Network forensics. P.Pale: Computer forensics
|
|
|
- Jewel Caldwell
- 10 years ago
- Views:
Transcription
1 Network forensics is a sub branch of digital forensics whose aim is to: capture, record, and analyze network events in order to discover the source of security attacks or other problem incidents or activities of legitimate users 2 IP and MAC addresses passwords files messages: mail, chat, web, who was doing what and when what is hidden behind firewalls what attacks have been or still are going on an organization s communication policies 3 P.Pale: Computer forensics 1
2 ... relating to Network Evidence Acquisition Networks contain so many possible sources of evidence e.g. wireless access points, web proxies, central log servers... sometimes pinpointing the correct location of the evidence is tricky Content Network devices often have very limited storage capacity Storage The data which network devices contain may be so volatile as to not survive a reset of the device Seizure Very disruptive! In some cases, an entire network segment may be brought down indefinitely until equipment is returned and operations restored Admissibility Network forensics is a newer approach to digital investigations There are sometimes conflicting or even nonexisting legal precedents for admission of various types of network based digital evidence 4 Evidence acquisition Protocol analysis Packet analysis Flow analysis Network Logs Network devices Network intrusion detection/prevention systems Common network attacks Web browser forensics 5 Evidence acquisition Protocol analysis Packet analysis Flow analysis Network Logs Network devices Network intrusion detection/prevention systems Common network attacks Web browser forensics 6 P.Pale: Computer forensics 2
3 Is it possible to obtain network traffic without sending or modifying any data frames on the network? While it is never possible to have absolutely zero impact on the environment, the process of capturing (or sniffing) traffic can often be conducted with very little impact Sniffing can be done in these ways: A Physical interception B Traffic acquisition software C Active acquisition 7 A Passively acquire network traffic by intercepting it as it is transmitted across cables, through the air, (will be discussed in wireless forensics) or through network equipment or through network equipment such as hubs and switches 8 Most common materials for cables are Copper two most widely used types: coaxial and Twisted Pair (TP) Fiber Fiber optic cables consist of thin strands of glass (or sometimes plastic) which are bundled together in order to transmit signals across a distance Each of these can be sniffed, although the equipment and side effects vary depending on the physical media 9 P.Pale: Computer forensics 3
4 A Layer 1 device is inserted inline between two physically connected network devices The network tap will pass along the packets and also physically replicate copies to a separate port(s) Commonlyhave four ports: two connected inline to facilitate normal traffic, and two sniffing ports, which mirror that traffic (one for each direction) NOTE: causes a brief disruption, while cable being disconnected in order to connect the network tap inline Every additional break in a cable is a potential point of failure! Inline insertion of network taps necessarily increase the risk of network disruption 10 devices that pierce the shielding of copper wires in order to provide access to the signal within Unlike inline network taps, the cable does not need to be disconnected or severed in order for a vampire tap to be installed NOTE: inserting a vampire tap, even if done correctly, can bring down the link on a TP cable since the characteristics of the required balanced communication will be affected negatively 11 Inline network taps work similarly both for fiber optic cables and copper cables To place a network tap inline on a fiber optic cable, network technicians splice the optic cable and connect it to each port of a tap This causes a network disruption NOTE: Inline optical taps may cause noticeable signal degradation! Vampire taps Not as easy as with coper cables because of photon characteristics 12 P.Pale: Computer forensics 4
5 All wires conducting voltages emit various electromagnetic signals outside of the intended channel Such electromagnetic radiation is more pronounced in unshielded wires, such as UTP, due to the lack of shielding As a consequence, it is theoretically possible to introduce what is called an induction coil alongside such wiring in order to translate the laterally emitted signals into their original digital form Induction coils are devices that essentially transform the magnetism of weak signals to induce a much stronger signal in an external system Such a device could potentially capture the throughput of a cable without being detected by users, administrators, or owners of the wires However such devices are not commercially available in a way that the public can acquire in order to surreptitiously tap Cat5e and Cat6 cables 13 Layer 1 device that physically connects all stations on a local subnet to one circuit Important characteristics relevant to forensics: does not store enough state to track what is connected to it, or how maintains no knowledge of what htdevices are connected tdto what htports received frames are retransmitted on all other ports Thus: traffic on the segment can be seen by everyone else, not