Author Archives: Robert Reden

Network Forensics – Week 12

This week, we learned about Malware. Malware, or Malicious Software, is a software that is specifically created to damage, disrupt, or gain unauthorized access to a computer system. One way to identify malware using network forensics methodology is through Security … Continue reading

Posted in Network Forensics | Leave a comment

Network Forensics – Week 11

This week, we learned about routers, switches, and firewall. Switches map MAC addresses to switch ports. Switches are also able to locate the physical locations of MAC addresses. ARP(Address Resolution Protocol) tables allow users to convert MAC Addresses into IP … Continue reading

Posted in Network Forensics | Leave a comment

Network Forensics – Week 10

This week, we learned about Log Correlation and Analysis. There are various sources of logs including OS logs(event logs, syslog), Application Logs(SMTP logs, server logs), Physical Device logs(Camera logs, UPS, logs), and Net Equip logs. Windows logs are usually the … Continue reading

Posted in Network Forensics | Leave a comment

Network Forensics – Week 8

This week, we learned about Network Intrusion Detection and Analysis. NIDS(Network Intrusion Detection System) is a system that detects malicious traffic on a network. NIDS require promiscuous network access to analyze traffic such as unicast traffic. NIDS do not interfere … Continue reading

Posted in Network Forensics | Leave a comment

Network Forensics – Week 7

This week, we learned about network forensics in wireless networks. Cases involving wireless network include recovering stolen gadgets by tracking it on wireless network, investigate malicious or suspicious activity in wireless network, investigate attack on wireless network including DDoS, encryption … Continue reading

Posted in Network Forensics | Leave a comment

Network Forensics – Week 5

This week, we learned about the techniques and tools that can be used for evidence acquisition through capturing or sniffing packets. Physical interception can be referred to as passive packet acquisition of data that is transmitted through wire. The tools … Continue reading

Posted in Network Forensics | Leave a comment

Network Forensics – Week 4

This week, we learned about the tools required to acquire evidence and to analyze them. A pcap file can be used as evidence alongside many others. Flow Analysis is a technique of monitoring network activity to identify anomalies such as … Continue reading

Posted in Network Forensics | Leave a comment

Network Forensic – Week 2

This week, we learned about the sources of network-based evidence such as: On the wire: physical cabling that carries data over the network, can provide real time network data through wire tapping . In the air: wireless signals between stations(radio … Continue reading

Posted in Network Forensics | Leave a comment

Network Forensics – Week 1

Network Forensics is a sub-branch of digital forensics concerning the capture, recording, and analysis of network events with the purpose of discovering the source of security attacks, information gathering, and find legal evidence. There are a lot of resources that … Continue reading

Posted in Network Forensics | Leave a comment

Ethical Hacking- Burp Suite

This tutorial is 100% for Education Purpose only. Any time the word “Hacking” that is used on this site shall be regarded as Ethical Hacking. Do not attempt to violate the law with anything contained here. If you planned to use … Continue reading

Posted in Ethical Hacking | Leave a comment