Module: 08
Network Forensics
LEARNING OBJECTIVES
The learning objectives of this module are to:
✓ LO#01: Understand Network Forensics ✓
LO#02: Explain Logging Fundamentals and Network Forensic Readiness ✓
LO#03: Summarize Event Correlation Concepts ✓
LO#04: Identify Indicators of Compromise (IoCs) from Network Logs ✓
LO#05: Investigate Network Traffic ✓
LO#06: Perform Incident Detection and Examination with SIEM Tools ✓
LO#07: Monitor and Detect Wireless Network Attacks
Understand
Network Forensics
Understand Network Forensics
Postmortem and Real-Time Analysis
Indicators of Compromise (IOCs)
Where to Look for Evidence
Where to Look for Evidence
Types of Network-based Evidence
Explain Logging Fundamentals and Network Forensic Readiness
Explain Logging Fundamentals and Network Forensic Readiness
Legal Criteria for Admissibility of Logs as Evidence
Legal Criteria for Admissibility of Logs as Evidence (Cont’d)
Legal Criteria for Admissibility of Logs as Evidence (Cont’d)
Records of Regularly Conducted Activity as Evidence
Guidelines to Ensure Log File Credibility and Usability
Ensure Log File Authenticity
Centralized Logging Best Practices
Addressing the Challenges in Centralized Log Management
Summarize Event Correlation Concepts
Summarize Event Correlation Concepts
Types of Event Correlation
Event Correlation Approaches
Event Correlation Approaches (Cont’d)
Event Correlation Approaches (Cont’d)
Event Correlation Approaches (Cont’d)
Identify Indicators of Compromise (IOCs) from Network Logs
Identify Indicators of Compromise (IoCs) from Network Logs
Analyzing Firewall Logs
Title
Analyzing Firewall Logs: Cisco
Title
Analyzing Firewall Logs: Cisco (Cont’d)
Title
Analyzing Firewall Logs: Cisco (Cont’d)
Title
Analyzing Firewall Logs: Cisco (Cont’d)
Title
Analyzing Firewall Logs: Check Point
Title
Analyzing Firewall Logs: Check Point (Cont’d)
Title
Analyzing Firewall Logs: Check Point (Cont’d)
Title
Analyzing Firewall Logs: Check Point (Cont’d)
Title
Analyzing Firewall Logs: Check Point (Cont’d)
Title
Analyzing IDS Logs: Juniper
Title
Analyzing IDS Logs: Juniper (Cont’d)
Title
Analyzing IDS Logs: Juniper (Cont’d)
Title
Analyzing IDS Logs: Juniper (Cont’d)
Title
Analyzing IDS Logs: Check Point
Title
Analyzing IDS Logs: Check Point (Cont’d)
Title
Analyzing Honeypot Logs
Title
Analyzing Router Logs
Title
Analyzing Router Logs (Cont’d)
Title
Analyzing Router Logs (Cont’d)
Title
Analyzing Router Logs: Cisco
Title
Analyzing Router Logs: Cisco (Cont’d)
Title
Analyzing Router Logs: Cisco (Cont’d)
Title
Analyzing Router Logs: Cisco (Cont’d)
Title
Analyzing Router Logs: Cisco (Cont’d)
Title
Analyzing Router Logs: Juniper
Title
Analyzing Router Logs: Juniper (Cont’d)
Title
Investigate
Network Traffic
Investigate Network Traffic
Why Investigate Network Traffic?
Gathering Evidence via Sniffers
Display Filters in Wireshark
Analyze Traffic for TCP SYN Flood DoS Attack
Analyze Traffic for TCP SYN Flood DoS Attack
Analyze Traffic for TCP SYN Flood DoS Attack
Analyze Traffic for SYN-FIN Flood DoS Attack
Analyze Traffic for SYN-FIN Flood DoS Attack
Analyze Traffic for SYN-FIN Flood DoS Attack
Analyze Traffic for FTP Password Cracking Attempts
Analyze Traffic for FTP Password Cracking Attempts
Analyze Traffic for FTP Password Cracking Attempts
Analyze Traffic for SMB Password Cracking AttemptS
Analyze Traffic for SMB Password Cracking AttemptS
Analyze Traffic for Sniffing Attempts
Analyze Traffic for MAC Flooding Attempt
Analyze Traffic for MAC Flooding Attempt
Analyze Traffic for MAC Flooding Attempt
Analyze Traffic for ARP Poisoning Attempt
Analyze Traffic for ARP Poisoning Attempt
Analyze Traffic to Detect Malware Activity
Analyze Traffic to Detect Malware Activity
Perform Incident Detection and Examination with SIEM Tools
Perform Incident Detection and Examination with SIEM Tools
Centralized Logging Using SIEM Solutions
SIEM Solutions: Splunk Enterprise Security (ES)
SIEM Solutions: IBM QRadar
Examine Brute-force Attack
Examine Brute-force Attack
Examine Brute-force Attack
Examine Data Exfiltration Attempts over FTP
Examine Data Exfiltration Attempts over FTP
Examine Network Scanning Attempts
Examine Network Scanning Attempts
Examine Network Scanning Attempts
Examine Ransomware Attack
Examine Ransomware Attack (Cont’d)
Examine Ransomware Attack (Cont’d)
Examine Ransomware Attack (Cont’d)
Examine Ransomware Attack (Cont’d)
Examine Ransomware Attack (Cont’d)
Detect Rogue DNS Server (DNS Hijacking / DNS Spoofing)
Monitor and Detect
Wireless Network Attacks
Monitor and Detect Wireless Network Attacks
Wireless Network Security Vulnerabilities
Monitoring for Attacks and Vulnerabilities
Detect Rogue Access Points
Detect Access Point MAC Address Spoofing Attempts
Detect Misconfigured Access Points
Detect Honeypot Access Points
Detect Signal Jamming Attack