Why has network forensics become critical?
Explosion in breaches across home/corporate/internet/vehicle networks. Blurring of physical vs cloud data.
Common devices (laptops, phones, smart TVs, Alexa, IoT) all leave traces.
List the main sources of network forensic evidence.
Firewall / IDS alerts
Captured (“sniffed”) network traffic
ISP logs, network device logs (switches/routers)
Application logs (web servers, email)
VoIP traffic
Security monitoring (e.g., NetFlow)
What organisational challenges exist in network investigations?
Often handled by general IT staff - poor evidence handling.
High stakes - financial liability, reputation.
Investigations span client devices + interlinked distributed servers/services.
What are the main difficulties in network forensics?
Distributed systems - hard to capture everything
Transient data (network flows) - dynamic; use system logs where possible
Encryption - still possible to capture metadata
Closed vs Open systems – definitions?
Closed: Never connected to internet or other systems
Open: Ever connected (most real-world systems)
What are the two opportunities for forensic capturing?
Real-time capture and analysis (live)
Retroactive capture and analysis (logs/artefacts)
Why use layered models like OSI/TCP/IP?
Simplifies complex processes
Abstraction
Interoperability across vendors
Easier troubleshooting by isolating layers.
OSI Layer: 7 Application (purpose, data type, forensic notes)
User/app services (HTTP, DNS, SMTP)
HTTP, DNS, SMTP
Client-server, peer-to-peer
OSI Layer: 6 Presentation (purpose, data type, forensic notes)
Data readability (encryption, format conversion)
mp3, jpeg
Encryption challenges
OSI Layer: 5 Session (purpose, data type, forensic notes)
Maintain dialogues/conversations
Conversation fragments
Session hijacking, tracking conversations
OSI Layer: 4 Transport (purpose, data type, devices, forensic notes)
Node-to-node comms, slip sessions into packets for travel
Reliable delivery
TCP, UDP
Firewalls
TCP SYN flooding, 3-way handshake
OSI Layer: 3 Network (purpose, data type, devices, forensic notes)
Routing, IP-to-MAC
Packets
Routers
IP spoofing, timeline critical
OSI Layer: 2 Data Link (purpose, data type, devices, forensic notes)
Local network hops
Frames
Hubs, bridges, switches, MAC
MAC spoofing possible, LAN evidence
OSI Layer: 1 Physical (purpose, data type, devices, forensic notes)
Physical connection
Bits
Devices - NIC, Network hub
Physical taps/access
Key Transport Layer protocols and attacks?
TCP: connection-oriented, reliable, 3-way handshake (SYN → SYN-ACK → ACK)
UDP: connectionless, fast, best-effort (VoIP, video)
Attack: TCP SYN flooding (DoS – table overflow)
Key Network Layer concepts (IPv4, NAT, ARP)?
IPv4 classes (A/B/C), subnetting
NAT: multiple devices share one public IP
ARP: IP ↔ MAC mapping
Home range: 192.168.0.0 – 192.168.255.255
What tools inspect network traffic?
Packet sniffers (Wireshark, tcpdump, ngrep) – inspect layers 2-3, carve files, view TCP headers (easily spoofed).
Why is timeline critical in network forensics?
IP addresses change over time; spoofing is common.
Common anonymisation techniques?
Proxies: hide client IP, all clients appear same
Onion routing (Tor): layered encryption, each node only knows neighbours
Web drops: web-based email without direct sending
Forensic value of WWW / Browser artefacts?
Browser cache, history, cookies (dates, domains, values).
HTTP methods (GET safe; POST/PUT harmful).
Plugins/BHOs can be compromised.
Forensic concerns with Cookies?
Rich source (Created, Domain, Expires, Name, Path, Value) but easily manipulated/deleted.
Email protocols and forensic issues?
SMTP (sending, port 25), POP3/IMAP (retrieval). Headers easily forged (spam). Full headers often hidden – check .PST or raw mail files.
Forensic differences between Client-Server and Peer-to-Peer chat/forums?
Client-Server: central node; client rarely has partner IP
Peer-to-Peer: nodes keep contact IP lists; super-nodes act as directory
VoIP forensic concerns?
Easily spoofed caller ID, inadequate security, PBX voicemail fraud.