Document 261561

Copyright ©2013
Cyberoam Technologies Pvt. Ltd.
901, Silicon Tower
Off C.G.Road
Ahmedabad 380 006
India (Cyberoam).
All rights reserved.
No part of this training material may be reproduced in any form by any means (including but not
limited to photocopying or storing it in any medium by electronic means and whether or not
transiently or incidentally to some other use of this training material) without permission in
writing from Cyberoam. Requests for permission to make copies of any part of this training
material should be mail to:
Cyberoam Technologies Private Limited, 901, Silicon Tower, Off C. G. Road, Ahmedabad 380
006, India
Warning: The doing of an unauthorized act in relation to a copyright work may result in both a
civil claim for damages and criminal prosecution.
Cyberoam, Cyberoam NetGenie, Cyberoam Central Console are Trademarks of Cyberoam.
This training material may have referred few trademarks for the purpose of indentifying certain
products and/or services. All those trademarks are owned by their respective owners.
This training material is designed to provide accurate and authoritative information in regard to
the subject matter.
While Cyberoam has taken all due care and diligence at the time of editing and publishing training
material, Cyberoam does not hold any responsibility for any mistake that may have inadvertently
contained within training material. Cyberoam shall not be liable for any direct, consequential, or
incidental damages arising out of the use of the training material.
Networking Basics
A network is a data communication system that allows users and devices to communicate with each other. A
network that contains computers as a part of devices is known as a “Computer Network”. When a message is
sent across from one point to another point, we say that communication has taken place.
A message is a term used for the information and a single unit of communication transmitted over a network. A
message can be anything like an email (Electronic Mail), a file, an image, or any piece of information. A PC or
any other machine which is capable of processing information is known as a network node.
In a communication process minimum 2 PC’s or devices are involved. The device which initiates the
communication is known as a sender and the device which receives the message is a receiver. Sender and
Receiver are connected to each other via a medium or media which is generally in the form of wires (nowadays,
wireless).
Types of Media
Signals generated by the sender and receiver during the transmission process require a medium through which
they should travel to their destination. The transmission media is divided into two broad categories.
1. Guided
2.
Unguided
The overall categorization of the transmission media is shown by the above figure, however the detail
description of each is given below.
Guided Media
Guided Media are those types of media that provide a conduit from one point to another on the network. These
include the twisted pair cable, Co-axial cable and the Fiber Optic cable.
Twisted Pair Cable
This cable comes in two forms
1. UTP (Unshielded Twisted Pair)
2.
STP (Shielded Twisted Pair)
UTP Cable
UTP is the most commonly used cable today. The UTP consists of two cables wound on each other and
jacketing a copper wire, each with its own colored plastic insulation.
There are seven major categories of this type of cable. The category number of the cable tells us how many
numbers of pairs of wires are contained in the cable.
3. Category 1
This type of cable contains a single pair of wires. This is the basic twisted pair cable generally used in telephone
systems. This type of cable cannot be used to carry computer signals and hence are not suitable for computer –
computer communication.
4. Category 2
This type of cable contains 2 pairs of wires (total 4 wires). It is suitable for voice and data communication up to 4
Mbps only.
5. Category 3
This type of cable has 3 pairs of wires (total 6 wires). It is suitable for data transmission up to 10 Mbps. It is now
a standard cable for most of the telephone systems.
6. Category 4
This type of cable has 4 pairs of wires (total 8 wires). It is suitable for data transmission up to 16 Mbps and can
