Network Forensics

Overview

Network forensics involves capturing, recording, and analyzing network traffic to detect intrusions, reconstruct attack timelines, and extract evidence. It spans full packet capture (PCAP), flow-level metadata (NetFlow/IPFIX), and protocol-specific analysis. Network evidence complements host-based forensics by revealing lateral movement, data exfiltration, and C2 communication.

Topics in This Section

  • Packet Capture — capturing network traffic with tcpdump, dumpcap, and Wireshark for forensic analysis
  • PCAP Analysis — analyzing captured packets with tshark, Wireshark, and automated extraction tools
  • Network Flow Analysis — working with NetFlow, IPFIX, and flow data using nfdump and nfpcapd

General Approach

Network incident detected
    │
    ├── Capture / collect evidence
    │   ├── Full packet capture (tcpdump, dumpcap)
    │   ├── Flow records (nfpcapd, router exports)
    │   └── Existing PCAP from IDS/NSM sensors
    │
    ├── Initial triage
    │   ├── Protocol distribution (capinfos, tshark stats)
    │   ├── Top talkers / conversation analysis
    │   └── Time range identification
    │
    ├── Deep analysis
    │   ├── DNS queries → C2, tunneling, DGA
    │   ├── HTTP/HTTPS → downloads, exfiltration, beacons
    │   ├── TLS analysis → certificate anomalies, JA3/JA4
    │   └── SMB/RDP/SSH → lateral movement
    │
    ├── Extract artifacts
    │   ├── Files from HTTP/SMB streams
    │   ├── Credentials from cleartext protocols
    │   └── IOCs (IPs, domains, user agents, hashes)
    │
    └── Correlate with host-based evidence and timeline