Network Forensics Flashcards
SPAN
Allows for the copying of ingress and/or egress communications from one or more switch ports to another
Packet Sniffer
A piece of hardware or software that records data from frames as they pass over network media using methods such as a mirrored port or tap device
tcpdump
A data-network packet analyzer computer program that runs under a
command line interface
▪ It allows the user to display TCP/IP and other packets being transmitted or received over a network to which the computer is attached
Flow Collector
means of recording metadata and statistics about network traffic rather than recording each frame
Zeek (Bro)
a hybrid tool that passively monitors a network like a sniffer and
only logs data of potential interest
MRTG
is a tool used to create graphs showing traffic flows through the network interfaces of routers and switches by polling the appliances using (SNMP)
DGA
a method used by malware to evade block lists by dynamically generating domain names for C2 networks
Fast Flux Network
malware to hide the presence of C&C networks by continually changing the host IP addresses in domain records using domain generation algorithms
Secure Recursive DNS Resolver
occurs when one trusted DNS server communicates with several other trusted DNS servers to hunt down an IP address and returns it to the client
Unsafe Character in URL
Null string termination, carriage return, line feed, end of file, tab,
space, and \ < > { } PERCENT ENCODING - different percentage means a certain character
Drop Versus Reject
A deny rule can either drop a packet or explicitly reject it by sending a TCP RST or an ICMP port/protocol unreachable to the requester. Dropping harder to ID port states
Black hole vs Dark Net vs Sinkhole
Drops packet into void, port not used, and sends to different network for analysis
Transparent vs non transparent proxy
server directs request/ response without configuration. Has to be configured with proxy address and port
Common IPSs
Snort, Zeek, Security Onion - all open-source DPS/IDS
Snort Rule Format
Action Protocol SourceIP SourcePort Direction - alert tcp $EXTERNAL_NET any -> $HOME_NET 143. IPS rule
NAC w/ 802.1x
Provides the means to authenticate users and evaluate device integrity
before a network connection is permitted, usually authentication inside switch or router. Standard for EAP communication over LAN, port based authentication. USAF Network