just the investigators Confusion Many devices that are currently labeled as hubs by the manufacturer are, in fact, switches 14 Most prevalent Layer 2 device Unlike hubs, switches use software to keep track of which stations are connected to which ports,, in its CAM table. When a switch receives a packet, it forwards it only to the destination station s port Switches operate at Layer 2 (the data link layer), and sometimes Layer 3 CAM table Switches populate the CAM table by listening to arriving traffic When a switch receives a frame from a device, it looks at the source MAC address and remembers the port associated with that MAC address Later, when the switch receives a packet destined for that device, it looks up the MAC address and corresponding port in the CAM table And passes the packet only to that port Switches with sufficient software capabilities can be configured to replicate traffic from one or more ports to some other port for aggregation and analysis Switches have varying port mirroring capabilities, depending on their make and model Port mirroring is inherently limited by the physical capacity of the switch itself 15 P.Pale: Computer forensics 5
6 B Once physical access to network traffic is gained, one needs software tools to record it The most common software libraries used for recording, parsing, and analyzing captured packet data: libpcap WinPcap Most popular tools: Tcpdump Wireshark 16 Libpcap is a UNIX C library that provides an API for capturing and filtering data link layer frames from arbitrary network interfaces Different UNIX systems have different architectures for processing link layer layer frames Consequently, programmers writing a utility on UNIX to inspect or manipulate link layer frames originally had to write operating system specific routines for accessing them The purpose of libpcap was to provide a layer of abstraction so that programmers could design portable packet capture and analysis tools WinPcap is a library based on libpcap designed for Windows In 1999 by the Computer Networks Group (NetGroup) in the Politecnico di Torino In order to inspect traffic we need a program like WireShark or tcpdump which uses libpcap or winpcap 17 An extremely powerful filtering language included in Libpcap the volume of data that flows across networks has become so huge that it is very important for investigators to be able to filter it during both capture and analysis enables to filter traffic based on value comparisons in fields for Layer 2, 3, and 4 protocols includes built in in references called primitives for many commonly used protocol fields filters can also consist of elaborate conditional chains, nesting logical ANDs and ORs 18 P.Pale: Computer forensics 6
7 easiest way to construct a BPF filter is to use BPF primitives to refer to specific protocols, protocol elements, or qualities of a packet capture three different kinds of qualifiers Type Dir Proto For example: host and not host and (port 138 or port 139 or port 445) will show us only the traffic in which a computer with the IP address communicates with any other system except over ports 138, 139, or A tool for capturing, filtering, and analyzing network traffic was originally designed as a UNIX tool In 1999 it was ported to Windows as WinDump Tcpdump captures traffic bit by bitbit as it traverses any physical media Suitable for conducting link layer traffic capture copper, fiber, or even air Since tcpdump is based on libpcap, it captures at Layer 2 (the data link layer) Fidelity (not dropping packets) One reason that tcpdump is such a powerful tool is that it is capable of capturing traffic with high fidelity, to the degree that the resulting packet capture can constitute evidence admissible in court However, the quality of the packet capture can be impacted by hardware limitations and configuration constraints 20 # tcpdump -nni eth0 'not (tcp and port 80) tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link -type EN10MB (Ethernet), capture size bytes 12:49: IP > : NTPv4, Broadcast,length 48 12:49: IP > : SYSLOG local2.notice, length: :49: IP > : SYSLOG local2.notice, length: :49: IP > : udp 12:49: IP > : udp 12:49: IP > : SYSLOG local2.notice, length: :49: IP > : SYSLOG local2.notice, length: :49: IP > : udp 21 P.Pale: Computer forensics 7
8 Wireshark A libpcap based graphical, open source tool designed for capturing, filtering, and analyzing traffic due to GUI mostly used for manual/human inspection Tshark command line network protocol analysis tool that is part of the Wireshark distribution like Wireshark, it is libpcap based, and can read and save files in the same standard formats as Wireshark mostly used to prepare captured data for automatic processing and analysis can prepare CSV files Dumpcap Part of wireshark Used to capture network packets 22 C Active evidence acquisition network traffic is acquired directly on the target computer for example using tcpdump, wireshark, and is stored in a file which is then: analysed on the target computer or transferred to investigator s computer this process modifies df the environment!!!! Investigators should be highly aware of various ways in which live acquisition modifies the devices and environment under investigation and work to minimize the impact Common Interfaces Console, Secure Shell (SSH), Secure Copy (SCP), SSH File Transfer Protocol (SFTP), Telnet, Simple Network Management Protocol (SNMP), Trivial File Transfer Protocol (TFTP) etc 23 Evidence acquisition Protocol analysis Packet analysis Flow analysis Network Logs Network devices Network intrusion detection/prevention systems Common network attacks Web browser forensics 24 P.Pale: Computer forensics 8
