
Hands-On Network Forensics
Investigate network attacks and find evidence using common network forensic tools
- 358 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Hands-On Network Forensics
Investigate network attacks and find evidence using common network forensic tools
About this book
Gain basic skills in network forensics and learn how to apply them effectively
Key Features
- Investigate network threats with ease
- Practice forensics tasks such as intrusion detection, network analysis, and scanning
- Learn forensics investigation at the network level
Book Description
Network forensics is a subset of digital forensics that deals with network attacks and their investigation. In the era of network attacks and malware threat, it's now more important than ever to have skills to investigate network attacks and vulnerabilities.
Hands-On Network Forensics starts with the core concepts within network forensics, including coding, networking, forensics tools, and methodologies for forensic investigations. You'll then explore the tools used for network forensics, followed by understanding how to apply those tools to a PCAP file and write the accompanying report. In addition to this, you will understand how statistical flow analysis, network enumeration, tunneling and encryption, and malware detection can be used to investigate your network. Towards the end of this book, you will discover how network correlation works and how to bring all the information from different types of network devices together.
By the end of this book, you will have gained hands-on experience of performing forensics analysis tasks.
What you will learn
- Discover and interpret encrypted traffic
- Learn about various protocols
- Understand the malware language over wire
- Gain insights into the most widely used malware
- Correlate data collected from attacks
- Develop tools and custom scripts for network forensics automation
Who this book is for
The book targets incident responders, network engineers, analysts, forensic engineers and network administrators who want to extend their knowledge from the surface to the deep levels of understanding the science behind network protocols, critical indicators in an incident and conducting a forensic search over the wire.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Section 1: Obtaining the Evidence
- Chapter 1, Introducing Network Forensics
- Chapter 2, Technical Concepts and Acquiring Evidence
Introducing Network Forensics
- Instances where the disk drives may not be available
- Cases where the attack is in progress, and you may not want to tip off the attackers
- Network forensics methodology
- Sources of evidence
- A few necessary case studies demonstrating hands-on network forensics
Technical requirements
- A laptop/desktop computer with an i5/i7 processor or any other equivalent AMD processor with at least 8 GB RAM and around 100 GB of free space.
- VMware Player/VirtualBox installation with Kali OS installed. You can download it from https://www.offensive-security.com/kali-linux-vm-vmware-virtualbox-image-download/.
- Installing Wireshark on Windows: https://www.wireshark.org/docs/wsug_html_chunked/ChBuildInstallWinInstall.html.
- Netcat From Kali Linux (already installed).
- Download NetworkMiner from https://www.netresec.com/?page=Networkminer.
- The PCAP files for this chapter, downloaded from https://github.com/nipunjaswal/networkforensics/tree/master/Ch1.
Network forensics investigation methodology

- Obtain information: Obtaining information about the incident and the environment is one of the first things to do in a network forensics exercise. The goal of this phase is to familiarize a forensic investigator with the type of incident. The timestamps and timeline of the event, the people, systems, and endpoints involved in the incident—all of these facts are crucial in building up a detailed picture of the event.
- Strategize: Planning the investigation is one of the critical phases in a network forensics scenario, since logs from various devices can differ in their nature; for example, the volatility of log entries from a firewall compared with that of details such as the ARP of a system would be very different. A good strategy would impact the overall outcome of the investigation. Therefore, you should keep the following points in mind while strategizing the entire forensics investigation process:
- Define clear goals and timelines
- Find the sources of evidence
- Analyze the cost and value of the sources
- Prioritize acquisition
- Plan timely upd...
Table of contents
- Title Page
- Copyright and Credits
- Dedication
- About Packt
- Contributors
- Preface
- Section 1: Obtaining the Evidence
- Introducing Network Forensics
- Technical Concepts and Acquiring Evidence
- Section 2: The Key Concepts
- Deep Packet Inspection
- Statistical Flow Analysis
- Combatting Tunneling and Encryption
- Section 3: Conducting Network Forensics
- Investigating Good, Known, and Ugly Malware
- Investigating C2 Servers
- Investigating and Analyzing Logs
- WLAN Forensics
- Automated Evidence Aggregation and Analysis
- Other Books You May Enjoy
- Assessments