This document discusses tools and techniques for investigating network traffic. It provides overviews of network protocols and layers of the OSI model. It describes types of network attacks investigators may encounter and reasons for examining network traffic, such as locating suspicious activity. Methods of gathering evidence are covered, including sniffing packets and acquiring traffic using DNS poisoning. Specific tools are outlined, such as Wireshark, Tcpdump and Windump, that can capture and analyze network packets.