Managing the Network Card to Capture and Analyse Network Traffic
By default, the forensicVM initiates with its network card disabled. This design choice is deliberate, to minimize the potential risks of activating a network card on a possibly compromised virtual forensic machine. Activating such a network card could jeopardize not only your individual computer but the broader network environment.
For many forensic investigations, an active network connection is unnecessary. When evidence is solely contained within a local device, it’s recommended to keep the network card deactivated. This approach ensures the machine’s safe operation and the security of your enterprise network or domain.
However, in certain situations, there may be a need to activate the network card. For instance, when the forensic virtual machine is deemed safe and requires an internet connection to retrieve cloud-based data—data sourced from cached cloud access credentials like those from OneDrive, Google Drive, Nextcloud, OwnCloud, etc. In such cases, the forensicVM’s network card can be enabled. This card has an inbuilt firewall designed to block access to identified local networks while permitting internet connections. Additionally, every time the network card is toggled on or off, all inbound and outbound traffic is recorded. This leads to the creation of a Wireshark pcap file for each activation and deactivation event.
Danger
It’s paramount to treat the activation of the network card as a method of last resort. Alternatively, consider using a remotely hosted forensicVM server. The integrity of the firewall isn’t foolproof, meaning there’s always a risk that malicious software might infiltrate your network. Furthermore, a compromised machine could ping back to an attacker, potentially revealing your external IP address and inadvertently notifying a malicious actor that they are under active investigation!
Enable the Network Card
To activate the network card on the forensicVM, there are two methods available. The first method involves using the Autopsy ForensicVM client plugin interface, and the second requires directly interacting with the web screen interface through the network icon.
Enable network card using the Autopsy ForensicVM Client Plugin Interface
Activate Network Card Button
Start the forensicVM machine.
Navigate to the Network Panel within the interface.
Look for the “Enable network card” button and click on it.
Confirmation of Network Card Activation
After clicking the button, a popup window will appear to confirm the successful activation of the network card.
Enable Network Using the Web Screen Interface
Activating the network card can also be achieved via the Web Screen Interface. This method allows users to manage network settings without diving into the main software interface. Here’s how to enable the network card using the Web Screen Interface:
Activating Network through Web Screen Interface Steps
Initiate the Panel Opener (1) to reveal the available options.
Locate and click on the network icon (2) to access network settings.
Identify and click the red button labeled Enable network (caution) (3) to activate the network card.
Acknowledgement of Successful Activation
Once the network card is activated, an orange notification will pop up at the top of the screen. This message serves to confirm that the network card has been successfully activated.
Reseting the Operating System Network Card
From time to time, due to various reasons such as IP conflicts, connectivity issues, or configuration errors, it might be necessary to reset the network card. Resetting can re-establish a proper connection and can often solve common networking problems. Below are methods to reset the network card in Windows and Linux.
Windows 10
In Windows 10, the Network Troubleshooter can assist in diagnosing and resolving common network-related problems.
Navigate to the system tray located in the bottom right corner of your screen.
Right-click the network icon.
From the context menu, select the “Troubleshoot problems” option. The Network Troubleshooter will now start, and it will attempt to diagnose and resolve any detected issues.
Other Windows Versions
In older versions of Windows, the process might slightly differ. Usually, there’s a network troubleshooting tool available but its location or name may vary. Check under “Network and Sharing Center” or within Control Panel for related options.
Linux
In Linux, depending on the distribution and the desktop environment, you can manage the network card through the graphical interface. However, for a more universal method:
Open a terminal.
To disable the network card (assuming it’s named eth0), type:
sudo ifconfig eth0 down
To enable it again, type:
sudo ifconfig eth0 up
Danger
Always proceed with caution when enabling the network, especially on systems that are meant for forensic investigations or are potentially compromised. It’s vital to ensure systems and network security and to be aware of the risks involved.
Collect Network Evidence
Enabling the network card is often crucial for forensic investigations, especially when collecting evidence from cloud services. This is particularly relevant when users have not logged out from a service or when session cookies remain in the browser. Such scenarios allow forensic investigators to trace digital breadcrumbs and gather additional evidence that may be inaccessible from offline forensic images. Below are two illustrative examples:
Gathering Data from Cloud Services - OneDrive Example
The following figure demonstrates data extraction from OneDrive, a popular online cloud service.
