CCIDF Unit5 Notes
CCIDF Unit5 Notes
Investigation
and Digital
Forensics
UNIT - IV
Network Forensics: Networks basics for
Digital investigators, Applying Forensics
science to Networks, Digital evidence on
Physical and datalink layers, Digital Evidence
on Network and Transport layers.
Network Forensics
Network forensics is a specialized area of digital forensics that focuses on analyzing
network traffic to investigate cyber incidents, detect intrusions, and gather evidence. It
involves capturing, recording, and examining data flowing across a network to
understand what happened during a security event. This helps identify attackers,
understand the scope of an attack, and potentially prevent future incidents.
Understanding network basics is essential for digital investigators because much of today's evidence
and activity—such as cybercrimes, unauthorized access, or data exfiltration—travels through or depends
on computer networks.
A network is a group of interconnected devices (computers, servers, phones, etc.) that communicate to
share resources and data.
LAN (Local Area Network): Small geographical area (e.g., office or home).
WAN (Wide Area Network): Covers large areas (e.g., the Internet).
Understanding the OSI model helps break down how data travels across a network:
1. Physical – Cables, switches.
2. Data Link – MAC addressing.
3. Network – IP addressing, routing.
4. Transport – TCP/UDP ports.
5. Session – Establishing/maintaining connections.
6. Presentation – Encryption, data formatting.
7. Application – User interfaces (e.g., web browsers, email clients).
Digital Tip: If port 22 (SSH) is being accessed frequently from unknown IPs, it may suggest brute-force
attempts.
🪪 10. Network Identification and Tracing
Firewall logs
Router/switch logs
Windows Event Logs
Syslogs from Linux systems
IDS/IPS alerts (e.g., Snort, Suricata)
17.network topology is another core concept in network basics, especially important for digital
investigators because it helps in understanding how devices are connected, where data flows, and how
to trace potential points of compromise.
All devices connect to a Easy to manage; Investigate central device logs for
Star
central hub/switch. isolate devices traffic.
Hybrid Mix of topologies (e.g., star- Flexible Understand logical layout during
Topology Description Pros Investigation Notes
2) For instance, several hours after the Columbia Space Shuttle crash in 2003, it became evident
that a crime was being committed when pieces of the spacecraft were being offered for sale on
eBay.
3) A missing person’s e-mail has provided a link between the victim and offender, revealing where
she went and who she arranged to meet.
4) Child pornography posted on the Internet has led investigators to victims who were being
abused by a family member without the knowledge of other family members, neighbors, or others
close to the family.
5) Web proxy logs have been used to demonstrate that an offender took precautions to conceal
his illegal activities, casting doubt on his claims that he did not know that what he was doing was
wrong.
6) When someone witnesses an unknown offender making a call from his/her mobile phone, it
may be possible to obtain records from local base stations for that time period and determine
who made calls from the region, thus narrowing the suspect pool.
7) Processing a hard drive for evidence is a relatively well-defined procedure. When dealing with
evidence on a network, however, digital investigators face a number of unpredictable challenges.
1) In some cases, digital evidence exists on networks that were not directly involved in a crime and
the network administrators are cooperative, often helping digital investigators obtain evidence.
Some system administrators even capture useful data routinely to detect and resolve performance
and security problems, effectively collecting evidence proactively.
2) However, this proactive evidence gathering might not meet the standards for legal action and
digital investigators may need to perform additional steps to preserve these data as evidence.
Additionally, there are often more sources of digital evidence on a network than even the system
administrators realize. Therefore, to ensure that all relevant data are located, digital investigators
must use their understanding of networks in general to query system administrators thoroughly,
and clearly communicate what types of digital evidence are needed.
3) When system administrator cooperation is not forthcoming, digital investigators have to gather
intelligence themselves about the target systems before obtaining authorization to seize evidence.
For instance, when a Web site is under investigation, it is necessary to determine where the Web
servers are located before obtaining authorization to seize the systems.
Additionally, it is useful for digital investigators to know what kinds of computers to expect so that
they can bring the necessary tools. Digital investigators might also want to copy as much of the
material from the Web site as possible prior to the search to demonstrate probable cause or as a
precautionary measure.