be used for low speed computer – computer communication as well as voice communication.
7. Category 5
This type of cable is suitable for data transmission up to 100 Mb per second. This cable is mostly used for
LAN’s.
8. Category 5e
This cable is similar to a category 5 cable but can support up to (1024 Mb – 1 gigabit per second) transmission
speed.
9. Category 6
This cable is the fastest copper cable. The speed of this cable is 10Gbps and it is said to be made out of the
best copper material.
Cable Pin outs
There are two basic pin outs used in the cabling the Ethernet cables. The cables are connected to the computer
using a RJ45 connector which is a standard defined by the TIA (Telecommunication Industry Association)
10. Straight Cable
11. Cross-Over Cable
In a straight cable, the pins on the sender match the pins on the receiver. For Example, suppose pin no 1 is
used for sending data and pin no 5 is used for receiving, then it is obvious that if communication is taking place
from one computer to another computer without any interconnecting devices, then, the sending pins on the
sender side should be bound to receiving pins on the receiving side, giving rise to a cross over cable. At the
initial level, we can remember that if no switching devices are used, a cross over cable is used for computer to
computer communication (peer to peer) and a straight cable is used for communication between computer and
other devices like switches, hubs, and more.
The Straight and Cross-over terminologies apply to cables Category 5 and 6 cables only. Each cable consists of
four basic colors (Blue, Brown, Orange, and Green) with their corresponding white colored wires known as
White-Blue, White-Brown, White-Orange and White-Green.
The pin numbers on the connector can be understood from the diagram below.
The cabling method according to the TIA standard can be understood from the below tables.
Straight Through cable
RJ45 Pin # (End 1)
Wire Color
Wire Diagram
RJ45 Pin # (End 2)
Wire Color
1
White/Green
1
White/Green
2
Green
2
Green
3
White/Orange
3
White/Orange
4
Blue
4
Blue
5
White/Blue
5
White/Blue
6
Orange
6
Orange
7
White/Brown
7
White/Brown
8
Brown
8
Brown
Wire Diagram
Cross Over cable Table
RJ45 Pin # (End 1)
1
Wire Color
White/Green
Wire Diagram
RJ45 Pin # (End 2)
1
Wire Color
White/Orange
Wire Diagram
RJ45 Pin # (End 1)
Wire Color
Wire Diagram
RJ45 Pin # (End 2)
Wire Color
2
Green
2
Orange
3
White/Orange
3
White/Green
4
Blue
4
Blue
5
White/Blue
5
White/Blue
6
Orange
6
Green
7
White/Brown
7
White/Brown
8
Brown
8
Brown
Wire Diagram
STP Cable
A shielded twisted pair cable has a protective shield (covering) within which the two ends of the wire run the
entire length. A STP cable can be thought of as a UTP but with a jacketing. A shielded twisted pair has a metal
foil or a braided-mesh covering the insulated wires. The major application of the STP cable is the electric
industry. This cable is mostly used for powering up electrical devices. However, many ISP’s also use this type
of cable to terminate the broadband link at customer premises.
Co-Axial Cable
A co-axial cable consists of a center wire which is surrounded by an insulation which in turn is surrounded by a
braided wire and a shield above the braided wire. This type of cable is primarily used for cable television. This
cable can also be used computer networks where high amount of data transfer is required, as this cable has a
high frequency.
Fiber Optic Cable
A fiber optic cable works on the principle of reflection of light. We know that light travels at a very fast speed.
Hence, communication can also be done in the form of light waves using the fiber optic cable. The structure of
this cable includes a sheath of glass covered by an outer glass. The light travels through the core of the wire by
reflecting over the surfaces of the glass and hence reaches the destination. Fiber cables are used in computer
communication. Many other devices like audio players also use the fiber cables known as SPDIF (Sony Philips
Digital Interface).
Unguided Media
The unguided media is usually the wireless medium and it can be in the form of radio waves and micro waves.
The wireless media can broadly be classified into following categories

