SlideShare a Scribd company logo
1 of 12
WORKING MODULE
ON
NETWORK_MINER & WIRESHARK
Submitted by:
S. Venkata Sreeram
TYPES & FEATURES OF INVESTIGATION
TOOLS
•Email analysis
•File type detection
•Media playback
•Registry analysis
•Photos recovery from memory card
•Extract web activity from browser
•Show system events in graphical interface
•Timeline analysis
•Extract data from Android – SMS, call logs, contacts, etc.
There are many Network Forensic Analysis Tools
(NFAT) currently available. Network Miner is a
powerful tool that has many features that are not as
well implemented in other tools. Among these
features are: Network Miner allows you to parse
libcap files or to do a live packet capture of the
network traffic. Network Miner also allows you to
reconstruct FTP, SMB, HTTP, and TFTP data
streams so that you can see a comprehensive view
of what data was being sent over the network.
NetworkMiner
Capture data from several different network
interfaces
View the credential data of the connections
Use the DNS info to see what sites people are
accessing
Search for keywords (string, or hex) within the
packets
See all clear text that it monitored
Reconstruct and view files that were transfered
based on the data stream
Create thumbnails of all the images that were sent
over the network for easy monitoring
It is a passive tool.
It doesn't actively target devices on the network
Capture and view frame data about the packets
Passive OS detection.
Features
Hosts, Files, Images
Messages, Credentials
Usernames
Passwords [ Mask ]
DNS
Keywords [ Network ]
Anomalies.
Phishing
Phishing is the practice of sending fraudulent emails that resemble emails from
reputable sources. The aim is to steal sensitive data like credit card numbers and
information. It’s the most common type of cyber attack. You can help protect
through education or a technology solution that filters malicious emails.
Learn how technology can help
Ransomware
Ransomware is a type of malicious software. It is designed to extort money by blocking access to files or the
computer system until the ransom is paid. Paying the ransom does not guarantee that the files will be recovered or
the system restored.
Stop ransomware in its tracks
Social engineering
Social engineering is a tactic that adversaries use to trick you into revealing sensitive information. They can solicit a
monetary payment or gain access to your confidential data. Social engineering can be combined with any of the
threats listed above to make you more likely to click on links, download malware, or trust a malicious source.
Malware
Malware is a type of software designed to gain unauthorized access or to cause damage to a computer.
How To Capture And Analyze Network Traffic Using
NetworkMiner
NetworkMiner is a
host centric network
analysis tool with
passive sniffing
capabilities. Host
centric means that it
sorts data with respect
to the hosts rather
than the packets
Wireshark is a free and open source network
protocol analyzer that enables users to interactively
browse the data traffic on a computer network. The
development project was started under the name
Ethereal, but was renamed Wireshark in 2006.
Many networking developers from all around the
world have contributed to this project with network
analysis, troubleshooting, software development and
communication protocols. Wireshark is used in
many educational institutions and other industrial
sectors.
 To share use cases and
knowledge among members
of the Wireshark user and
developer communities in a
relaxed, informal milieu.
 To remain a self-funded,
independent, educational
conference hosted by a
corporate sponsor.
•Data is analyzed either from the wire over the network connection or from data files
that have already captured data packets.
•Supports live data reading and analysis for a wide range of networks (including
Ethernet, IEEE 802.11, point-to-point Protocol (PPP) and loopback).
•With the help of GUI or other versions, users can browse captured data networks.
•For programmatically editing and converting the captured files to the editcap
application, users can use command line switches.
•Display filters are used to filter and organize the data display.
•New protocols can be scrutinized by creating plug-ins.
•Captured traffic can also trace Voice over Internet (VoIP) calls over the network.
•When using Linux, it is also possible to capture raw USB traffic.
FEATURES
Lets Have A Look Forward
through Practical Experience
with Network Miner
and
Wireshark.

