{"id":339,"date":"2015-10-24T19:04:53","date_gmt":"2015-10-24T11:04:53","guid":{"rendered":"http:\/\/note.systw.net\/note\/?p=339"},"modified":"2023-10-30T19:30:05","modified_gmt":"2023-10-30T11:30:05","slug":"network-forensics","status":"publish","type":"post","link":"https:\/\/systw.net\/note\/archives\/339","title":{"rendered":"Network forensics"},"content":{"rendered":"\n<p><strong>Network forensics<\/strong><br>sniffing, recording, acquisition and analysis of the network traffic and event logs in order to investigate a network security incident.<\/p>\n\n\n\n<p><strong>Infomation from Network forensics :<\/strong><br>Source of security incidents<br>Path of the attack<br>Intrusion techniques used by attackers<\/p>\n\n\n\n<p><strong>Network addressing schemes<\/strong><br>Mac address: for LAN<br>IP: for internet addressing<\/p>\n\n\n\n<p><strong>\u91cd\u5efa\u7db2\u8def\u72af\u7f6a\u9451\u8b58\u7684\u4e09\u5927\u57fa\u790e<\/strong><br>temporal analysis : \u5354\u52a9\u8fa8\u8a8d\u6642\u9593\u8207\u76f8\u95dc\u8b49\u64da<br>Relational analysis : \u5354\u52a9\u8fa8\u8a8d\u54ea\u4e9b\u9023\u7dda\u8ddf\u72af\u7f6a\u6709\u95dc<br>Functional analysis : \u5354\u52a9\u8fa8\u8a8d\u54ea\u4e9b\u662f\u72af\u7f6a\u9020\u6210\u7684event<br>refer<br>http:\/\/wenku.baidu.com\/view\/da7fbcd0360cba1aa811da11.html?re=view<\/p>\n\n\n\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Network Attack<\/strong><\/h2>\n\n\n\n<p><strong>Network attack<\/strong><br>most attacks are from inside the organization<\/p>\n\n\n\n<p><strong>Common type of network attacks<\/strong><br><strong>enumeration<\/strong>: \u6536\u96c6\u76ee\u6a19\u8cc7\u8a0a<br><a href=\"https:\/\/systw.net\/note\/af\/sblog\/more.php?id=165\">https:\/\/systw.net\/note\/af\/sblog\/more.php?id=165<\/a><br><strong>denial of service attack<\/strong><br><a href=\"https:\/\/systw.net\/note\/af\/sblog\/more.php?id=170\">https:\/\/systw.net\/note\/af\/sblog\/more.php?id=170<\/a><br><strong>packet sniffing<\/strong><br><a href=\"https:\/\/systw.net\/note\/af\/sblog\/more.php?id=169\">https:\/\/systw.net\/note\/af\/sblog\/more.php?id=169<\/a><br><strong>session sniffing<\/strong>: \u5e38\u7528\u5728\u7db2\u9280\u5077victim\u7684session\u7528\u4ee5\u5047\u5192victm\u4ea4\u6613<br><a href=\"https:\/\/systw.net\/note\/af\/sblog\/more.php?id=171\">https:\/\/systw.net\/note\/af\/sblog\/more.php?id=171<\/a><br><strong>buffer overflow<\/strong><br><a href=\"https:\/\/systw.net\/note\/af\/sblog\/more.php?id=172\">https:\/\/systw.net\/note\/af\/sblog\/more.php?id=172<\/a><br><strong>trojan horse<\/strong><br><a href=\"https:\/\/systw.net\/note\/af\/sblog\/more.php?id=168\">https:\/\/systw.net\/note\/af\/sblog\/more.php?id=168<\/a><\/p>\n\n\n\n<p>&#8230;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Traffic capturing and analysis tools<\/strong><\/h3>\n\n\n\n<p><strong>Sniffer network tool \u3000<\/strong><br>network miner<br>wireshark<br>tcpdump<br>windump<br>ettercap<\/p>\n\n\n\n<p><strong>Tool: network miner<\/strong><br>\u53ef\u5c07sniffer\u7684raw data\u4ee5\u8cc7\u8a0a\u65b9\u5f0f\u5448\u73fe<br>\u53ef\u8b80sniffier\u6a94\u6848\u548c\u76f4\u63a5sniffer\u505a\u5206\u6790<br>funcation include below<br>host: \u7d71\u8a08\u8cc7\u8a0a,IP,\u5361\u865f<br>files: \u986f\u793a\u4ec0\u9ebc\u6a94\u6848\u88ab\u50b3\u8f38<br>img:\u76f4\u63a5\u6293\u5716<br>messages: \u4e0d\u52a0\u5bc6\u7684email\u6216\u6587\u5b57\u8a0a\u606f\u53ef\u4ee5\u88ab\u986f\u793a\u51fa\u4f86<br>credentials; \u5217\u51fa\u8207\u5e33\u5bc6\u6709\u95dc\u7684\u8cc7\u8a0a<br>parameters: \u5217\u51fahtml\u8868\u55ae\u76f8\u95dc\u53c3\u6578<br>keywords: \u53ea\u5217\u51fa\u6709\u6307\u5b9a\u95dc\u9375\u5b57\u76f8\u95dc\u7684packet\u5167\u5bb9<br>cleartext: \u5217\u51fa\u6240\u6709\u660e\u78bc<br>anomalies: \u7c21\u55ae\u7570\u5e38\u5075\u6e2c<\/p>\n\n\n\n<p>ps:<br>tool: Fwanalog(FWanalog parse firewall log)<br>\u5206\u6790firewall log\u7684\u7a0b\u5f0f<\/p>\n\n\n\n<p>ps:<br>elastic packetbeat: \u5206\u6790packet<\/p>\n\n\n\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Email Crimes<\/strong><\/h2>\n\n\n\n<p>About Email basic<br><a href=\"https:\/\/systw.net\/note\/af\/sblog\/more.php?id=66\">https:\/\/systw.net\/note\/af\/sblog\/more.php?id=66<\/a><\/p>\n\n\n\n<p><strong>Email crime category<\/strong><br>email attack: phishing, spamming,&#8230;etc<br>email\u8f14\u52a9\u72af\u7f6a: \u7f6a\u72af\u901a\u8a0a\u9593\u7684email<\/p>\n\n\n\n<p>Common email attack<br><strong>email spamming<\/strong><br><strong>email bombing\/mail storm<\/strong><br>sending huge volumes of email to an address in an attempt to overflow the mailbox, or overwhelm the server where the email address is hosted, to cause a denial-of-service attack<br><strong>phishing<\/strong><br>The criminal act of sending an illegitimate email, falsely claiming to be from a legitimate site in an attempt to acquire the user&#8217;s personal or account information<br><strong>email spoofing<\/strong><br>The forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source<\/p>\n\n\n\n<p>&#8230;<\/p>\n\n\n\n<p>Steps to investigate<\/p>\n\n\n\n<p><strong>First step in the investigation<\/strong><br>Trace the IP address to its origin<\/p>\n\n\n\n<p><strong>Common information for investigation<\/strong><br>user account that was used to send the account<br>unique message identifier<br>contents of the e-mail message<br>date and time the message was sent<\/p>\n\n\n\n<p><strong>E-mail\u9451\u8b58<\/strong><br>1.Examining an e-mail message<br>2.Copying an e-mail message<br>3.Printing an e-mail message<br>4.Viewing e-mail address<br>5.Examining an e-mail header<br>6.Emamining attachments<br>7.tracing and E-mail<br>refer<br>http:\/\/wenku.baidu.com\/view\/da7fbcd0360cba1aa811da11.html?re=view<\/p>\n\n\n\n<p>ps:<br><strong>microsoft outlook email file<\/strong><br>default path:\u3000C:Users%username%AppDataLocalMicrosoftOutlook<br>.pst, Outlook\u90f5\u4ef6\u8cc7\u6599\u6a94<br>.ost, \u4f7f\u7528exchange\u7684outlook\u5feb\u53d6\u90f5\u4ef6\u6a94<br>.dbx, outlook express \u90f5\u4ef6\u8cc7\u6599\u6a94<br><br>ps:<br><strong>Exchange server tracking log<\/strong><br>if message tracking enabled.<br>the message tracking log file:&nbsp;C:Program FilesExchsrvrservername.log<\/p>\n\n\n\n<p>&#8230;<\/p>\n\n\n\n<p>Email forensics tool<\/p>\n\n\n\n<p><strong>Email header analysis<\/strong><br>http:\/\/mxtoolbox.com\/EmailHeaders.aspx<\/p>\n\n\n\n<p><strong>Common email forensics tool<\/strong><br>EnCase<br>FTK<br>FINALeMail<br>Sawmill-GroupWise<br>Audimation for Logging<br>R-Mail<br>Paraben&#8217;s Email Examiner<br>EMailTrackerPro<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Network forensicssniffing, rec &#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[11],"tags":[],"class_list":["post-339","post","type-post","status-publish","format-standard","hentry","category-forensics"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/posts\/339","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/comments?post=339"}],"version-history":[{"count":0,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/posts\/339\/revisions"}],"wp:attachment":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/media?parent=339"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/categories?post=339"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/tags?post=339"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}