network forensics midterm

0.0(0)
studied byStudied by 3 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/84

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

85 Terms

1
New cards

Network Forensics or packet mining, packet forensics

capturing, storing, and analyzing network data.

2
New cards

Network Forensics can be obtained from

OS and disk then a network investigator collects the data from the attack, can provide info such as firewall and logs from apps and antivirus.

3
New cards

Digital Forensics

investigations from computers, digital media, and communications for potential artifacts indicated by an object of intrest

4
New cards

Incident response specialist

in charge of using digital forensics and investigates suspicious activity

5
New cards

Cryptographic hashes

methods used to demonstrate that evidence has not changed from the point of acquisition

6
New cards

hashing algorithms

are a 1 way function

7
New cards

key property of hashing algorithms: Deterministic

same input -> same output

8
New cards

key property of hashing algorithms: Fixed size

output size is constant e.g. SHA-256=256bits

9
New cards

key property of hashing algorithms: Fast to compute

efficient calculation even for large data

10
New cards

key property of hashing algorithms: Irreversibility resistance

hard to reverse, find the original input from the hash

11
New cards

key property of hashing algorithms: Collision resistance

hard to find 2 different inputs that produce the same hash

12
New cards

key property of hashing algorithms: Avalanche effect

small change in input -> drastic change in output

13
New cards

MD5

generally accepted ensures file has not been altered

14
New cards

SHA

verify integrity and accepted for large values

15
New cards

anytime you obtain a file, packet capture, or log file

generate a has value for it

16
New cards

MD5 hash value is 2583a3fab8faaba111a567b1e44c2fa4

considered non-linear, only has 128 bits

17
New cards

protocols

standard of communication, generally placed into stacks

18
New cards

two conceptual ideas for thinking about layers of network protocols:

the Open Systems Interconnect (OSI) model, & the Transmission Control Protocol/Internet Protocol (TCP/IP) suite

19
New cards

OSI model:

seven layers, a generic model, used by internet service providers and the network equipment vendors

20
New cards

TCP/IP:

four layers, operational model,

21
New cards

important:

every layer only talks to its own layer on the other side

22
New cards

encapsulation concept:

communication stacks, data passes from one layer to another, these layers make themselves unique by applying some data associated with their layer before passing it to the other layer.

23
New cards

de-encapsulation concept:

receiving end, headers are removed, before the data is sent to the next layer up the stack

24
New cards

OSI layers:

physical, data link, network, transport, session, presentation, application

25
New cards

OSI Layers: Physical

includes all tangible components such as cabling, network interfaces, and signaling medium (light or electrical)

26
New cards

OSI Layers: Data link

how systems on the same physical network communicate, MAC address attached to network interface

27
New cards

OSI Layers: Network

devices not on the same physical layer can communicate, requires the router to pass messages from one network to another, IP and IPX

28
New cards

OSI Layers: Transport

first layer where the message has fully arrived at the host.

29
New cards

OSI Layers: Session

the layer where communication streams between two hosts is managed; it determines how communication will happen, like one-way traffic

30
New cards

OSI Layers: Presentation

handles the conversion between network communication and the application; any data encoding, decoding, data formatting, and encryption/decryption would be done at this layer.

31
New cards

OSI Layers: Application

any application programming interfaces (APIs) would exist, where the user interface occurs

32
New cards

TCP/IP layers:

network access, internet, transport, application

33
New cards

TCP/IP Layers: Network access

this is where the MAC address lives, and this layer makes sure that systems on the same network can communicate. Both the physical and data link layers of the OSI model are represented by this layer

34
New cards

TCP/IP Layers: Internet

the same as the network layer in the OSI model, where the IP lives

35
New cards

TCP/IP Layers: Transport

corresponds to layer 4, shares the same name between OSI and TCP/IP model. The usage of ports

36
New cards

TCP/IP Layers: Application

encompasses all functions of layer 5-7 in the OSI model, apps reside here

37
New cards

protocol data units:

wrapped up in different headers from each layer, allowing the receiving system to identify where the data is headed

38
New cards

internet protocols are known for:

the many protocols that comprise the Internet, and are briefly covered as they occur in network traffic analysis

39
New cards

ICANN (Internet Corporation for Assigned Names and Numbers),

very top level, own the entire internet address space, hands out blocks to other organizations and assigns them to providers.

40
New cards

Every IP address is a network address and a host address

the subnet mask tells the computer which is the network part and which is the host. 32 bits long

41
New cards

ICMP is used to

transmit error messages, used for diagnostic purposes, and requests called pings

42
New cards

TCP offers

guaranteed delivery, meaning that the sending host will either get the message through or receive message through or receive a message indicating why a failure occurred.

43
New cards

three-way handshake:

establishes a connection between two systems

44
New cards

Program called Services are

listening to and responsible for managing communications

45
New cards

A service on a Unix-like system is typically called

a daemon

46
New cards

macOS does not

use the same systems as Unix-like systems

47
New cards

Linux services:

two different ways to manage services.

