Analyze network packet files very carefully

As a professional forensic guy, you can not be too careful to anlyze the evidence. Especially when the case is about malware or hacker. Protect your workstation is your responsibility. You are a professional forensic examiner, so don‘t get infected when examining the evidence file or network packet files. A friend of mine, she is also a forensic examiner, became victim yesterday. It‘s too ridiculous!!! She was very embrassing. The reason why she got infected was that she extracted a zip file from a suspicious network packet file and "accessed" that zip file. Then something happened. What a tragedy~

Let me show you how to analyze network packet files by using Network Miner. Import the network packet file you captured from the victim‘s workstation. See the tab "Credentials" we could find some important clue about accout and password.

See tab "Files" Network Miner could extract files inside the network packet file. It‘s very convenient for forensic guys to identify the files transfered.

Right click on the suspicious file and you could see where the file is by "Open folder".

Now you know where it is. Don‘t be too exciting. Curiosity killed cats!!!

"Life was like a box of chocolates. You never know what you‘re gonna get." Similarly a forensic guy never know whether any suspicious malware or virus is inside the file or not. So you have to conduct a malware analysis on it. Let me show you the verify result as below:

时间: 2024-11-08 11:53:59

Analyze network packet files very carefully的相关文章

Bulk network packet transmission

Bulk network packet transmission 译文作者:zhangzl2013 译文链接:http://www.cnblogs.com/zhangzl2013/p/bulk_network_packet_transmission.html 原文作者:Jonathan Corbet 原文链接:Bulk network packet transmission 本文有可能会被转载,从而导致评论留言的碎片化.想参与评论和探讨的同学,请找到原文或译文的原始地址,与原文或译文作者互动讨论

ELK实践(一):基础入门

虽然用了ELK很久了,但一直苦于没有自己尝试搭建过,所以想抽时间尝试尝试.原本打算按照教程 <ELK集中式日志平台之二 - 部署>(作者:樊浩柏科学院) 进行测试的,没想到一路出了很多坑,所以又按照自己成功搭建的流程写了本文. <ELK集中式日志平台之二 - 部署>一文参考价值非常大,图文并茂,大家可以在学习过程中参考参考.作者一上来就安装ELK插件,实际可以按需选择安装,但作为初学者,无疑增加了复杂度.ELK插件后续我会单独拿出来讲解,本文略过. 简介 ELK 指的是一套解决方案

Network Load Balancing Technical Overview--reference

http://technet.microsoft.com/en-us/library/bb742455.aspx Abstract Network Load Balancing, a clustering technology included in the Microsoft Windows 2000 Advanced Server and Datacenter Server operating systems, enhances the scalability and availabilit

PatentTips - Data Plane Packet Processing Tool Chain

BACKGROUND The present disclosure relates generally to systems and methods for providing a data plane processing tool chain for processing packets using OSI layers?4?and above in the data plane. With the development of multi-core processors, applicat

Linux - Network Configuration

Part 1: Basic Network Terminology Before setting up a network or accessing an existing network, it is important to know some key terms that are related to networking. This section explores the terms you should be aware of. Some of the terms are basic

Identifying a distributed denial of service (DDOS) attack within a network and defending against such an attack

The invention provides methods, apparatus and systems for detecting distributed denial of service (DDoS) attacks within the Internet by sampling packets at a point or points in Internet backbone connections to determine a packet metric parameter. The

PatentTips - Method for network interface sharing among multiple virtual machines

BACKGROUND Many computing systems include a network interface card (NIC) to provide for communications with other systems and devices over a network. In a computing system running multiple operating systems (OSs) on multiple virtual machines, each OS

Configuring Network Configuration-RHEL7

1.查看网络状态systemctl status NetworkManager You can use the  systemctl status NetworkManager  command to verify its current status. When NetworkManager comes up, it reads the network card configuration scripts, which are in /etc/sysconfig/network-scripts

Reading Fast Packet Processing A Survey

COMST 2018 主要内容 这是一篇有关快速包转发的综述,先介绍了包转发的有关基础知识和背景,具体介绍了包转发的主流方法,对这些方法进行了细致详尽的比较,最后介绍了最新的方法和未来的研究方向. 包处理包括Fast Path 和Slow Path,前者用于包转发和包头处理,后者主要用于管理.错误控制.维护. 主要的方法有三种:纯软件.纯硬件.软硬结合. 纯软件方法主要在软件层面(零拷贝.批处理.并行性.用户/内核空间)进行性能优化,性能不足的主要是因为网络协议栈架构的不足. 纯硬件方法性能高但