5) Collecting digital evidence from a large network requires significant planning, particularly when
the administrators are not cooperative. Obtaining information about the target systems prior to
the actual search can be a time-consuming process.
6) A] Case Example: The alibi of a prime suspect in a homicide case depended on his employer’s
network. Unfortunately, system administrators who assisted investigators did not know about an
administrative console that contained key digital evidence and failed to preserve it promptly. By
the time the suspect pointed out the console, it was too late—he was accused of fabricating digital
evidence on the console after the fact to support his alibi. If the investigators in this case had not
relied on the system administrators’ incomplete knowledge of their network, the suspect probably
would not be in jail today.
2] Identification:
1) Recall that the cybertrail is bi-directional. When dealing with a computer as a source of
evidence, the crime scene search generally leads to a connected network and ultimately the
Internet.
2) Conversely, when digital investigators find digital evidence on the Internet, their search often
leads them through a smaller, private network (e.g., ISP, employer, and home networks) to an
individual computer.
3) These search areas are depicted in Figure B.1 with a dashed line between the Internet and the
smaller, private network because the division between the two is not always clearly defined.
4) For example, corporate networks often have internal servers that are used to share information
within the organization and these servers are sometimes accessible to employees via the Internet.
5) Given the amount of information that can exist in any of these areas, it is necessary to have a
method of quickly locating systems that contain the most useful digital evidence.
The first phase is to seek the end-points and intermediate systems such as switches, routers, and
proxies. These systems can contain digital evidence that helps establish the continuity of offense
and gain a more complete understanding of the crime.
7) For example, log files on an e-mail server used to send harassing e-mail can provide a more
complete view of the harasser’s activities than a single message. Additionally, intermediate
systems like routers and switches may generate detailed logs of network activity, which lead to
the second phase.
8) The second phase is to seek log files that provide an overview of activities on the network, such
as packet logs from traffic monitoring systems, traffic logs from Argus probes, NetFlow logs from
routers, and alert logs from intrusion detection systems.
9) These network-level logs are very useful for determining what occurred and which other
systems on the network might be involved. For example, when investigating an intrusion into one
computer, network-level logs may reveal that the same intruder targeted several other systems.
The third phase is to look for supporting systems such as authentication servers and caller-id
systems that can help attribute online activities to an individual.
10) In practice, these three phases are conducted simultaneously as, in some instances, the
second and third phases may lead to other intermediate systems or end-points.
11) This three-phase approach is useful for focusing the search for digital evidence on a network
to reconstruct the crime.
2) Also, the same procedures are used to preserve loose media and related backup tapes, and
collect associated hardware and software needed to read them. The primary differences when
dealing with networked systems arise when digital investigators cannot make a bitstream copy of
digital evidence.
3) A bitstream copy may not be viable in some situations because the system cannot be shut
down, the hard drive may be too large to copy, or the digital investigator may not have authority
to copy the entire drive.
4)Also, digital investigators often rely on large Internet Service Providers to collect evidence From
their own systems such as subscriber information. Furthermore, digital investigators may not be
able to gain physical access to the system containing evidence, requiring them to collect evidence
remotely.
5) Digital investigators also collect digital evidence remotely when there is a strong chance that it
will be destroyed before they can reach the machine. For instance, data on the Internet such as
Web pages and Usenet messages can be altered or removed at any time and computer intruders
often delete log files.
6) Another example of real-time evidence gathering is an IRC chat session in which digital
investigators keep a running log of their conversation with a suspect.
8) A visual recording can be created using a video camera or a software program that can capture
dynamic digital evidence, like a sequence of onscreen events, and can replay them at a later time
much like a videotape.
9) Notably, these and other programs that are useful for collecting digital evidence do not
perform integrity checking and other documentation that can be used to authenticate the data.
10) When dealing with network logs, preserving the entire log file rather than individual entries is
preferable to collecting only relevant portions because digital investigators may later find that
other portions of the log are relevant to the case.
