Course Overview
Network Traffic Analysis will enable students to differentiate between normal and abnormal network traffic. The course focuses on research, filtering and comparative analysis to identify the different types of activity on a network and attribute their source.
A subject matter expert will teach you security-related tactics, techniques and procedures for performing network analysis in today’s ever-changing threat landscape. You’ll learn to follow conversations through redirection as well as how to develop custom filters for non-dissected protocols. After attending this course, students will be able to hone in on the key events in a traffic capture and reconstruct the event time line.
- Internet Based Open Source Research
- Wireshark Protocol Analyzer
- Effective Capture and Display Filtering
- Tracing System, Service and User Transactions
- Recognizing Encoding Types
- Base-64 and URL Encoding
- Non-Dissected Protocol Analysis
- HTTP Header Analytics (User-Agents, Referrers, Accept Lines, etc)
- Cookie Tracking
What You'll Learn
⌃
DAY 1:
OSI & TCP/IP Models
- Basic Header Structures
- Analyze packets by hand
- IP & TCP Options
- OS Detection techniques Session Parameters, Flags
Number Theory
- Accelerated Number Conversion
- Boolean Logic
- Boolean Functions
- Basic Obfuscation Techniques
Wireshark Tutorial
- PCAP Meta-data File Headers, Frame Headers
- Wireshark Meta-data
- Name Resolutions, Analytic Tags, Conversations, Relative Numbering Coloring Rules
- User Preferences
- Custom Displays
- Conversions
- Dissector Basics
- Display Filters
- Custom Filters
- Statistics
Day In The Life (TCP/IP)
- Inter-Process Communications
- 3-Way Handshake
- TCP Options in use
- Session Management
- Flow Control
- Windowing
- Congestion Control
- Packet Loss
- Retransmission
- Quality of Service
- Switching and Routing
- Common TCP/IP
DAY 2
Analytic Process
- Logic Fundamentals
- Establishing and Examining Premises Correlation, Causation, Coincidence Fallacies and Pitfalls
- Apply logic to traffic analysis
- Identify Analytic Vectors
- Validate Filters and Coloring Rules
- Prioritize Analytic Efforts
Internet Research
- Brief History of the Internet
- Impact on current and future protocols
- Current Organizations
- Internet Society, ICANN/IANA
- Research Tools
- Whois, Dig, Nslookup, Traceroute, BGP/AS Analysis, Looking Glass
Traffic Analysis
- Scope Problems/Events
- Statistical Analysis, Baseline
- Isolating Events, TCP Analysis
- Event Analysis
- Identify Non-Standard Communications
- Recreate objects (e.g. files, videos)
- Display Filters
- Customize and Save Filters
Attribution
- Route Path Selection
- Interior Routing (EIGRP, OSPF) Exterior Routing (BGP) Autonomous Systems Tiered Networking, Peering Load Balancing, MPLS and Traffic Engineering
- Traceroute Analysis
- Latency Analysis
- Naming Conventions
- Route Identification
DAY 3
Research Techniques
- RFC and other supporting documentation
- Syntax, Semantics, and Timing Key Personnel
- Academic Materials
- White Papers and Keynote Slides
- Client/Server Relationships
- Codes
- Flags
- Dissector Support
Start-to-Finish Protocol Analysis (Demo Email)
- Research Documentation
- RFC 822, MIME, SMTP, POP3, IMAP
- Work with Encoding
- Network Reconstruction
Regular Expressions
- Pattern Matching
- IP Addresses
- Email Address
- Client/Server Transactions
Analysis Beyond Wireshark
- Custom Filters
- Filter with Regular Expressions
- Research Non-Dissected Protocols
- Analyze Non-Dissected Protocols
Secure Protocols
- Security Fundamentals
- Confidentiality, Integrity, and Availability
- Encryption
- Work in an Encrypted Environment
- Verify Digital Certificates Identify
- Directionality of Traffic Identify Location of Nodes
DAY 4:
Referrers, User-Agents, & Cookies
- Identify System Architectures
- Identify Operating Systems
- Identify Applications
- Identify User Preferences
- Follow User Activities
- Identify 3rd-Party Tracking Activities
Big Capture
A group analysis exercise. Students will work in small groups to identify traffic and reconstruct the topology of an unknown environment. The teams will have to decipher obfuscated transactions and map observed activities back to the respective user.
More Tools and Tricks
- Capsa7, NetWitness Investigator,
- Network Miner
DAY 5:
Student Practical Demonstration:
Using the tools, skills, and methodologies taught in Days 1 – 4 of the class, students will participate in a competitive capture-the-flag exercise.
Designed to challenge the participants, each correctly completed milestone will unlock a successively more difficult challenge.
Outline
⌃
DAY 1:
- Wireshark Filtering (Part 1, Part 2)
- A Day in the Life (DHCP Tracing)
- TCP/IP Analysis
DAY 2:
- Internet Research
- Isolate Event #1
- Traceroute Analysis
- Isolate Event #2
- Exporting Objects
- Isolate Event #3
- Isolate Event #4
- Isolate Event #5
DAY 3:
- RFC Research
- Meta-data Analysis
- Non-Dissected Protocol
- SSL
DAY 4:
- Referrer
- Cookies
- User-Agents
- Attribution
Labs
⌃
- A Broad Understanding of TCP/IP and Associated Protocols
- Knowledge of Network Hardware and Segment Types
- Previous Exposure to Wireshark or Other Protocol Analysis Software is also recommended
Prerequisites
⌃
- Network Analysts seeking to develop security-related skills
- Incident Responders needing to quickly address system security breaches
- Penetration Testers looking to reduce their detectability
- Threat Operations Analysts seeking a better understanding of network intrusions
- All Network Administrators needing a better understanding of network security
Who Should Attend
⌃