Digital Forensics and Networking
Digital Forensics and Networking
Networking Fundamentals
Types of Networks
Network Security Tools
Network Attacks
Incident Response
Network Evidence & Investigation
Networking
Fundamentals
Network Concepts
Backdoor
From a malware infection allowing remote control
Footprinting
Gathering public information about a target
Fingerprinting
Scanning a target for open ports and other information
Based on a 2011 Verizon study
Insider Threat
Preparation
Planning for security incidents
Proactive defenses, such as
Hardening systems
Patching
Perimeter defense
User awareness training
Policies, procedures, and guidelines
Containment
Eradication
Recovery
Post-incident Review
Root-cause analysis
Plan how to prevent future incidence
Revise policies and procedures
Network Evidence
& Investigation
Where is the Evidence?
Authentication log
Account and IP address of users
Application log
Timestamps shown when application was used and
by whom
Operating system log
Track reboots, file access, clients served, and much
more
Device logs
On routers and firewalls
Network Investigative Tools
Wireshark
Sniffer
NetIntercept
Hardware applicance to record network traffic
NetWitness Investigator
Can gather and analyze network traffic
Snort
IDS
NetIntercept
Links Ch 9b, 9c
Network Investigation Challenges