HBFITES Data Center, Collaboration, Security, Storage, Wireless, Telepresence Training +91-9886770046 info@hbfites.com

NTA - Network Traffic Analysis

Description

Network Traffic Analysis will enable students to differentiate between normal and abnormal network traffic. The course focuses on research, filtering and comparative analysis to identify the different types of activity on a network and attribute their source.

A subject matter expert will teach you security-related tactics, techniques and procedures for performing network analysis in todays ever-changing threat landscape. Youll learn to follow conversations through redirection as well as how to develop custom filters for non-dissected protocols. After attending this course, students will be able to hone in on the key events in a traffic capture and reconstruct the event time line.

Objectives

Upon completion of this course, you will be able to perform the following tasks:

  • Internet Based Open Source Research
  • Wireshark Protocol Analyzer
  • Effective Capture and Display Filtering
  • Tracing System, Service and User Transactions
  • Recognizing Encoding Types
  • Base-64 and URL Encoding
  • Non-Dissected Protocol Analysis
  • HTTP Header Analytics (User-Agents, Referrers, Accept Lines, etc)
  • Cookie Tracking

Prerequisites

You should possess knowledge of the following:

  • A Broad Understanding of TCP/IP and Associated Protocols
  • Knowledge of Network Hardware and Segment Types
  • Previous Exposure to Wireshark or Other Protocol Analysis Software is also recommended

Who Should Attend

  • Network Analysts seeking to develop security-related skills
  • Incident Responders needing to quickly address system security breaches
  • Penetration Testers looking to reduce their detectability
  • Threat Operations Analysts seeking a better understanding of network intrusions
  • All Network Administrators needing a better understanding of network security

Outline

OSI & TCP/IP Models

  • Basic Header Structures
  • Analyze packets by hand
  • IP & TCP Options
  • OS Detection techniques
    • Session Parameters, Flags

Number Theory

  • Accelerated Number Conversion
  • Boolean Logic
  • Boolean Functions
  • Basic Obfuscation Techniques

Wireshark Tutorial

  • PCAP Meta-data
    • File Headers, Frame Headers
  • Wireshark Meta-data
    • Name Resolutions, Analytic Tags, Conversations, Relative Numbering
    • Coloring Rules
  • User Preferences
    • Custom Displays
    • Conversions
  • Dissector Basics
  • Display Filters
  • Custom Filters
  • Statistics

Day in the Life (TCP/IP)

  • Inter-Process Communications
    • 3-Way Handshake
    • TCP Options in use
    • Session Management
  • Flow Control
    • Windowing
  • Congestion Control
    • Packet Loss
    • Retransmission
    • Quality of Service
  • Switching and Routing
    • Life-cycle of a Packet
  • Common TCP/IP Application In-Depth Filters

Analytic Process

  • Logic Fundamentals
    • Establishing and Examining Premises
    • Correlation, Causation, Coincidence
    • Fallacies and Pitfalls
  • Apply logic to traffic analysis
    • Identify Analytic Vectors
    • Validate Filters and Coloring Rules
    • Prioritize Analytic Efforts

Internet Research

  • Brief History of the Internet
    • Impact on current and future protocols
  • Current Organizations
    • Internet Society, ICANN/IANA
  • Research Tools
    • Whois, Dig, Nslookup, Traceroute, BGP/AS Analysis, Looking Glass

Traffic Analysis

  • Scope Problems/Events
    • Statistical Analysis, Baseline
    • Isolating Events, TCP Analysis
  • Event Analysis
    • Identify Non-Standard Communications
    • Recreate objects (e.g. files, videos)
  • Display Filters
    • Customize and Save Filters

Attribution

  • Route Path Selection
    • Interior Routing (EIGRP, OSPF)
    • Exterior Routing (BGP)
    • Autonomous Systems
    • Tiered Networking, Peering
    • Load Balancing, MPLS and Traffic Engineering
  • Traceroute Analysis
    • Latency Analysis
    • Naming Conventions
    • Route Identification

Research Techniques

  • RFC and other supporting documentation
    • Syntax, Semantics, and Timing
    • Key Personnel
    • Academic Materials
    • White Papers and Keynote Slides
  • Client/Server Relationships
    • Codes
    • Flags
    • Dissector Support

Start-to-Finish Protocol Analysis (Demo Email)

  • Research Documentation
    • RFC 822, MIME, SMTP, POP3, IMAP
  • Work with Encoding
    • Base64, Quoted Printable
  • Network Reconstruction
    • Meta-data Analysis

Regular Expressions

  • Pattern Matching
    • IP Addresses
    • Email Address
    • Client/Server Transactions

Analysis Beyond Wireshark

  • Custom Filters
  • Filter with Regular Expressions
  • Research Non-Dissected Protocols
  • Analyze Non-Dissected Protocols

Secure Protocols

  • Security Fundamentals
    • Confidentiality, Integrity, and Availability
    • Encryption
  • Work in an Encrypted Environment
    • Verify Digital Certificates
    • Identify Directionality of Traffic
    • Identify Location of Nodes

Referrers, User-Agents, & Cookies

  • Identify System Architectures
  • Identify Operating Systems
  • Identify Applications
  • Identify User Preferences
  • Follow User Activities
  • Identify 3rd-Party Tracking Activities

Big Capture

    A group analysis exercise. Students will work in small groups to identify traffic and reconstruct the topology of an unknown environment. The teams will have to decipher obfuscated transactions and map observed activities back to the respective user.

More Tools and Tricks

  • Capsa7, NetWitness Investigator, Network Miner

Student Practical Demonstration:

      Using the tools, skills, and methodologies taught in Days 1 - 4 of the class, students will participate in a competative capture-the-flag exercise.

 

      Designed to challenge the participants, each correctly completed milestone will unlock a successively more difficult challenge.