More Related Content

What's hot

Insider Threats Detection in Cloud using UEBA
Insider Threats Detection in Cloud using UEBAInsider Threats Detection in Cloud using UEBA
Insider Threats Detection in Cloud using UEBALucas Ko
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposureredpel dot com
 
Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber securityPranto26
 
The Challenges, Gaps and Future Trends: Network Security
The Challenges, Gaps and Future Trends: Network SecurityThe Challenges, Gaps and Future Trends: Network Security
The Challenges, Gaps and Future Trends: Network SecurityDeris Stiawan
 
Network forensics
Network forensicsNetwork forensics
Network forensicsArthyR3
 
Intruders detection
Intruders detectionIntruders detection
Intruders detectionEhtisham Ali
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber securityKAMALI PRIYA P
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9koolkampus
 
International journal of computer (ijc) (issn 2307 4523) volume 6 no1 2011
International journal of computer (ijc) (issn 2307 4523) volume 6 no1 2011International journal of computer (ijc) (issn 2307 4523) volume 6 no1 2011
International journal of computer (ijc) (issn 2307 4523) volume 6 no1 2011Mohammad Nassar
 
Futuristic data mining technologies for cyber security
Futuristic data mining technologies for cyber securityFuturistic data mining technologies for cyber security
Futuristic data mining technologies for cyber securityPankaj Choudhary
 
Ehtical hacking
Ehtical hackingEhtical hacking
Ehtical hackingUday Verma
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaMaribel García Arenas
 
A proposed architecture for network
A proposed architecture for networkA proposed architecture for network
A proposed architecture for networkIJCNCJournal
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security applicationbharatsvnit
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network ForensicsSavvius, Inc
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itlavakumar Thatisetti
 

What's hot (20)

Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Insider Threats Detection in Cloud using UEBA
Insider Threats Detection in Cloud using UEBAInsider Threats Detection in Cloud using UEBA
Insider Threats Detection in Cloud using UEBA
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber security
 
The Challenges, Gaps and Future Trends: Network Security
The Challenges, Gaps and Future Trends: Network SecurityThe Challenges, Gaps and Future Trends: Network Security
The Challenges, Gaps and Future Trends: Network Security
 
Network forensics
Network forensicsNetwork forensics
Network forensics
 
DF Process Models
DF Process ModelsDF Process Models
DF Process Models
 
Intruders detection
Intruders detectionIntruders detection
Intruders detection
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber security
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
International journal of computer (ijc) (issn 2307 4523) volume 6 no1 2011
International journal of computer (ijc) (issn 2307 4523) volume 6 no1 2011International journal of computer (ijc) (issn 2307 4523) volume 6 no1 2011
International journal of computer (ijc) (issn 2307 4523) volume 6 no1 2011
 
45
4545
45
 
Futuristic data mining technologies for cyber security
Futuristic data mining technologies for cyber securityFuturistic data mining technologies for cyber security
Futuristic data mining technologies for cyber security
 
Ehtical hacking
Ehtical hackingEhtical hacking
Ehtical hacking
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far Alqatawna
 
A proposed architecture for network
A proposed architecture for networkA proposed architecture for network
A proposed architecture for network
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
 

Similar to Forensic tools

Combating cyber security through forensic investigation tools
Combating cyber security through forensic investigation toolsCombating cyber security through forensic investigation tools
Combating cyber security through forensic investigation toolsVenkata Sreeram
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxAmardeepKumar621436
 
Cyber Security Project Presentation : Essential Reconnaissance Tools and Tech...
Cyber Security Project Presentation : Essential Reconnaissance Tools and Tech...Cyber Security Project Presentation : Essential Reconnaissance Tools and Tech...
Cyber Security Project Presentation : Essential Reconnaissance Tools and Tech...Boston Institute of Analytics
 
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdfA Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdfJessica Thompson
 
Computing safety
Computing safetyComputing safety
Computing safetyBrulius
 
Cryptography and system security
Cryptography and system securityCryptography and system security
Cryptography and system securityGary Mendonca
 
Internet Relay Chat Forensics
Internet Relay Chat ForensicsInternet Relay Chat Forensics
Internet Relay Chat ForensicsIJSRD
 
Topic # 16 of outline Managing Network Services.pptx
Topic # 16 of outline Managing Network Services.pptxTopic # 16 of outline Managing Network Services.pptx
Topic # 16 of outline Managing Network Services.pptxAyeCS11
 
NPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdfNPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdfMr. Moms
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practicesMihajlo Prerad
 
Computer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama ReddyComputer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama ReddyDr. Jayarama Reddy
 
Computer networking by Dr. Jayarama Reddy
Computer networking by Dr. Jayarama ReddyComputer networking by Dr. Jayarama Reddy
Computer networking by Dr. Jayarama ReddyDr. Jayarama Reddy
 
Project in malware analysis:C2C
Project in malware analysis:C2CProject in malware analysis:C2C
Project in malware analysis:C2CFabrizio Farinacci
 
Network Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdfNetwork Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdftalkaton
 
Network Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxNetwork Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxtalkaton
 
Network Vulnerability and Patching
Network Vulnerability and PatchingNetwork Vulnerability and Patching
Network Vulnerability and PatchingEmmanuel Udeagha B.
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
Network security monitoring elastic webinar - 16 june 2021
Network security monitoring   elastic webinar - 16 june 2021Network security monitoring   elastic webinar - 16 june 2021
Network security monitoring elastic webinar - 16 june 2021Mouaz Alnouri
 

Similar to Forensic tools (20)

Combating cyber security through forensic investigation tools
Combating cyber security through forensic investigation toolsCombating cyber security through forensic investigation tools
Combating cyber security through forensic investigation tools
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptx
 
Cyber Security Project Presentation : Essential Reconnaissance Tools and Tech...
Cyber Security Project Presentation : Essential Reconnaissance Tools and Tech...Cyber Security Project Presentation : Essential Reconnaissance Tools and Tech...
Cyber Security Project Presentation : Essential Reconnaissance Tools and Tech...
 
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdfA Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
 
Computing safety
Computing safetyComputing safety
Computing safety
 
Array_SR
Array_SRArray_SR
Array_SR
 
Cryptography and system security
Cryptography and system securityCryptography and system security
Cryptography and system security
 
Internet Relay Chat Forensics
Internet Relay Chat ForensicsInternet Relay Chat Forensics
Internet Relay Chat Forensics
 
Topic # 16 of outline Managing Network Services.pptx
Topic # 16 of outline Managing Network Services.pptxTopic # 16 of outline Managing Network Services.pptx
Topic # 16 of outline Managing Network Services.pptx
 
NPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdfNPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdf
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
Computer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama ReddyComputer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama Reddy
 
Computer networking by Dr. Jayarama Reddy
Computer networking by Dr. Jayarama ReddyComputer networking by Dr. Jayarama Reddy
Computer networking by Dr. Jayarama Reddy
 
Project in malware analysis:C2C
Project in malware analysis:C2CProject in malware analysis:C2C
Project in malware analysis:C2C
 
Network Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdfNetwork Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdf
 
Network Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxNetwork Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptx
 
Network Vulnerability and Patching
Network Vulnerability and PatchingNetwork Vulnerability and Patching
Network Vulnerability and Patching
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Network security monitoring elastic webinar - 16 june 2021
Network security monitoring   elastic webinar - 16 june 2021Network security monitoring   elastic webinar - 16 june 2021
Network security monitoring elastic webinar - 16 june 2021
 

More from Venkata Sreeram

More from Venkata Sreeram (12)

Stop and-wait protocol
Stop and-wait protocolStop and-wait protocol
Stop and-wait protocol
 
DeadLock in Operating-Systems
DeadLock in Operating-SystemsDeadLock in Operating-Systems
DeadLock in Operating-Systems
 
Transaction management and concurrency
Transaction management and concurrencyTransaction management and concurrency
Transaction management and concurrency
 
Digital Platforms for Economic Growth
Digital Platforms for Economic GrowthDigital Platforms for Economic Growth
Digital Platforms for Economic Growth
 
Brain computer interface
Brain computer interfaceBrain computer interface
Brain computer interface
 
Machine learning
Machine learningMachine learning
Machine learning
 
Loon project
Loon projectLoon project
Loon project
 
Mobile technology
Mobile technologyMobile technology
Mobile technology
 
Blue eye technology
Blue eye technologyBlue eye technology
Blue eye technology
 
Biometric voting machine
Biometric voting machineBiometric voting machine
Biometric voting machine
 
