Network Forensics week 2

This week we studied all the different types of sources of evidence to be searched for in forensics.

  1. On the wire
  2. In the Air
  3. Switches
  4. Routers
  5. DHCP Server
  6. DNS Server
  7. Authentication Server
  8. NIDS/NIPS
  9. Firewalls
  10. Web Proxies
  11. Application Server
  12. Centralized Log Server
  13. Modem

On the wire is the physical cabling can provide real time network data. 3 tap types. vamire, surreptitious fiber and infrastructure

In the air consists of checking radio frequency and infrared can obtain management and control frames, access point names and capabilities, MAC addresses and traffic analysis.

Switches are physical connection between network segments. can obtain Content addressable memory which stores the mapping between ports and macaddresses. Switches can also be used to capture and preserve network. can also be used to mirror traffic from one port to another.

Routers connect traffic between subnets. can be used to check routing tables. can function as packet filters which checks incoming and outgoing packet traffic. basic intrusion detection usually placed here.

DHCP provides automatic assignment of IP addresses. Therefore is the place to look for IP addresses and the logs related with it such as the mac address time lease and host name.

DNS Servers maps ip addresses to host names. can be used to create a timeline of suspect activities and can be configuresd to provide logs of queries.

Authentication servers provision accounts and audit. gives logs of anything to do with accounts such as unusual login location unexpected login, and brute force password

NIDS and NIPS were specifically designed for forensic purposes. gives information regarding in progress attack and traffic. can be configured to store entire network packets.

Firewalls mainly provide protection and packet inspection. can provide detailed logs of packets and also provide infrastructure protection.

Web proxies cache web pages and inspect web surfing. we can obtain web surfing patterns, phishing email successes, end user content in cache.

application servers can come in many shapes and sizes, therefore the result of what we can get depend on what application is being used.

Centralized Log Server a combination of logs from the different types of the tcp/ip layer. an optional part hence can vary depending on organization. can be designed to respond to network security event, save data, and retain logs.

Modem converts analog to digital. provides authentication information and access log

We also studied some basics of internetworking which is the connection between multiple networks working independently yet work together to be part of a greater whole.

Lastly we studied TCP to know its header fields and how its important to network forensics. we also compared TCP with UDP to know their difference

Leave a Comment

Please note: Comment moderation is enabled and may delay your comment. There is no need to resubmit your comment.