Top Banner
32

Network Forensics and Practical Packet Analysis

Jan 07, 2017

Download

Technology

Priyanka Aash
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Network Forensics and Practical Packet Analysis
Page 2: Network Forensics and Practical Packet Analysis
Page 3: Network Forensics and Practical Packet Analysis

TOO BIG TO COVER

• Difficult to cover every aspect of

Network Forensic

• So many aspects, features and

possibilities

• Highly addictive

Page 4: Network Forensics and Practical Packet Analysis

TOO LONG TO COVER

Page 5: Network Forensics and Practical Packet Analysis

• A million things can go wrong with a computer

network - from a simple spyware infection to a

complex router configuration error.

• Packet level is the most basic level where

nothing is hidden.

• Understand the network, who is on a network,

whom your computer is talking to, What is the

network usage, any suspicious

communication (DOS , botnet, Intrusion

attempt etc.)

• Find unsecured and bloated applications –

FTP sends clear text authentication data

• One phase of computer forensic - could reveal

data otherwise hidden somewhere in a 150

GB HDD.

WHY PACKET ANALYSIS?

Page 6: Network Forensics and Practical Packet Analysis

IN DEPTH ANALYSIS

Page 7: Network Forensics and Practical Packet Analysis

3 PHASES

Page 8: Network Forensics and Practical Packet Analysis

TOOLS

•Wireshark!

•Tcpdump

•Networkminer etc.

Sniffer

•Xplico etc.

Analyzer

Page 9: Network Forensics and Practical Packet Analysis

PRE-REQUISITE

• Patience…

Page 10: Network Forensics and Practical Packet Analysis
Page 11: Network Forensics and Practical Packet Analysis

PRE-REQUISITE

• An inquisitive mind and

sometimes weirder is

better

Page 12: Network Forensics and Practical Packet Analysis

THERE ALWAYS BE A PROBLEM TO SOLVE

Page 13: Network Forensics and Practical Packet Analysis

• Being a bit

organized helps in

long run

Page 14: Network Forensics and Practical Packet Analysis

NOW WHAT?

Think it like you are solving a mystery

• Where do we start?

• What questions to ask?

• What tools do we need?

• Once you have the traces - what then?

Page 15: Network Forensics and Practical Packet Analysis

Capture•Where, How, What, How long

Transfer•Hash, split, distribute

Analyze

• IP, Protocol, Time, Delay, Duration, pattern, graphs, charts, blah…

HOW DO WE DO IT?

Page 16: Network Forensics and Practical Packet Analysis

CAPTURE

• Capture Methods

• Wired

• Mirror/Monitor/SPAN

• Taps

• Hubs

• ARP poisoning???

• Promiscuous mode

• WinPCAP/LibPCAP

• Wireless

• Rfmon/monitor mode

• AirPCap

Page 17: Network Forensics and Practical Packet Analysis

WHICH INTERFACE TO CAPTURE

Page 18: Network Forensics and Practical Packet Analysis

ALWAYS START WITH THE NETWORK DETAILS

Page 19: Network Forensics and Practical Packet Analysis

MORE QUESTIONS BETTER ANALYSIS

• Are the servers in the same locations or different

• Same subnet, different subnet

• Any suspicion - IP Address, Application

• When did it start

• How and when did it get identified

• Why you were there – lack of resource, time, expertise

Page 20: Network Forensics and Practical Packet Analysis

WHAT NOT TO DO

• Do not scroll up and down and try manually reading packets

one by one.

• Do not capture any and every traffic just for the sake of

capturing.

• Do not ASSUME. You can have thoughts, suspicions.

Page 21: Network Forensics and Practical Packet Analysis

THEN WHAT DO WE DO?

Page 22: Network Forensics and Practical Packet Analysis

STILL NEED REASONS!

• Capture Filters

• Display Filters

• Auto-complete

• Red – error, Green – good

• Recent usage history

Page 23: Network Forensics and Practical Packet Analysis

FILTERS

• Create Filter from

Packet/field

• Multiple filter conditioning

using “and”, “or”, “not”

etc.

• Protocol Filtering

Page 24: Network Forensics and Practical Packet Analysis

FOLLOW THE STREAMS

• TCP

• UDP

• APP layer

• FTP

•HTTP

• TELNET

Page 25: Network Forensics and Practical Packet Analysis
Page 26: Network Forensics and Practical Packet Analysis

RECONSTRUCT THE CRIME SCENE

• Understand the flow

• Reconstruct the files

• Identify the attacker

and victim

Page 27: Network Forensics and Practical Packet Analysis

STATISTICS – PROTOCOL HIERARCHY

Page 28: Network Forensics and Practical Packet Analysis

STATISTICS – END POINTS

Page 29: Network Forensics and Practical Packet Analysis

STATISTICS – CONVERSATIONS

Page 30: Network Forensics and Practical Packet Analysis

STATISTICS – COLORING RULES

Page 31: Network Forensics and Practical Packet Analysis

REFERENCE

• Wireshark University by Laura Chappell and Gerald Combs

• Sharkfest talks - Betty DuBois on Network Mysteries

• Securitytube.net by Vivek Ramchandran

• Picture courtesy Google. Not my property.

Page 32: Network Forensics and Practical Packet Analysis

32

THANK YOU