Tizen os
Tizen osTizen os
Tizen os
 
Internet beaming drone_aquila
Internet beaming drone_aquilaInternet beaming drone_aquila
Internet beaming drone_aquila
 

Recently uploaded

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 

Recently uploaded (20)

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 

Forensic tools

  • 1. WORKING MODULE ON NETWORK_MINER & WIRESHARK Submitted by: S. Venkata Sreeram
  • 2. TYPES & FEATURES OF INVESTIGATION TOOLS •Email analysis •File type detection •Media playback •Registry analysis •Photos recovery from memory card •Extract web activity from browser •Show system events in graphical interface •Timeline analysis •Extract data from Android – SMS, call logs, contacts, etc.
  • 3. There are many Network Forensic Analysis Tools (NFAT) currently available. Network Miner is a powerful tool that has many features that are not as well implemented in other tools. Among these features are: Network Miner allows you to parse libcap files or to do a live packet capture of the network traffic. Network Miner also allows you to reconstruct FTP, SMB, HTTP, and TFTP data streams so that you can see a comprehensive view of what data was being sent over the network. NetworkMiner
  • 4. Capture data from several different network interfaces View the credential data of the connections Use the DNS info to see what sites people are accessing Search for keywords (string, or hex) within the packets See all clear text that it monitored Reconstruct and view files that were transfered based on the data stream Create thumbnails of all the images that were sent over the network for easy monitoring It is a passive tool. It doesn't actively target devices on the network Capture and view frame data about the packets Passive OS detection. Features
  • 5. Hosts, Files, Images Messages, Credentials Usernames Passwords [ Mask ] DNS Keywords [ Network ] Anomalies.
  • 6. Phishing Phishing is the practice of sending fraudulent emails that resemble emails from reputable sources. The aim is to steal sensitive data like credit card numbers and information. It’s the most common type of cyber attack. You can help protect through education or a technology solution that filters malicious emails. Learn how technology can help Ransomware Ransomware is a type of malicious software. It is designed to extort money by blocking access to files or the computer system until the ransom is paid. Paying the ransom does not guarantee that the files will be recovered or the system restored. Stop ransomware in its tracks Social engineering Social engineering is a tactic that adversaries use to trick you into revealing sensitive information. They can solicit a monetary payment or gain access to your confidential data. Social engineering can be combined with any of the threats listed above to make you more likely to click on links, download malware, or trust a malicious source. Malware Malware is a type of software designed to gain unauthorized access or to cause damage to a computer.
  • 7.
  • 8. How To Capture And Analyze Network Traffic Using NetworkMiner NetworkMiner is a host centric network analysis tool with passive sniffing capabilities. Host centric means that it sorts data with respect to the hosts rather than the packets
  • 9. Wireshark is a free and open source network protocol analyzer that enables users to interactively browse the data traffic on a computer network. The development project was started under the name Ethereal, but was renamed Wireshark in 2006. Many networking developers from all around the world have contributed to this project with network analysis, troubleshooting, software development and communication protocols. Wireshark is used in many educational institutions and other industrial sectors.
  • 10.  To share use cases and knowledge among members of the Wireshark user and developer communities in a relaxed, informal milieu.  To remain a self-funded, independent, educational conference hosted by a corporate sponsor.
  • 11. •Data is analyzed either from the wire over the network connection or from data files that have already captured data packets. •Supports live data reading and analysis for a wide range of networks (including Ethernet, IEEE 802.11, point-to-point Protocol (PPP) and loopback). •With the help of GUI or other versions, users can browse captured data networks. •For programmatically editing and converting the captured files to the editcap application, users can use command line switches. •Display filters are used to filter and organize the data display. •New protocols can be scrutinized by creating plug-ins. •Captured traffic can also trace Voice over Internet (VoIP) calls over the network. •When using Linux, it is also possible to capture raw USB traffic. FEATURES
  • 12. Lets Have A Look Forward through Practical Experience with Network Miner and Wireshark.