Week 7 - Network Forensics Flashcards

(36 cards)

1
Q

Why has network forensics become critical?

A

Explosion in breaches across home/corporate/internet/vehicle networks. Blurring of physical vs cloud data.
Common devices (laptops, phones, smart TVs, Alexa, IoT) all leave traces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List the main sources of network forensic evidence.

A

Firewall / IDS alerts
Captured (“sniffed”) network traffic
ISP logs, network device logs (switches/routers)
Application logs (web servers, email)
VoIP traffic
Security monitoring (e.g., NetFlow)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What organisational challenges exist in network investigations?

A

Often handled by general IT staff - poor evidence handling.
High stakes - financial liability, reputation.
Investigations span client devices + interlinked distributed servers/services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the main difficulties in network forensics?

A

Distributed systems - hard to capture everything
Transient data (network flows) - dynamic; use system logs where possible
Encryption - still possible to capture metadata

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Closed vs Open systems – definitions?

A

Closed: Never connected to internet or other systems
Open: Ever connected (most real-world systems)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the two opportunities for forensic capturing?

A

Real-time capture and analysis (live)
Retroactive capture and analysis (logs/artefacts)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why use layered models like OSI/TCP/IP?

A

Simplifies complex processes
Abstraction
Interoperability across vendors
Easier troubleshooting by isolating layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OSI Layer: 7 Application (purpose, data type, forensic notes)

A

User/app services (HTTP, DNS, SMTP)
HTTP, DNS, SMTP
Client-server, peer-to-peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

OSI Layer: 6 Presentation (purpose, data type, forensic notes)

A

Data readability (encryption, format conversion)
mp3, jpeg
Encryption challenges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

OSI Layer: 5 Session (purpose, data type, forensic notes)

A

Maintain dialogues/conversations
Conversation fragments
Session hijacking, tracking conversations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

OSI Layer: 4 Transport (purpose, data type, devices, forensic notes)

A

Node-to-node comms, slip sessions into packets for travel
Reliable delivery
TCP, UDP
Firewalls
TCP SYN flooding, 3-way handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

OSI Layer: 3 Network (purpose, data type, devices, forensic notes)

A

Routing, IP-to-MAC
Packets
Routers
IP spoofing, timeline critical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

OSI Layer: 2 Data Link (purpose, data type, devices, forensic notes)

A

Local network hops
Frames
Hubs, bridges, switches, MAC
MAC spoofing possible, LAN evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

OSI Layer: 1 Physical (purpose, data type, devices, forensic notes)

A

Physical connection
Bits
Devices - NIC, Network hub
Physical taps/access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Key Transport Layer protocols and attacks?

A

TCP: connection-oriented, reliable, 3-way handshake (SYN → SYN-ACK → ACK)
UDP: connectionless, fast, best-effort (VoIP, video)
Attack: TCP SYN flooding (DoS – table overflow)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Key Network Layer concepts (IPv4, NAT, ARP)?

A

IPv4 classes (A/B/C), subnetting
NAT: multiple devices share one public IP
ARP: IP ↔ MAC mapping
Home range: 192.168.0.0 – 192.168.255.255

17
Q

What tools inspect network traffic?

A

Packet sniffers (Wireshark, tcpdump, ngrep) – inspect layers 2-3, carve files, view TCP headers (easily spoofed).

18
Q

Why is timeline critical in network forensics?

A

IP addresses change over time; spoofing is common.

19
Q

Common anonymisation techniques?

A

Proxies: hide client IP, all clients appear same
Onion routing (Tor): layered encryption, each node only knows neighbours
Web drops: web-based email without direct sending

20
Q

Forensic value of WWW / Browser artefacts?

A

Browser cache, history, cookies (dates, domains, values).
HTTP methods (GET safe; POST/PUT harmful).
Plugins/BHOs can be compromised.

21
Q

Forensic concerns with Cookies?

A

Rich source (Created, Domain, Expires, Name, Path, Value) but easily manipulated/deleted.

22
Q

Email protocols and forensic issues?

A

SMTP (sending, port 25), POP3/IMAP (retrieval). Headers easily forged (spam). Full headers often hidden – check .PST or raw mail files.

23
Q

Forensic differences between Client-Server and Peer-to-Peer chat/forums?

A

Client-Server: central node; client rarely has partner IP
Peer-to-Peer: nodes keep contact IP lists; super-nodes act as directory

24
Q

VoIP forensic concerns?

A

Easily spoofed caller ID, inadequate security, PBX voicemail fraud.

25
Compare Hubs, Switches, Routers (forensic view).
Hub: broadcasts everything (Layer 1) Switch: intelligent forwarding (Layers 2-3) Router: connects networks, routes by IP, often encrypted (WPA2/3)
26
Forensic value of Proxy Servers?
Hide/spoof addresses; web proxy cache reveals internet activity.
27
What do Web Server logs contain?
Source IP, date/time, HTTP status, requested resource.
28
Forensic value of DHCP & DNS servers?
DHCP: MAC ↔ IP assignments, lease times, routing table DNS: FQDN → IP, WHOIS ownership info, traceroute hops
29
Firewall types and what they log?
Stateless (ACL: IP + port) Stateful (tracks active connections) UTM / NGFW (Layer 7, content) Logs: origin/dest, timestamps, data volume, protocols, blocked attempts.
30
IDS vs IPS – differences?
IDS: monitors & alerts (NIDS, NNIDS, HIDS) IPS: detects + automatically blocks/resets
31
IoT forensic challenges? (4)
High diversity of devices Permanently online Difficult preservation Lack of standards for acquisition.
32
What is Triage in incident response?
Determining most urgent items: filter false positives, mitigate risk, capture perishable data, prevent further damage, involve ISP/police, share threat intelligence.
33
What is an Advanced Persistent Threat (APT)?
Sophisticated, long-term, coordinated attack (often state-sponsored) to steal IP. Uses lateral movement and timestomping.
34
Outline the Intrusion Kill Chain.
Reconnaissance → Weaponisation → Delivery → Exploitation → Command & Control → Exfiltration.
35
What are Indicators of Compromise (IoC)?
Anything showing an attack occurred (changed from normal): unusual registry keys, DLLs, files in odd locations, etc.
36
Key forensic concerns when handling network evidence? (4)
Cannot always map virtual identity to real-world person Copy & sign digital logs Routers have limited storage – logs may be sent remotely Local logs lost on shutdown (use console port if possible)