11) Case Example: In a homicide case, digital investigators collected information from the login
server relating to the victim’s activities but did not collect the entire log file. It was later
determined that the offender may have been logged into the server at the same time, allowing
them to chat in real time and arrange a meeting an hour later. By the time this was realized,
archived copies of the relevant log files had been overwritten (the backup tapes had been reused)
and it was not possible to determine who else was accessing the system at the time.
1) Investigations involving computers often result in a large amount of data, much of it unrelated
to the crime under investigation.
2) Also, when dealing with files containing captured network traffic, there may be privileged or
confidential information that forensic examiners are required to ignore or remove.
3) Therefore, data filtering and reduction are essential parts of any investigation involving
networks, enabling a more efficient and thorough forensic analysis of the digital evidence.
4) Filtering out irrelevant data from log files may be as simple as extracting entries that match
certain criteria such as a certain time period, an IP address, or failed logon events. For instance,
the following output shows only failed logon events relating to the user ―”eco”extracted from a
Windows NT Event Log using ntlast utility.
The Physical Layer is responsible for the transmission and reception of raw data bits over a physical
medium (e.g., cables, wireless).
Cabling and Hardware Taps: Evidence of physical tampering, wiretaps, or signal interception
devices.
Signal Interference or Jamming: Logs or recordings of signal interference used to disrupt
communications.
Device Presence: Evidence of a device physically connected to a network (e.g., via MAC address
appearing on connected switches).
Power Usage Logs: Smart power strips or UPS systems may show when a device was powered
on/off.
Radio Frequency (RF) Logs: In wireless forensics, RF signals can be captured to show the
presence of unauthorized access points or devices.
Tools Used:
RF scanners
Network taps
Hardware keyloggers
Oscilloscopes (in hardware-level forensics)
The Data Link Layer is responsible for node-to-node data transfer and includes MAC addressing and
switching.
MAC Address Logs: Logs showing the MAC addresses that were connected to a network, useful
for identifying devices.
Switch Logs / ARP Tables: Can reveal which MAC addresses were seen on which ports and
when.
Network Traffic Captures: Using tools like Wireshark to capture Ethernet frames (with MAC
addresses and other Layer 2 data).
WLAN Traffic: For wireless, includes SSIDs, BSSIDs, and management frames.
VLAN Logs: Help identify which virtual networks were used by which systems.
Frame Manipulation Evidence: Detection of ARP spoofing, MAC flooding attacks, or
unauthorized network bridging.
Tools Used:
Summary Table
Layer Evidence Type Tools
RF scanners, taps,
Physical Signal captures, device connection
cables
Wireshark, tcpdump,
Data Link MAC addresses, ARP tables, traffic
Aircrack
Layer Evidence Type Tools
This layer handles MAC addressing, framing, and error detection between nodes on the same network
segment.
1. IP Address Logs:
o Source and destination IPs in captured traffic.
o Useful for identifying external and internal communicating hosts.
2. Router Logs:
o Track path taken by packets (e.g., traceroute logs, routing table changes).
o Logs from OSPF, BGP, RIP protocols (indicating route changes or hijacking).
3. Firewall Logs:
o Show blocked or allowed IP traffic.
o Can reveal intrusion attempts (e.g., scans, port probes).
4. NAT Logs:
o Translate internal private IPs to public IPs — critical for identifying specific devices
behind NAT.
5. IP Packet Headers:
o TTL (Time to Live), source/destination IPs, protocol types (TCP/UDP/ICMP).
o TTL can help infer the number of hops or detect spoofing.
6. IP Fragmentation Evidence:
o Fragmented packets may indicate evasion attempts (e.g., intrusion detection system
bypass).
7. ICMP Logs (Ping, Traceroute):
o Can show connectivity tests or scanning activities.
o Ping floods, Smurf attacks leave ICMP traces.
8. VPN and Tunneling Evidence:
o Encapsulated IP packets, IPsec headers, or GRE tunnels may suggest encrypted
communication.
9. Geolocation from IPs:
o Source IPs can be mapped to approximate physical locations or ISPs.
Handles end-to-end communication, port addressing, and flow control via TCP and UDP.
Detecting attacks ICMP scans, routing anomalies Port scans, DoS attacks, protocol misuse