Common Filters
http.request It will display all the http
For the responses or the response requests in the trace file.
code, you can type You can see all the servers, the
http.response.code==200 client is involved.
Wireshark packet sniffing
 Wireshark is a packet sniffing program that administrators can use to isolate and troubleshoot
problems on the network. It can also be used to capture sensitive data like usernames and
passwords. It can also be used in wrong way (hacking) to ease drop.

 Packet sniffing is defined as the process to capture the packets of data flowing across a
computer network. The Packet sniffer is a device or software used for the process of sniffing.

 Below are the steps for packet sniffing:

 Open the Wireshark Application.


 Select the current interface. Here in this example, interface is Ethernet that we would be using.
 The network traffic will be shown below, which will be continuous. To stop or watch any
particular packet, you can press the red button below the menu bar.
Username and password sniffing

It is the process used to know the passwords and username for the particular website. Let's take an
example of gmail.com. Below are the steps:

Open the Wireshark and select the suitable interface.


Open the browser and enter the web address. Here, we have entered gmail.com, which is highly
secured. Enter your email address and the password. The image is shown below:

You might also like