Network Forensic
Network Forensic
● Network Forensics: The process of collecting and analyzing raw network data to
systematically track network traffic and determine how an attack or event occurred on a
network.
● Importance: With the increasing frequency of network attacks, network forensics is
crucial for identifying whether attacks are intentional or unintentional and for
understanding the methods used by attackers.
● Unintentional Attacks: Often occur due to lack of knowledge and do not involve
malicious intent.
● DoS Attacks: Denial of Service attacks overload network resources, making the network
unavailable to genuine users without gaining access to any computer on the network.
○ Characteristics: DoS attackers should not be referred to as intruders since no
direct intrusion happens. Not all intruders are attackers, but those who gain access
and then destroy information or plant viruses can be called both intruders and
attackers.
● Intrusion Traces: Intruders leave traces when they attack a network. Detecting these
traces involves identifying variations in network traffic.
● Normal Traffic Patterns: Understanding typical network patterns (e.g., peak internet
usage hours) helps in identifying unusual activities.
○ Example: Peak hours in a city might be between 6 a.m. and 6 p.m. Any
suspicious activity at night would prompt an investigation by the network
administrator.
Standard Procedures in Network Forensics
Securing a Network
● Network Forensics Role: Used to identify security breaches due to attacks, viruses, and
other incidents.
● Hardening: Involves tasks like applying the latest patches and using a layered network
defense strategy to protect valuable data.
○ Defense in Depth (DiD): Developed by the National Security Agency (NSA), this
strategy includes three modes of protection: People, Technology, and Operations.
1. People:
○ Qualified Personnel: Hiring well-qualified individuals and treating them well to
prevent revenge motives.
○ Training: Adequate training in security procedures and policies.
○ Security Measures: Includes physical and personnel security measures.
2. Technology:
○ Network Architecture: Selecting strong network architecture.
○ Tools: Using tools like firewalls and Intrusion Detection Systems (IDSs).
○ Penetration Testing and Risk Assessment: Regular testing and assessment to
enhance network security.
○ Investigation Tools: Tools that allow for quick and thorough examination during
a security breach.
3. Operations:
○ Daily Activities: Updating antivirus software, security patches, and operating
systems.
○ Evaluation and Monitoring: Regular evaluation and monitoring methods.
○ Disaster Recovery Plans: Having plans in place for disaster recovery.
Reviewing Network Logs
● Tcpdump: A common program used to capture and analyze network traffic. It generates
extensive records that detail network activities.
● Format: The log entries typically include the date, time, protocol, interface, packet size,
and source/destination addresses.
● Port Information: Ports above 1024 can be suspicious and warrant further investigation.
Check port assignments on the Internet Assigned Numbers Authority (IANA) website.
● Frequent IP Addresses: Repeated occurrences of specific IP addresses can indicate
potential issues or malicious activity.
● Top Websites: Ethereal (now known as Wireshark) can generate a list of the top 10
websites visited by users, showing bytes transferred and IP addresses.
● Top Internal Users: It can also list the top 10 internal users by tracking IP addresses and
the amount of data they transfer.
● Behavioral Patterns: Logs can reveal patterns like an employee frequently accessing
certain sites during work hours, potentially indicating misuse of company resources.
● Investigating Suspicious Activity: If suspicious behavior is detected, investigate while
preserving evidence. Findings might reveal broader issues affecting other companies.
Handling Findings
● Confidentiality: Do not reveal findings about other companies without their consent.
● Contacting Companies: Notify affected companies to collaborate on tracking down
intruders.
● Reporting to Authorities: Consider reporting significant incidents to federal authorities
for further action.
Network Forensic Tools
Windows Operating System Network Tools
● Sysinternals Suite: A collection of free tools for examining Windows products, created
by Mark Russinovich and Bryce Cogswell, now owned by Microsoft. These tools help in
monitoring network traffic and managing devices and processes. Here are some of the
key tools:
○ Process Explorer: Shows files, registry keys, and DLLs loaded at a specific time.
● Knoppix Security Tools Distribution: A bootable Linux CD designed for computer and
network forensics, created by Klaus Knopper. It offers a variety of tools for
authentication, firewalls, password management, wireless tools, encryption, intrusion
detection systems (IDS), honeynets, forensics, packet sniffers, vulnerability assessment,
and more. Here are some important tools:
○ tcpdump and ethereal (Wireshark): Packet sniffers for capturing and analyzing
network traffic.
Packet Sniffers
● Packet Sniffers: Devices or software used to monitor network traffic. They can enhance
security and track network bottlenecks but can also be used maliciously to capture
sensitive information.
○ Common Tools: Tcpdump, Tethereal, and SNORT can capture packets, including
those with specific flags like SYN for detecting SYN flood attacks.
● Topslice: Extracts information from large Libpcap files based on a specified timeframe
and can combine files.
● Tcpreplay: Replays network traffic recorded in Libpcap format to test network devices.
● Ngrep: Examines email headers or IRC logs, collects, and hashes data for verification.
● Ethereal (Wireshark): A graphical tool for viewing network traffic and rebuilding
sessions.
● Netdude: A GUI tool for inspecting and analyzing large Tcpdump files.
● Honeynet Project: Aims to thwart internet and network attackers by creating awareness,
providing information, and offering tools and methods. It involves worldwide
participation.
○ Steps:
● Threats Addressed:
Live acquisitions are crucial for capturing volatile data when dealing with active network attacks
or unauthorized access by employees. These acquisitions are performed while the system is still
running because certain evidence, such as running processes and data in RAM, can be lost if the
system is shut down or restarted.
2. Log Actions:
○ Keep a detailed log of all actions taken during the live acquisition process.
○ Document the reasons for each action.
Various tools can capture RAM during a live acquisition in Windows. Here are some of the tools:
● Back Track 3: Combines tools from the White Hat Hackers CD and The Auditor CD,
popular among penetration testers.
● Command-Line Tools: Offer more control and are generally preferred for live
acquisitions.
● GUI Tools: Require more system resources and can sometimes give false
readings, especially on Windows OSs.
Live acquisitions are essential for preserving volatile data during an ongoing network attack or
suspected unauthorized access. Following a systematic procedure and using reliable tools ensures
that the captured data remains forensically sound.
Order of Volatility (OOV)
The Order of Volatility (OOV) refers to the lifespan of data on a system, which is critical for
investigators to understand when collecting evidence during a network forensics investigation.
Data varies in how long it remains accessible and useful:
2. Routing Table, ARP Cache, Process Table, Kernel Statistics: Short-lived and volatile.
5. Running Processes: Exists until the process is terminated or the system is shut down.
9. Backup Media: Tapes, Disks Not in Use: Very persistent, often stored for long periods.
After digital evidence is gathered, physical evidence such as configuration, network topology,
paper documents, fingerprints, and DNA can be collected.
Standard Procedures for Network Forensics
Network forensics involves a systematic approach to ensure accurate and reliable evidence
collection. The standard procedure includes the following steps:
2. Fix Vulnerabilities:
○ If an intrusion incident occurs, ensure the vulnerability is patched to prevent
further attacks.
3. Live Acquisition:
○ Recover all volatile data, such as RAM and running processes, before the system
is turned off.
4. Forensic Imaging:
○ Create a forensic image of the compromised drive to preserve the state of the data
at the time of the incident.
5. File Comparison:
○ Compare the files on the forensic image with the original installation image.
○ Use hash values to verify the integrity of common files (e.g., Win.exe, standard
DLLs) and detect any alterations.
By following these standard procedures, investigators can systematically collect and analyze
evidence, ensuring the reliability and integrity of their findings.