commit
This commit is contained in:
BIN
00_Archive/images/headerformat.png
Normal file
BIN
00_Archive/images/headerformat.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 165 KiB |
BIN
00_Archive/images/headerformat2.png
Normal file
BIN
00_Archive/images/headerformat2.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 150 KiB |
BIN
00_Archive/images/headerformat2u.png
Normal file
BIN
00_Archive/images/headerformat2u.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 150 KiB |
BIN
00_Archive/images/headerformatu.png
Normal file
BIN
00_Archive/images/headerformatu.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 165 KiB |
BIN
00_Archive/images/ports.png
Normal file
BIN
00_Archive/images/ports.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 54 KiB |
@@ -7,15 +7,13 @@ One of the more common activities in digital forensics is the recovery of delete
|
||||
Below is a screenshot of the output of the Sleuth Kit file listing tool (fls) which shows two files that have been “deleted” by the user but are still recoverable. The ability to recover and save what was previously thought to be deleted files can be very valuable in an investigation. <br>
|
||||
|
||||
<p align="center">
|
||||
<img width="350px" src="fileanalysis.png" alt="Logo"/>
|
||||
<img width="450px" src="/00_Archive/images/fileanalysis.png" alt="FileAnalysis"/>
|
||||
</p>
|
||||
|
||||
 <br>
|
||||
|
||||
Specifically, when looking at the analysis of files, an investigator needs to start with the file header. File headers are information about a file that the computer stores so that it knows what type of file it is. Typically, file headers are stored in the first 4 or 5 bytes of a file. By using the hexdump tool, the hexadecimal version of a file can be viewed. Hexdump is available on most Linux distributions and there are many Windows interfaces to Hexdump (ex. https://sourceforge.net/projects/hexdump/). <br>
|
||||
|
||||
One of the more interesting items that occur during an investigation is when a suspect tries to disguise a file by changing an incriminating file’s signature. Having a good understanding of file signatures is important. Below is an exert from a larger list of file signatures of the more common files seen during investigations. A larger list can be seen at the following location: https://en.wikipedia.org/wiki/List_of_file_signatures <br>
|
||||
|
||||
<p align="center">
|
||||
<img width="450px" src="00_Archive/images/CD main logo-01.png" alt="Logo"/>
|
||||
<img width="450px" src="00_Archive/images/filesignatures.png" alt="FileSignatures"/>
|
||||
</p>
|
||||
44
Skills/Network_Traffic_Analysis/README.md
Normal file
44
Skills/Network_Traffic_Analysis/README.md
Normal file
@@ -0,0 +1,44 @@
|
||||
# Network Traffic Analysis
|
||||
|
||||
Network traffic analysis begins by understanding the components of network communication. In this context, it will be key to understand the components of network
|
||||
packets in addition to having the ability to capture, filter, and interpret traffic. Wireshark is very good at packet capture and protocol analysis and is one of the better tools for helping with understanding of network traffic. <br>
|
||||
|
||||
Wireshark can be downloaded here: https://www.wireshark.org <br>
|
||||
|
||||
The above website contains several tutorials and presentations to help get students up to speed on the use and value of Wireshark. <br>
|
||||
|
||||
<i>IP addresses</i> <br>
|
||||
|
||||
IP addresses are numeric labels that identify a device (computer, laptop, mobile device) on the Internet or local network. There are two standards for IP addresses: IP Version 4 (IPv4) and IP Version 6 (IPv6). IPv4 is more common, but many are starting to use the new IPv6 standard. Below is a quick overview of IPv4 <br>
|
||||
|
||||
In order to create a unique address on the network, IPv4 uses 32 binary bits. Typically, an IPv4 address is expressed using four numbers separated by dots. Each of these numbers are the decimal (base-10) representation for an eight-digit binary (base-2) number, also called an octet. For example: 130.160.43.57 <br>
|
||||
|
||||
<i>Ports and Protocols</i> <br>
|
||||
|
||||
At the Transport layer, TCP and UDP protocols provide the identification of the network ports. These port numbers determine how incoming network traffic to a system should be directed. Network ports provide the ability for a single system with a signal IP address to handle multiple network services and connections. Each single system can have up to 65535 unique ports and each of these ports can identify a distinct service. <br>
|
||||
|
||||
The Internet Corporation for Assigning Names and Numbers (ICANN), which regulates port usage, has established 3 categories for ports: well known ports for common
|
||||
protocols and services (0-1023), registered ports for specific services (1024-49151), and dynamic ports which are assigned and release based on a session (49152-65535). <br>
|
||||
|
||||
Below is a table of common (well-known) ports and associative service name. <br>
|
||||
|
||||
<p align="center">
|
||||
<img width="450px" src="/00_Archive/images/ports.png" alt="Ports"/>
|
||||
</p>
|
||||
|
||||
Below are the header format and definitions for both IPv4 and TCP from https://nmap.org/book/tcpip-ref.html. This site provides a good reference for this
|
||||
information. <br>
|
||||
|
||||
<p align="center">
|
||||
<img width="450px" src="/00_Archive/images/headerformat.png" alt="hf1"/>
|
||||
</p>
|
||||
<p align="center">
|
||||
<img width="450px" src="/00_Archive/images/headerformatu.png" alt="hf1u"/>
|
||||
</p>
|
||||
|
||||
<p align="center">
|
||||
<img width="450px" src="/00_Archive/images/headerformat2.png" alt="hf2"/>
|
||||
</p>
|
||||
<p align="center">
|
||||
<img width="450px" src="/00_Archive/images/headerformat2u.png" alt="hf2u"/>
|
||||
</p>
|
||||
Reference in New Issue
Block a user