9 refers to the art and science of understanding how a particular communications protocol works, what is it used for, how to identify it, and how to dissect it. This may not be as straightforward as one might expect In an ideal world, all protocols would be neatly cataloged, publicized, and implemented according to specification in reality, however, none of this is true Many protocols are deliberately kept secret by their inventors, either to protect intellectual property, keep out competition, or for the purposes of security and covert communications Other protocols are simply not documented well enough because no one has taken the time to do so IETF Request for Comments (RFC) RFCs have emerged as a way to develop, communicate, and define international standards for internetworking They are developed and distributed by the Internet Engineering Task Force (IETF) which is a loosely self organized group of people who contribute to the engineering and evolution of Internet technologies... the principal body engaged in the development of new Internet standard specifications. Other Standards Bodies IEEE SA Institute of Electrical and Electronics Engineers Standards Association ISO International Organization for Standardization Vendors 27 P.Pale: Computer forensics 9
10 How do you identify which protocols are in use in a packet capture? Search for common binary/hexadecimal/ascii values that are typically associated with a specific protocol Leverage information in the encapsulating protocol Leverage the TCP/UDP port number many of which are associated with standard default services Analyze the function of the source or destination server specified by IP address or hostname Test for the presence of recognizable protocol structures 28 Example: IPv4 Most protocols contain sequences of bits that are commonly, if not always, present in packets associated with that protocol, in predictable places beginning of an IPv4 is often marked with the hexadecimal sequence 0x4500 Example: 29 Many TCP/UDP ports are associated with usual, default services A simple and common way to identify protocols is by examining the TCP or UDP port number in use 65,535 possible port numbers for each of TCP and UDP IANA publishes a list of known services: numbers Identifying protocols by port number is not always reliable servers can easily be configured to use nonstandard ports for specific services Port Service 21 FTP 22 SSH 23 telnet 25 SMTP 53 DNS 80 HTTP 110 POP3 123 NTP 143 IMAP 30 P.Pale: Computer forensics 10
11 Higher layer protocols Can be extremely useful when analyzing modern applications which rely heavily on them Examples Hypertext Transfer Protocol (HTTP) Simple Mail Transfer Protocol (SMTP) Domain Name System (DNS) Dynamic Host Configuration Protocol (DHCP) Of course, there are many, many others 31 Layer 7 protocol that facilitates automatic configuration of network details assigning an IP address to a MAC address also gateway, DNS servers, etc Forensic value DHCP server logs and packet captures contain: pairs: IP and MAC address which can provide clues to the hardware manufacturer client hostname, routing information etc who used and IP address at specific time 10,12/09/15,00:00:21,Assign, ,Nikola-PC.WIN.LSS.HR, 0013D30C227E 12,12/09/15,00:03:21,Release, ,Nikola-PC.WIN.LSS.HR, 0013D30C227E 25,12/09/15,00:07:00,2 leases expired and 4 leases deleted,,,,,0,6,,, 30,12/09/15,00:09:00,DNS Update Request, ,Anya-PC.WIN.LSS.HR,,,0,6,,, P.Pale: Computer forensics 11
12 Used to access resources on the web Web applications Web APIs (especially interesting for mobile devices) Content (audio/video, images,.) Simple set of request messages GET, POST, HEAD, OPTIONS, DELETE, TRACE Simple set of response messages 1xx Informational Request received, continuing process 2xx Success The action was successfully received, understood and accepted 3xx Redirection Further action must be taken in order to complete the request 4xx Client Error The request contains bad syntax or cannot be fulfilled 5xx Server Error The server failed to fulfill an apparently valid request 34 provides a hierarchical distributed database for resolving the names that people prefer to use with the 32 bit IPv4 numerical addresses or 128 bit for IPv6 example: maja.zesoi.fer.hr > DNS is a query response response protocol Client typically asks a question within a single UDP packet Server responds with a single UDP packet It is possible to route normal DNS traffic over TCP server s response to a query is too large to fit within a single UDP packet DNS zone transfers transfer everything a DNS server knows about a domain a security risk!!! P.Pale: Computer forensics 12
13 Evidence acquisition Protocol analysis Packet analysis Flow analysis Network Logs Network devices Network intrusion detection/prevention systems Common network attacks Web browser forensics 37 The art and science of inspecting the protocols within a set of packets in order to Identify packets of interest and understand their structure and relationship in order to gather evidence and facilitate further analysis To identify packets of interest use filtering techniques to isolate packets based on protocol fields or their contents search for strings or patterns in packet contents to identify targets for further inspection even if the protocol in use is not yet known 38 Wireshark/tshark Include a display filter language allows the end user to isolate packets of interest based on protocol fields example: capture only packets from a specific computer to a specific computer $ tshark -r capturefile.pcap -R "ip.src == && ip.dst == " Hex editors 39 P.Pale: Computer forensics 13