Gathering Data from Cloud Services - Online Storage Example
In this next example, an online file storage platform is accessed using cached credentials:
Disable the Network Card
There are two primary methods to deactivate the network card on the forensicVM:
Using the Autopsy ForensicVM client plugin interface.
Directly interacting with the web screen interface.
Disable Network Card with the Autopsy ForensicVM Client Plugin Interface
Steps to Deactivate Network Card:
Ensure that the forensicVM machine is running.
Within the interface, go to the Network Panel.
Click on the “Disable network card” button.
Using the Web Screen Interface to Disable the Network Card
The Web Screen Interface offers an alternative approach for users who prefer to manage network settings without engaging with the main software interface.
Steps to Disable Network:
Activate the Panel Opener (1) to view more options.
Click on the network icon (2).
Press the green Disable network (3) button to turn off the network card.
Download Wireshark pcap Files
Downloading pcap Files
To obtain the Wireshark pcap files, follow the instructions below:
Click the “Download Wireshark pcap files” button located on the Autopsy ForensicVM client plugin interface.
A Windows Explorer window will prompt you to select a save location for the pcap.zip file. It’s recommended to maintain the default save path, which is typically set to the image case folder.
The download progress will be displayed, indicating the time required to complete the download. This duration can vary depending on the size of the pcap.zip file.
Once the download is completed, a confirmation pop-up will appear, indicating the successful download and save location.
The Windows Explorer will automatically open to the default save location of pcap.zip.
To decompress the pcap.zip` file, you can use a program like 7-zip. The extraction can take some time, especially if the pcap files are large.
Analyze network traffic in Wireshark
Analyzing network traffic is an integral part of digital forensic investigations, especially when attempting to reconstruct a sequence of events or identify malicious activities. Using a tool like Wireshark to analyze traffic from a forensic image virtual machine can provide investigators with a wealth of information. However, this approach comes with its advantages and potential pitfalls.
Importance of Analyzing Traffic in Forensic Investigations
Evidence Collection: Analyzing traffic can reveal communication with suspicious IP addresses, hinting at potential data exfiltration or command-and-control servers.
User Behavior: Network traffic can provide clues about user behavior, including sites visited, files downloaded, or apps used.
Timestamps: Traffic analysis can help in reconstructing timelines of events, crucial for correlating actions across different evidence sources.
Detect Malware: Unusual network traffic patterns can be indicative of malware communication.
Advantages
Comprehensive Data View: Wireshark offers a detailed view of packets, allowing forensic investigators to delve deep into the network interactions.
Filtering and Searching: With its advanced filtering options, investigators can isolate relevant data quickly.
Decoding Protocols: Wireshark can decode a vast array of protocols, aiding in understanding the specifics of network conversations.
Visualization: Graphical features like flow graphs help in visualizing communication patterns.
Dangers
Data Overload: The volume of data in pcap files can be overwhelming, and without proper focus, important details might be missed.
Privacy Concerns: Analyzing traffic can inadvertently capture personal or sensitive information of innocent users.
Tampered Data: If the forensic image virtual machine is compromised, the network data might be tampered with, leading to incorrect conclusions.
Misinterpretation: Without proper expertise, normal traffic can be misinterpreted as malicious or vice versa.
Note
While Wireshark is a powerful tool for forensic investigations, it’s essential to approach the analysis with a clear understanding of the goals, the data’s context, and the potential pitfalls. Proper training and experience can help in maximizing the benefits of traffic analysis while minimizing risks. Given the complexity and subtleties involved in network traffic analysis, it’s recommended that forensic investigators continuously update their training and remain informed about the latest techniques and threats in the domain.
After extracting the pcap files, the next step is to analyze the network traffic captured during the period the network card was active. Here’s how to proceed:
Navigate to the extracted pcap directory. If Wireshark isn’t installed on your system, visit wireshark.org to download and install it. Once installed, Wireshark-associated icons will appear next to each pcap file.
Double-click the pcap file you wish to analyze.
The Wireshark interface will open, displaying the captured traffic. Adjust the view settings and apply filters as required based on your forensic goals. .. raw:: latex
FloatBarrier
The following is an example of network traffic analysis with a focus on cloud traffic.
Note
Analyzing pcap files requires a sound understanding of network traffic patterns and potential security threats. It’s crucial to interpret the data accurately to avoid misleading conclusions.