Introduction to Network Forensics and Protocols

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/69

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

70 Terms

1
New cards

Network forensics

Capturing, storing, and analyzing network data.

2
New cards

Digital forensics

Investigating digital media for potential artifacts.

3
New cards

Incident response specialist

Professional investigating suspicious digital activity.

4
New cards

Cryptographic hashes

Methods to verify evidence integrity post-acquisition.

5
New cards

Hashing algorithms

One-way functions for data integrity verification.

6
New cards

Deterministic property

Same input yields the same output consistently.

7
New cards

Fixed size

Output size remains constant regardless of input.

8
New cards

Fast to compute

Efficient calculation for large data sets.

9
New cards

Irreversibility resistance

Difficult to retrieve original input from hash.

10
New cards

Collision resistance

Hard to find different inputs with identical hashes.

11
New cards

Avalanche effect

Small input change causes drastic output change.

12
New cards

MD5

Common hashing algorithm, 128 bits output.

13
New cards

SHA-256

Secure hashing algorithm, 256 bits output.

14
New cards

Protocols

Standards of communication in network stacks.

15
New cards

OSI model

Seven-layer generic model for network communication.

16
New cards

TCP/IP

Four-layer operational model for internet communication.

17
New cards

Encapsulation

Data passes through layers with added headers.

18
New cards

De-encapsulation

Headers removed as data ascends through layers.

19
New cards

Physical layer

Tangible components like cabling and interfaces.

20
New cards

Data link layer

Communication between systems on the same network.

21
New cards

Network layer

Enables communication between different networks.

22
New cards

Transport layer

Ensures complete message delivery to the host.

23
New cards

Session layer

Manages communication streams between hosts.

24
New cards

Presentation layer

Handles data formatting and encryption/decryption.

25
New cards

Application layer

User interface and application programming interfaces.

26
New cards

Network access layer

Ensures communication within the same network.

27
New cards

OSI Model

Framework for understanding network communication layers.

28
New cards

Internet Layer

Equivalent to network layer in OSI, where IP resides.

29
New cards

Transport Layer

Layer 4 of OSI, uses ports for communication.

30
New cards

Application Layer

Covers functions of layers 5-7 in OSI model.

31
New cards

Protocol Data Units

Data wrapped in headers for layer identification.

32
New cards

ICANN

Assigns internet address space to organizations.

33
New cards

IP Address

Consists of network and host address components.

34
New cards

Subnet Mask

Defines network and host portions of an IP.

35
New cards

ICMP

Transmits error messages and diagnostic requests.

36
New cards

TCP

Ensures guaranteed delivery of messages between hosts.

37
New cards

Three-Way Handshake

Method to establish a connection between systems.

38
New cards

Daemon

Service managing communications in Unix-like systems.

39
New cards

Linux Service Management

Includes init scripts and systemd for services.

40
New cards

TCP Communications

Described using a four-tuple structure.

41
New cards

Netstat

Utility providing network information via command line.

42
New cards

Nbstat

Retrieves statistics related to NetBIOS over TCP/IP.

43
New cards

Ifconfig/IPConfig

Displays IP address configurations of network interfaces.

44
New cards

Sysinternals

Windows toolset for advanced system monitoring.

45
New cards

Tcpdump

Console tool for capturing network packets.

46
New cards

Wireshark

GUI tool for analyzing captured network packets.

47
New cards

Port Spanning

Technique for monitoring network traffic on a switch.

48
New cards

ARP Spoofing

Cyber attack using fake ARP messages on a network.

49
New cards

Passive Scanning

Monitors network data for detailed reporting.

50
New cards

Packet Analysis

Analyzing captured packets for statistics and decoding.

51
New cards

Denial of Service (DoS)

Makes a service unavailable to users.

52
New cards

SYN Floods

Flooding a server with incomplete TCP handshakes.

53
New cards

Malformed Packets

Issues with large packets causing assembly problems.

54
New cards

UDP Floods

Consuming network bandwidth using UDP packets.

55
New cards

Amplification Attacks

Increasing requests to disable services and systems.

56
New cards

Insider Threats

Attacks originating from within the organization.

57
New cards

SQL Injection

Malicious SQL queries to manipulate databases.

58
New cards

Cross-Site Scripting (XSS)

Injecting scripts into web pages to steal data.

59
New cards

Time Difference

Attacks at off hours are less likely detected.

60
New cards

Time Zones

Understanding event timing and system location.

61
New cards

Traceroute

Diagnostic tool using TTL to trace network paths.

62
New cards

Whois

Protocol to retrieve domain ownership information.

63
New cards

Geolocation

Determining location from IP and databases.

64
New cards

Location-Based Services

Services using location data for user applications.

65
New cards

WiFi Positioning

Locating systems via wireless network connections.

66
New cards

NetFlow

Cisco protocol for analyzing network activity.

67
New cards

Logging

Collecting data from systems for analysis.

68
New cards

Syslog

Unix-based logging system standardized by IETF.

69
New cards

Antivirus Programs

Detecting malware using known virus definitions.

70
New cards

Incident Response Preparation

Pre-planning systems for effective incident management.