14 Evidence acquisition Protocol analysis Packet analysis Flow analysis Network Logs Network devices Network intrusion detection/prevention systems Common network attacks Web browser forensics 40 practice of examining related groups of packets in order to identify patterns, analyze higher layer protocols, or extract data Flow is defined as: a sequence of packets sent from a particular source to a particular unicast, anycast, or multicast destination that the source desires to label as a flow. A flow could consist of all packets in a specific transport connection or a media stream. However, a flow is not necessarily 1:1 mapped to a transport connection P.Pale: Computer forensics 14
15 Tshark Can list all conversations and/or flows within a packet capture, or only specific flows based on their characteristics 43 Useful to identify the specific flows of interest so that we can get ready to extract the higher layer protocol data Example: $ pcapcat -r evidence01.pcap [1] TCP : : > : :80 [2] TCP :1271 -> :443 [3] TCP :1272 -> :5190 [4] TCP :1273 -> :80 Enter the index number of the conversation to dump or press enter to quit: 44 Files Can be crucial to any investigation Are often transported over a network Data Such as HTML/JavaScript and other resources on the WWW can be useful Wireshark Has the ability to extract all files and data that were transferred during a capture Network miner Point and click tool for extracting files & data, viewing network packets (similar to Wireshark): 45 P.Pale: Computer forensics 15
16 Evidence acquisition Protocol analysis Packet analysis Flow analysis Network Logs Network devices Network intrusion detection/prevention systems Common network attacks Web browser forensics 46 Why are they important? Event logs are simply selected records that provide information about the state of the system and/or environment at a given time Event logs may include information about system access (such as server logins and logouts), startup and shutdown times, errors and problems, or just routine data such as the data center temperature Where do they come from? Application servers, routers, firewalls, network devices, cameras, HVAC all kinds of other devices generate event logs Different types of devices generate different types of event logs Where are they stored? on the device that generates them on a computer in the network on a (remote?) computer dedicated to collecting logs 47 Sep 20 21:53:09 bigserver postfix/sendmail [10815]: fatal: usage: sendmail [options] Sep 20 22:27:48 bigserver postfix/sendmail [10961]: fatal: Recipient addresses must be specified on the command line or via the t option Sep 20 22:27:48 bigserver postfix/sendmail [10963]: fatal: Recipient addresses must be specified on the command line or via the t option Sep 20 22:28:29 bigserver postfix/sendmail [10979]: fatal: Recipient addresses must be specified on the command line or via the t option Sep 22 13:04:31 bigserver postfix/sendmail [24424]: fatal: usage: sendmail [options] Sep 22 15:32:07 bigserver postfix/postmap [25785]: fatal: open database /etc/postfix/generic.db: Permission denied Sep 22 15:55:40 bigserver postfix/postmap [26209]: fatal: open database /etc/postfix/virtual.db: Permission denied Sep 22 17:01:33 bigserver postfix [27072]: error: to submit mail, use the Postfix sendmail command Sep 22 17:01:33 bigserver postfix [27072]: fatal: the postfix command is reserved for the superuser 48 P.Pale: Computer forensics 16
17 Evidence acquisition Protocol analysis Packet analysis Flow analysis Network Logs Network devices Network intrusion detection/prevention systems Common network attacks Web browser forensics 49 Hub analogue only electrically restores the signal in order to span longer distances create star topology Switch digital collects whole packet and looks at addresses based on destination address forwards it on just one port there is no need to decide where to forward the packet outgoing port is taken from CAM table puts source address in CAM table all interfaces (ports) are of the same type and protocol typically works on Layer 2 although Layer 3 switches exist, too Router has potentially different interfaces and different protocols has to make the decision where to forward the packet depending on final destination address and properties of paths behind the port speed, error rate, usage, price, can perform network address translation an incoming packet sent to port X can be sent to completely different address internally likewise, outgoing packet will be appearing to com from router s port Y Firewall essentially a router but refuses to forward some packets both in and out depending on packet s source and destination addresses source and destination ports The line between switches, routers, and firewalls has become very blurred It only exists as a theoretical line, which is no longer strictly implemented at all if it ever really was What does that mean for the forensic investigator? The evidence you may expect to find on one device may actually exist on another A device called a switch may actually contain logs that you would expect to find on a firewall 51 P.Pale: Computer forensics 17
