ESSAY BODY - NETWORK FORENSICS
To begin with, as the name applies network forensic investigators are experts who go into a network and collect data of an attack which was either ongoing or occurred long-ago. They basically observe and piece together the artefacts they see from various sources which include firewall, app-logs and antivirus logs ; an artefact in the digital forensics context meaning an object of interest or evidence(Messier, 2017). Most of this evidence must be handled well and proven to be unaltered to be admissible in a law of court.
One of the most common methods used by
investigators include cryptographic hashing, which is a good method used to
show that an evidence has not changed. Any file obtained must be immediately
hashed, that includes packet captures and log files. According to Messier(2017,
p. 5) : “The best way to
demonstrate that evidence has not changed from the point of acquisition is to
use a cryptographic hash.”
Cryptographic Hashing is a mathematical process
that is easy to perform but difficult to reverse, in other words it is a method
of cryptography which converts any form of input into a unique string of text(Ray,2017).
For instance, if there was a file containing
network information of a particular time, generating a cryptographic hash for
that file would output a fixed length value which then could be used as a form
of authenticity in a court of law as if the hash value remains the same, it is
an indicator that the file hasn’t been altered(Messier,2017).
Message Digest 5, or MD5 in short is an example of
a widely used cryptographic hash function. Developed in 1991 by Ronald Rivest,
MD5 algorithm generates a 128-bit hash value.(Techopedia,
n.d.)
Another common hash function would be the Secure
Hash Algorithm(SHA). The first version of SHA is SHA-1 which generates a
160-bit hash while SHA-256 which is a variant of SHA-2 returns a value of
256-bits(Lowery, 2020).
To avoid collisions, which in this context means
the creation of same hashes for two separate data sets; an algorithm which
generates longer values is preferred, which is why the MD5 has been replaced by
the SHA algorithm(Messier,2017).
An example of a tool used to generate such values
would be the File Checksum Identity Verifier(FCIV) which is a utility provided
by Windows.
Another technique that is used by network forensic
experts is packet capture and analysis. Whatever happens in a wire is accurate
as you are reading electrical signals of a cable seeing what occurs
precisely(Messier,2017). A network packet is a unit of data that flows from a
sender to a receiver, or an origin to a destination address within an internet
or a packet-switched network(Liveaction,
n.d.). Most packets are split into three parts which includes a header, payload
and a trailer. Headers include sender and receiver IP addresses, protocol and
packet number. Payloads include data and the trailer includes error checking(HowStuffWorks, n.d.)
When it comes to network traffic analysis, Wireshark
is the world’s leading network traffic analyser which is free and allows the
analysis of network traffic in real-time(Porup, 2018).
While using Wireshark, you could provide a capture
filter on the capture header area which will allow the narrowing of packets
that will be captured. Next, a network interface must be selected which will
then show 3 different analysis windows, top window being the packet list pane,
middle one being the packet details pane which shows the header information of
the packet selected in the packet list pane(Hackers-arise,
2018). Finally, the third window being the Packet
Bytes Pane will be showing the payload information in hexadecimal and ASCII
format(Hackers-arise, 2018).
Moreover, according to Messier(2017, p.98) : “Wireshark keeps track of a lot of information as
it gathers each frame and it also does a lot of the decoding and dissection for
us. Additionally, it will provide a lot of statistics about the capture, which
can be very useful for certain types of investigations.” Which simply
states that it lessens the load on the investigators as it keep track of the
information it gathers from each frame without the need for them to decode and
dissect it and provides statistics which could help with the investigation.
Comments
Post a Comment