written 6.8 years ago by | modified 6.6 years ago by |
Subject: Digital Forensics
Topic: Network Forensics
Difficulty: High
written 6.8 years ago by | modified 6.6 years ago by |
Subject: Digital Forensics
Topic: Network Forensics
Difficulty: High
written 6.6 years ago by |
SYSINTERNALS: Sysinternals is a collection of free tools for examining Windows products. few examples of the powerful Windows tools available at Sysinternals:
RegMon shows all Registry data in real time.
Process Explorer shows what files, Registry keys, and dynamic link libraries (DLLs) are loadedat a specific time.
Handle shows what files are open and which processes are using these files.
Filemon shows file system activity.
PsTools is a suite created by Sysinternals that includes the following tools:
PsExec—Runs processes remotely
PsGetSid —Displays the security identifier (SID) of a computer or user
PsKill—Kills processes by name or process ID
PsList —Lists detailed information about processes
PsLoggedOn —Displays who’s logged on locally
PsPasswd—Allows you to change account passwords
PsService —Enables you to view and control services
PsShutdown—Shuts down and optionally restarts a computer
PsSuspend—Allows you to suspend processes
These tools help you monitor your network efficiently and thoroughly.Using UNIX/Linux Tools
Knoppix Security Tools
1.:Distribution is a bootable Linux CD intended for computer and network forensics.
2.Knoppix-STD contains several forensically sound tools put together by Klaus Knopper that aremaintained and updated by Knoppix users.
A few of the Knoppix-STD tools include the following:
dcfldd—The U.S. DOD computer forensics lab version of the dd command
memfetch—Forces a memory dump
photorec—Retrieves files from a digital camera
snort—A popular IDS that performs packet capture and analysis in real time
USING PACKET SNIFFERS
1 Packet sniffers are devices and/or software placed on a network to monitor traffic.
2 On TCP/IP networks, sniffers examine packets, hence the term “packet sniffers.”
3 Most packet sniffers work at Layer 2 or 3 of the OSI model.
4 Some sniffers perform packet captures, some are used for analysis, and some handle both tasks.
5 Most packet sniffing tools can read anything captured in Pcap (packet capture) format.
6 In a SYN flood attack, the attacker keeps asking your serve To find these packets, Tcpdump, Wireshark, and Snort can be programmed to examine TCP headers to find the SYN flag.
Ngrep: It can be used to examine e-mail headers or IRC logs. It collects and hashes data for verification.r to establish a connection.