18 Network infrastructure devices contain configurations that reflect the state of the network and activities and the policies of the enterprise that s deployed them descriptive information about the investigated environment and (perhaps) evidence relating to a particular event of interest for example: blocked ports, subnets, port mirroring access lists, NAT, routing tables 52 Dynamic Random Access Memory (DRAM) very volatile and does not retain data (for long) when power is turned off operational data can be found here very difficult to capture Content Addressable Memory(CAM) a special kind of very fast memory used to store information that must be accessed extremely quickly most famously used on switches for storing tables that map MAC addresses to ports Nonvolatile Random Access Memory (NVRAM) retains data when the power is turned off, but can also be easily modified most common type found in network equipment is flash memory it is typically used to store configurations > instructions to device how to work also for logs Hard drive Most switches, routers, and firewalls do not include a hard drive However, general purpose servers can be configured to act as routers or firewalls Read Only Memory (ROM) ROM is a type of random access memory that is designed to permanently store data without modification it is typically used for storing device s programs HIGH Memory volatility LOW 53 Content Addressable Memory (CAM) Table Can be very valuable, since it contains the MAC addresses of the network cards communicating on the local subnet Very volatile and can change quickly, depending on network activity Example: 54 P.Pale: Computer forensics 18
19 when a computer needs to send an IP packet it has to be encapsulated in Layer 2 packet typically Ethernet (IEEE 802.3) which means MAC address is needed corresponding to IP address thesepairs are stored in ARPtable however, if table does not contain required pair ARP request is sent as a broadcast message on Layer 2 containing the IP address the computer using this IP address will respond thus, its MAC address will be associated with its IP address and remembered in ARP table 55 Routers are typically involved in investigations because: Traffic of interest may traverse the router, resulting in associated flow data and related records A router is one of the most basic logging devices on any network and also one of the most fundamental The network topology is the key to understanding evidence and incidents, and is described at Layer 3 by the aggregate of routing tables NOTE: The router itself may be compromised 56 Types of evidence that can be gathered from routers, categorized by expected volatility Volatile Routing tables, Stored packets before they are forwarded, Packet counts and statistics, ARP table, DHCP lease assignments, Access control lists, I/O memory, Running configuration, Processor memory, Flow data and related statistics Persistent Operating system image, Boot loader, Startup configuration files, Access logs, DHCP logs Off System Routers tend to include very little, if any, writable persistent storage on board Most enterprise class devices can be configured to automatically export data to external systems for storage through syslog, FTP, TFTP, SNMP, and other 57 P.Pale: Computer forensics 19
20 are essentially routers Capable of inspecting and filtering traffic to a much higher degree then routers Early firewalls were most often built and configured by local system administrators using general operating system tools and commercial or open source firewall software packages However, general purpose hardware introduced significant latency, and as a result inspection capabilities were limited Furthermore, system administrators were not always well versed in operating system hardening procedures 58 Firewall logs tend to include extensive information about connection attempts, whether or not these were successful, and if so, how much data was transferred from source to destination Firewall logs may also include extensive details regarding protocols and applications in use, or even packet contents Firewall configuration can reveal whether hth services or data dt were exposed to the world, or to systems of interest It can also inform an investigator as to the type of evidence that logs may or may not include An investigator may need to modify firewall configuration in order to collect more evidence, or to gain access to systems of interest during the course of an investigation NOTE: The firewall itself may be compromised 59 Packet Filters route packets and can allow or deny traffic based on source and destination addresses (at Layer 3) and Layer 4 protocol header information such as TCP ports and flags Session Layer firewall a device between the source and destination that intercepts connections in order to make stateful decisions whether the firewall will establish or continue a connection on behalf of the endpoints Application firewall take this concept even further by inspecting traffic all the way up to Layer 7 The protocols inspected and reconstructed vary depending on the manufacturer, model, and purpose of the device 60 P.Pale: Computer forensics 20
