CH 11
CH 11
CH 11
and Investigations
Fourth Edition
Chapter 11
Virtual Machines, Network
Forensics, and Live Acquisitions
Objectives
• Network forensics
– Systematic tracking of incoming and outgoing traffic
• To ascertain how an attack was carried out or how an
event occurred on a network
• Intruders leave trail behind
• Determine the cause of the abnormal traffic
– Internal bug
– Attackers
Securing a Network
• Computer forensics
– Work from the image to find what has changed
• Network forensics
– Restore drives to understand attack
• Work on an isolated system
– Prevents malware from affecting other systems
Reviewing Network Logs
• Sysinternals
– A collection of free tools for examining Windows
products
• Examples of the Sysinternals tools:
– RegMon shows Registry data in real time
– Process Explorer shows what is loaded
– Handle shows open files and processes using them
– Filemon shows file system activity
SysInternals
• Link Ch 11b
Using Network Tools (continued)
• BackTrack
– Contains more than 300 tools for network scanning,
brute-force attacks, Bluetooth and wireless networks,
and more
– Includes forensics tools, such as Autopsy and Sleuth
Kit
– Easy to use and frequently updated
Using Packet Sniffers
• Packet sniffers
– Devices or software that monitor network traffic
– Most work at layer 2 or 3 of the OSI model
• Most tools follow the PCAP format
• Some packets can be identified by examining the
flags in their TCP headers
TCP Header
• From Wikipedia
Tools