Network Forensics
- Configure and run open-source Snort and write Snort signatures 
- Configure and run open-source Zeek to provide a hybrid traffic analysis framework 
- Understand TCP/IP component layers to identify normal and abnormal traffic 
- Use open-source traffic analysis tools to identify signs of an intrusion 
- Comprehend the need to employ network forensics to investigate traffic to identify a possible intrusion 
- Use Wireshark to carve out suspicious file attachments 
- Write tcpdump filters to selectively examine a particular traffic trait 
- Craft packets with Scapy 
- Use the open-source network flow tool SiLK to find network behavior anomalies 
- Use your knowledge of network architecture and hardware to customize placement of IDS sensors and sniff traffic off the wire 
- How to identify potentially malicious activities for which no IDS has published signatures 
- How to place, customize, and tune your IDS/IPS for maximum detection 
- Hands-on detection, analysis, and network forensic investigation with a variety of open-source tools 
- TCP/IP and common application protocols to gain insight about your network traffic, enabling you to distinguish normal from abnormal traffic 
- The benefits of using signature-based, flow, and hybrid traffic analysis frameworks to augment detection 
 
- Concepts of TCP/IP 
- Why is it necessary to understand packet headers and data? 
- TCP/IP communications model 
- Data encapsulation/de-encapsulation 
- Discussion of bits, bytes, binary, and hex 
 
- Introduction to Wireshark 
- Navigating around Wireshark 
- Examination of Wireshark statistics 
- Stream reassembly 
- Finding content in packets 
 
- Network Access/Link Layer: Layer 2 
- Introduction to 802.x link layer 
- Address resolution protocol 
- ARP spoofing 
 
- IP Layer: Layer 3 
- IPv4 
- Examination of fields in theory and practice 
- Checksums and their importance, especially for an IDS/IPS 
- Fragmentation: IP header fields involved in fragmentation, composition of the fragments, fragmentation attacks 
 
- IPv6 
- Comparison with IPv4 
- IPv6 addresses 
- Neighbor discovery protocol 
- Extension headers 
- IPv6 in transition 
 
 
- Wireshark Display Filters 
- Examination of some of the many ways that Wireshark facilitates creating display filters 
- Composition of display filters 
 
- Writing BPF Filters 
- The ubiquity of BPF and utility of filters 
- Format of BPF filters 
- Use of bit masking 
 
- TCP 
- Examination of fields in theory and practice 
- Packet dissection 
- Checksums 
- Normal and abnormal TCP stimulus and response 
- Importance of TCP reassembly for IDS/IPS 
 
- UDP 
- Examination of fields in theory and practice 
- UDP stimulus and response 
 
- ICMP 
- Examination of fields in theory and practice 
- When ICMP messages should not be sent 
- Use in mapping and reconnaissance 
- Normal ICMP 
- Malicious ICMP 
 
- Real-World Analysis -- Command Line Tools 
- Regular Expressions fundamentals 
- Rapid processing using command line tools 
- Rapid identification of events of interest 
 
- Scapy 
- Packet crafting and analysis using Scapy 
- Writing a packet(s) to the network or a pcap file 
- Reading a packet(s) from the network or from a pcap file 
- Practical Scapy uses for network analysis and network defenders 
 
- Advanced Wireshark 
- Exporting web objects 
- Extracting arbitrary application content 
- Wireshark investigation of an incident 
- Practical Wireshark uses for analyzing SMB protocol activity 
- Tshark 
 
- Detection Methods for Application Protocols 
- Pattern matching, protocol decode, and anomaly detection challenges 
 
- DNS 
- DNS architecture and function 
- Caching 
- DNSSEC 
- Malicious DNS, including cache poisoning 
 
- Microsoft Protocols 
- SMB/CIFS 
- MSRPC 
- Detection challenges 
- Practical Wireshark application 
 
- Modern HTTP and TLS 
- Protocol format 
- Why and how this protocol is evolving 
- Detection challenges 
 
- SMTP 
- Protocol format 
- STARTTLS 
- Sample of attacks 
- Detection challenges 
 
- IDS/IPS Evasion Theory 
- Theory and implications of evasions at different protocol layers 
- Sampling of evasions 
- Necessity for target-based detection 
 
- Identifying Traffic of Interest 
- Finding anomalous application data within large packet repositories 
- Extraction of relevant records 
- Application research and analysis 
- Hands-on exercises after each major topic that offer students the opportunity to reinforce what they just learned. 
 
- Network Architecture 
- Instrumenting the network for traffic collection 
- IDS/IPS deployment strategies 
- Hardware to capture traffic 
 
- Introduction to IDS/IPS Analysis 
- Function of an IDS 
- The analyst's role in detection 
- Flow process for Snort and Zeek 
- Similarities and differences between Snort and Zeek 
 
- Snort 
- Introduction to Snort 
- Running Snort 
- Writing Snort rules 
- Solutions for dealing with false negatives and positives 
- Tips for writing efficient rules 
 
- Zeek 
- Introduction to Zeek 
- Zeek Operational modes 
- Zeek output logs and how to use them 
- Practical threat analysis 
- Zeek scripting 
- Using Zeek to monitor and correlate related behaviors 
- Hands-on exercises, one after each major topic, offer students the opportunity to reinforce what they just learned. 
 
- Introduction to Network Forensics Analysis 
- Theory of network forensics analysis 
- Phases of exploitation 
- Data-driven analysis vs. Alert-driven analysis 
- Hypothesis-driven visualization 
 
- Using Network Flow Records 
- NetFlow and IPFIX metadata analysis 
- Using SiLK to find events of interest 
- Identification of lateral movement via NetFlow data 
 
- Examining Command and Control Traffic 
- Introduction to command and control traffic 
- TLS interception and analysis 
- TLS profiling 
- Covert DNS C2 channels: dnscat2 and Ionic 
- Other covert tunneling, including The Onion Router (TOR) 
 
- Analysis of Large pcaps 
- The challenge of analyzing large pcaps 
- Students analyze three separate incident scenarios. 
 
Last updated
Was this helpful?