21 Evidence acquisition Protocol analysis Packet analysis Flow analysis Network Logs Network devices Network intrusion detection/prevention systems Common network attacks Web browser forensics 61 specialized sniffers with the added capability of evaluating captured traffic to determine whether it is malicious or legitimate After rebranding Most IDS systems have become IPS systems Intrusion Prevention Systems Over the years, IDS/IPS product space has developed two separate niches: NIDS/NIPS monitor network traffic and alert on suspicious network events HIDS/HIPS monitor system events and alert on suspicious system activities 62 Are often a very good starting point in an investigation They detect potentially adverse events via network monitoring Chances are they have logged the incident that is investigated Unfortunately They can t always reconstruct a sequence of events and explain them to us at least not easily Useful because: Logs contain details regarding illicit connections (or even attempts) that are not recorded anywhere else Can be configured to alert and log traffic that firewalls deem perfectly acceptable An investigator could potentially modify a NIDS/NIPS configuration to begin detecting events it wasn t previously configured to record NIDS/NIPS are well positioned as inspection points for network traffic 63 P.Pale: Computer forensics 21
22 Rules Descriptions of how to compare a packet or stream containing known malicious traffic Alerts Lists of suspicious packets/streams Packet captures Certain NIDS/NIPS can be configured to capture suspicious packets and save them for later analysis not always configured to do this by default Other features: Higher Layer Protocol Awareness for example: Signature Based Analysis explain Behavioral analysis explain 64 Types of Evidence Configuration Alert data Packet header and/or flow record information Packet payloads Activities correlated across multiple sensors NIDS/NIPS are specifically designed to sift through large amounts of network traffic and pick out specific events of interest particularly those that relate to security Useful as a starting point! 65 Commercial Check Point IPS 1 Cisco IPS Corero Network Security Enterasys IPS HPTippingPoint IPS IBM Security NIPS Sourcefire 3D System Open source Snort Bro Network Security Monitor 66 P.Pale: Computer forensics 22
Evidence Acquisition. Network Forensics. Jae Woong Joo
1 Evidence Acquisition Network Forensics Jae Woong Joo 2 Table of Contents 3.1 Physical Interception 3.2 Traffic Acquisition Software 3.3 Active Acquisition 3.4 Conclusion 3 3.1 Physical Interception It
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
COMPUTER NETWORK TECHNOLOGY (300)
Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant
Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time
Essential Curriculum Computer Networking 1 PC Systems Fundamentals 35 hours teaching time Part 1----------------------------------------------------------------------------------------- 2.3 hours Develop
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Network Traffic Analysis
2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing
Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours
Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
Introduction to Network Security Lab 1 - Wireshark
Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication
Packet Sniffing with Wireshark and Tcpdump
Packet Sniffing with Wireshark and Tcpdump Capturing, or sniffing, network traffic is invaluable for network administrators troubleshooting network problems, security engineers investigating network security
Network Security: Workshop
Network Security: Workshop Protocol Analyzer Network analysis is the process of capturing network traffic and inspecting it closely to determine what is happening on the network decodes,, or dissects,,
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series
Cisco IOS Firewall Feature Set Feature Summary The Cisco IOS Firewall feature set is available in Cisco IOS Release 12.0. This document includes information that is new in Cisco IOS Release 12.0(1)T, including
Connecting with Computer Science, 2e. Chapter 5 The Internet
Connecting with Computer Science, 2e Chapter 5 The Internet Objectives In this chapter you will: Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar
FIREWALLS & CBAC. [email protected]
FIREWALLS & CBAC [email protected] Implementing a Firewall Personal software firewall a software that is installed on a single PC to protect only that PC All-in-one firewall can be a single device that
Chapter 4 Connecting to the Internet through an ISP
Chapter 4 Connecting to the Internet through an ISP 1. According to Cisco what two things are essential to gaining access to the internet? a. ISPs are essential to gaining access to the Internet. b. No
Broadband Phone Gateway BPG510 Technical Users Guide
Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's
UIP1868P User Interface Guide
UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting
2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring
2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department
Multi-Homing Security Gateway
Multi-Homing Security Gateway MH-5000 Quick Installation Guide 1 Before You Begin It s best to use a computer with an Ethernet adapter for configuring the MH-5000. The default IP address for the MH-5000
Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN
Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Basic Network Configuration
Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the
Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)
s (March 4, 2015) Abdou Illia Spring 2015 Test your knowledge Which of the following is true about firewalls? a) A firewall is a hardware device b) A firewall is a software program c) s could be hardware
Chapter 2 TCP/IP Networking Basics
Chapter 2 TCP/IP Networking Basics A network in your home or small business uses the same type of TCP/IP networking that is used for the Internet. This manual provides an overview of IP (Internet Protocol)
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
Testing Network Security Using OPNET
Testing Network Security Using OPNET Agustin Zaballos, Guiomar Corral, Isard Serra, Jaume Abella Enginyeria i Arquitectura La Salle, Universitat Ramon Llull, Spain Paseo Bonanova, 8, 08022 Barcelona Tlf:
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Network Security. Network Packet Analysis
Network Security Network Packet Analysis Module 3 Keith A. Watson, CISSP, CISA IA Research Engineer, CERIAS [email protected] 1 Network Packet Analysis Definition: Examining network packets to determine
Lab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
Classification of Firewalls and Proxies
Classification of Firewalls and Proxies By Dhiraj Bhagchandka Advisor: Mohamed G. Gouda ([email protected]) Department of Computer Sciences The University of Texas at Austin Computer Science Research
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
Firewalls, IDS and IPS
Session 9 Firewalls, IDS and IPS Prepared By: Dr. Mohamed Abd-Eldayem Ref.: Corporate Computer and Network Security By: Raymond Panko Basic Firewall Operation 2. Internet Border Firewall 1. Internet (Not
Packet Capture. Document Scope. SonicOS Enhanced Packet Capture
Packet Capture Document Scope This solutions document describes how to configure and use the packet capture feature in SonicOS Enhanced. This document contains the following sections: Feature Overview
Practical Network Forensics
BCS-ISSG Practical Network Forensics Day BCS, London Practical Network Forensics Alan Woodroffe [email protected] www.securesystemssupport.co.uk Copyright Secure Systems Support Limited.
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Firewall Design Principles
Firewalls Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
COMPUTER NETWORK TECHNOLOGY (40)
PAGE 1 OF 9 CONTESTANT ID# Time Rank COMPUTER NETWORK TECHNOLOGY (40) Regional 2012 TOTAL POINTS (450) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant must
EKT 332/4 COMPUTER NETWORK
UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 332/4 COMPUTER NETWORK LABORATORY MODULE LAB 2 NETWORK PROTOCOL ANALYZER (SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK)
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Network Agent Quick Start
Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)
Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI
Appendix B Network, Routing, Firewall, and Basics
Appendix B Network, Routing, Firewall, and Basics This chapter provides an overview of IP networks, routing, and networking. Related Publications As you read this document, you may be directed to various
Network Forensics: Log Analysis
Network Forensics: Analysis Richard Baskerville Agenda P Terms & -based Tracing P Application Layer Analysis P Lower Layer Analysis Georgia State University 1 2 Two Important Terms PPromiscuous Mode
Chapter 4 Customizing Your Network Settings
. Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It
- Basic Router Security -
1 Enable Passwords - Basic Router Security - The enable password protects a router s Privileged mode. This password can be set or changed from Global Configuration mode: Router(config)# enable password
VisuSniff: A Tool For The Visualization Of Network Traffic
VisuSniff: A Tool For The Visualization Of Network Traffic Rainer Oechsle University of Applied Sciences, Trier Postbox 1826 D-54208 Trier +49/651/8103-508 [email protected] Oliver Gronz University
Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)
Assignment One ITN534 Network Management Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Unit Co-coordinator, Mr. Neville Richter By, Vijayakrishnan Pasupathinathan
Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall
Figure 5-1: Border s Chapter 5 Revised March 2004 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Border 1. (Not Trusted) Attacker 1 1. Corporate Network (Trusted) 2 Figure
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch
University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with
Protecting and controlling Virtual LANs by Linux router-firewall
Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia
Networked AV Systems Pretest
Networked AV Systems Pretest Instructions Choose the best answer for each question. Score your pretest using the key on the last page. If you miss three or more out of questions 1 11, consider taking Essentials
CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01
CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA Test Code: 8148 Version: 01 Specific competencies and skills tested in this assessment: Personal and Environmental Safety Wear personal protective
CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required
CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required Current Catalog Description: Computer network architectures and their application to industry needs.