48
New cards

how to manage linux services: Init

all management scripts are at /etc/init.d

49
New cards

how to manage linux services: systemd

new manner to start and manage service

50
New cards

Connections:

TCP communications described as four-tuple

51
New cards

tools:

netstat, nbstat, ifconfig/ipconfig, sysinternals, ntop, task manager/resource monitor, arp

52
New cards

netstat:

command-line utility that provides much network info; the common options used are netstat -a, -r, -s

53
New cards

nbstat:

used to get stats related to NetBT

54
New cards

ifconfig/ipconfig:

shows IP address configurations for network interface on the system

55
New cards

Sysinternals:

Windows, over 121 programs, used to see TCPView, PsFile, and Process Explorer

56
New cards

capture packet tools:

tcpdump/tshark, wireshark, networkminer

57
New cards

tcpdump and tshark

console base tools

58
New cards

Wireshark

GUI based tool, visualization

59
New cards

NetworkMiner

a network forensics tool that pulls useful files and other evidence out of captured packets

60
New cards

port spanning (also called port mirroring)

cisco calls it switch port analyzer. problem = oversubscription

61
New cards

ARP Spoofing =

a type of cyber attack where a malicious actor sends fake Address Resolution Protocol (ARP) messages onto a local network.

62
New cards

Passive Scanning:

watches the data that passes across the network and reports specific details from all of the different layers. More than a summary of header information

63
New cards

Packet Analysis with Wireshark:

Extracts much information and analyzes it, providing statistics about the captured packets and combines the frames into communications, making sure to decode the data

64
New cards

Denial of service attacks (DOS):

makes a service unavailable for a user

65
New cards

SYN floods:

a type of DoS attack in which the attacker sends a large number of SYN requests (part of the TCP handshake) to a target server, but never completes the handshake by sending the final ACK

66
New cards

Malformed Packets:

issues with large packets that require fragmentation, which offset overlap - the target system could have issues in assembling the packet

67
New cards

UDP Floods:

The Purpose is to consume all available network bandwidth, only the CPU resources used to process UDP, but no admission control resources

68
New cards

Amplification Attacks:

A method of increasing the amount of requests sent to disable services and systems

69
New cards

Insider threats:

Same attacks as mentioned, but it is due to an insider, resulting in potential data loss, attacks from local networks, and it is easier to track down.

70
New cards

SQL Injection:

Inserting malicious SQL queries into input fields to manipulate databases and extract sensitive data.

71
New cards

Cross-Site Scripting (XSS):

Injecting malicious scripts into web pages viewed by other users to steal data, hijack sessions, or perform actions on their behalf

72
New cards

time difference:

attacks at off hours have a greater opportunity of not being detected

73
New cards

time zones:

The time zone provides a coherent understanding of when an event happened and where the system is located

74
New cards

traceroute:

a diagnostic tool, using TTL in the IP header to obtain the address if the router sends ICMP error message once the TTL becomes 0

75
New cards

whois:

query and response protocol used to retrieve information about the ownership and registration details of domain names, IP addresses, and autonomous system numbers (ASNs). It allows users to find out who owns a particular domain, when it was registered, and other related details.

76
New cards

geolocation:

get info from the location from the IP and different databases

77
New cards

Wifi positioning:

A database that collects information associated with people and their location, used to locate systems using wireless networks they connect to

78
New cards

location-based services:

done using JavaScript and web pages, using many of the previously seen methods to get and provide to a server

79
New cards

You won't always rely on packet capture, so

using incident detection systems, logging, and Antivirus can be good starting points.

80
New cards

NetFlow

is a protocol created by Cisco to help troubleshoot and analyze network activity, mainly used by network administrators, but also helpful for network forensic investigators to look into network issues or security events.

81
New cards

Logging

can come from Operating Systems and Application logs, as well as network devices like routers and switches. They are oen used to correlate with other data sources, such as NetFlow or packet captures, to analyze network activity. Centralized log servers allow logs from different sources to be collected and monitored in one place, making it easier to watch for issues

82
New cards

Syslog

is an old Unix-based logging system, used in Linux, Solaris, AIX, HP-UX, and macOS. originally functioned as a de facto standard until it was eventually fully standardized by the Internet Engineering Task Force (IETF)

83
New cards

syslog also

uses TCP and a non-default port to forward to, and uses UDP for the transport protocol and the default port

84
New cards

Antivirus programs

are valuable during investigations because their logs provide key details. The logs show when a file was flagged as potentially harmful and when virus definitions were updated. Antivirus soware works by using definitions of known malware to detect viruses in files.

85
New cards

Incident Response Preparation:

When an incident occurs, you will be much happier if you have systems and capabilities in place ahead of time.