Bro at 10 Gps: Current Testing and Plans
U.S. Department of Energy Bro at 10 Gps: Current Testing and Plans Office of Science Brian L. Tierney Lawrence Berkeley National Laboratory Bro s Use at LBL Operational 24 7 since 1996 Monitors traffic
SSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT
Network Security s Access lists Ingress filtering s Egress filtering NAT 2 Drivers of Performance RequirementsTraffic Volume and Complexity of Static IP Packet Filter Corporate Network The Complexity of
ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
UPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
From Network Security To Content Filtering
Computer Fraud & Security, May 2007 page 1/10 From Network Security To Content Filtering Network security has evolved dramatically in the last few years not only for what concerns the tools at our disposals
P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis
Agenda Richard Baskerville P Principles of P Terms & -based Tracing P Application Layer Analysis P Lower Layer Analysis Georgia State University 1 2 Principles Kim, et al (2004) A fuzzy expert system for
Introduction to Analyzer and the ARP protocol
Laboratory 6 Introduction to Analyzer and the ARP protocol Objetives Network monitoring tools are of interest when studying the behavior of network protocols, in particular TCP/IP, and for determining
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
IT4405 Computer Networks (Compulsory)
IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and
Detecting Threats in Network Security by Analyzing Network Packets using Wireshark
1 st International Conference of Recent Trends in Information and Communication Technologies Detecting Threats in Network Security by Analyzing Network Packets using Wireshark Abdulalem Ali *, Arafat Al-Dhaqm,
New Products and New Features May, 2015
NetAcquire Server 8 New Products and New Features May, 2015 1. Includes all NetAcquire 7.6 and earlier enhancements 2. Runs on a new real-time operating system: NetAcquire Deterministic Linux (NDL) a.
Chapter 12 Supporting Network Address Translation (NAT)
[Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information
LifeSize Video Communications Systems Administrator Guide
LifeSize Video Communications Systems Administrator Guide November 2009 Copyright Notice 2005-2009 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made
Network Security TCP/IP Refresher
Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)
F-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
Classic IOS Firewall using CBACs. 2012 Cisco and/or its affiliates. All rights reserved. 1
Classic IOS Firewall using CBACs 2012 Cisco and/or its affiliates. All rights reserved. 1 Although CBAC serves as a good foundation for understanding the revolutionary path toward modern zone based firewalls,
Network Terminology Review
Network Terminology Review For those of you who have experience with IP networks, this document may serve as a reminder of the current lexicon of terms used in our industry. If you re new to it or specialized
Domain 5.0: Network Tools
ExamForce.com CompTIA Network+ N10-004 Study Guide 1 Domain 5.0: Network Tools Chapter 5 5.1 Given a scenario, select the appropriate command line interface tool and interpret the output to verify functionality
Overview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.
Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with
Introduction to Passive Network Traffic Monitoring
Introduction to Passive Network Traffic Monitoring CS459 ~ Internet Measurements Spring 2015 Despoina Antonakaki [email protected] Active Monitoring Inject test packets into the network or send packets
Networking Devices. Lesson 6
Networking Devices Lesson 6 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Network Interface Cards Modems Media Converters Repeaters and Hubs Bridges and
BASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )
Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide
Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).
1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).
CCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
DEPLOYMENT GUIDE. This document gives a brief overview of deployment preparation, installation and configuration of a Vectra X-series platform.
This document gives a brief overview of deployment preparation, installation and configuration of a Vectra X-series platform. Traffic Requirements The Vectra X-series platform detects threats and attacks
Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1
Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 1 1 Objectives Identify a router as a computer with an OS and hardware designed for the routing process. Demonstrate
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Proxy Server, Network Address Translator, Firewall. Proxy Server
Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as
IP Addressing A Simplified Tutorial
Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PACKET SNIFFING MS. SONALI A. KARALE 1, MS. PUNAM P. HARKUT 2 HVPM COET Amravati.
Barracuda Link Balancer
Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503
Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1
Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton
Introduction to Computer Networks
Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,
CompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 40 Firewalls and Intrusion