Wi-Fi
Wi-Fi is a wireless technology which allows user to send and receive data using radio waves. Wi-Fi can also
provide intra-network and the Internet. The products complying to Wi-Fi define Wi-Fi as a Wireless Local Area
Network (WLAN), To check if any device provides a Wi-Fi standard, we can check for the Wi-Fi logo on the
device. Wi-Fi is an abbreviated term actually used for WLAN.

3G
3G or 3rd Generation mobile telecommunication is standard for mobile phones and mobile telecommunication
giving services like wireless telephone, mobile internet, and Mobile TV.

4G
4G or 4th Generation mobile telecommunication is a successor of the 3G technology. A 4G system provides very
high speed internet access wirelessly.

Wi-max
Wi-Max (World Interoperability for Microwave Access) is a standard in wireless communication which results
into very high speed of data transfer, wirelessly. It is a part of the 4G (4 th Generation) wireless technology.
Modes of Transmission
There are three types of strategies used for data transmission between two communicating machines
12. Simplex
13. Half Duplex
14. Full Duplex
In simplex type of communication, the data transfer is done in one way only. A data can travel from point A to
point B only but the reverse does not apply true. Example of a simplex type of communication is a door-bell. A
door-bell only informs the housemates that there is someone at the door, however, the housemates cannot
inform anything to the visitor.
In Half Duplex mode, the line between the two points is set up in such a fashion that it allows data to be
transferred in both the directions, but only one at a time. While one node is busy sending the data, the other
cannot send and vice-versa. Example of half-duplex type of communication can be considered as a hanging
bridge where only one person can pass at a time. People can move in both the directions, but at any time,
people moving in one direction are only allowed. Another example can be of a single way road with traffic
controllers at each end.
For more information refer
Cyberoam Academy Courseware
Overview
The network security fundamental is a new concept because prior to the familiarization with the computers, they
were not networked. The early day networks were mostly LAN’s. When first deployed, they were secure because
they were physically isolated and did not have connection to other networks. Gradually, as WAN’s developed and
with the increase of Internet usage, LAN security became a big question. In today’s time it is essential for everyone
to secure their network as there are very few networks do not have an Internet connection.
What is Network Security?
Network Security is a methodology which consists of policies defined by a network administrator to monitor and
prevent unauthorized access of the network. Unauthorized access also includes misuse, modification, and services
of the network. This methodology includes the authorization to access data in the network which is controlled by
the network administrator. More detailed description of each component and terminology used in network security
will be discussed in this module.
Why is Network Security important?
When we talk about the importance of the network security, it becomes essential to talk about the usage of the
network and the type of users. It is essential that while we use the internet we have to be sure that the device
through which we are connecting the Internet is in a usable condition for the later stages. It is known that when we
are connected to the internet, we are also connected to several thousands of networks with millions of users. So,
network security becomes a vital component in the configuration of the network environment. We shall see the
types of securities henceforth.
Identifying Risks in the Network
Network risk is a broader term and can be divided into many smaller terms which are discussed in the topics to
follow. However, a network risk is any circumstance which can affect the network of an organization. We have
classified risks into three main categories; Threats, Vulnerabilities, and Attacks.
Threats
A threat is any such incident which can harm the security of a computer network. Threats are categorized into
internal and external threats.
Internal Threat
Till now we have only known that the threats to a network is from the Internet, and other outside world, but a study
reveals that the actual threat to an organization is more internal than external. Internal threat hence can be
considered as most serious type of threat. Insiders (the people who are associated and work in the network),
whether them being an employee or a network administrator, have complete knowledge of what’s going inside and
access the resources inside the network. An insider does not need to crack a password, or any other tool to get the
data. They can easily and efficiently manage from within the network. Most of the network security defenses are
not able to deal against the threats from inside.
External Threat
External threats are the threats which come from outside the network usually through the internet. An external
threat relies on technical means to achieve its goals. The network security defense mechanisms fight most against
the external threats. Firewalls, Intrusion Prevention System (IPS), and other such terms can help to reduce the
threats to an organization. We shall see all these terms in detail in the later modules. External threats can also be
the creation of god like Storms, Floods, Earthquakes, and fires. However, external threat can be a physical threat
like burglar as well.
Vulnerability
Vulnerability is defined as an organization’s own weakness. Vulnerability is a loop hole in the network which could
have been prevented but due to some lacks, it could not be prevented and becomes a threat to a network.
Vulnerability is a combination of three major elements; a flaw in the system, an attacker can access the flaw, and
attacker having a capability to exploit the flaw. A security risk can be classified as vulnerability. A vulnerability
which is still working in many instances with implemented attacks is known as a exploitable vulnerability.
Vulnerability can also be in the form of a security bug, which is fixed in a small duration of time after the
exploitation. However, a security bug is a very small form of vulnerability. These types of security bugs are
generally fixed by software patches and upgrades.
Confidentiality Attacks
A confidentiality attack talks about a person stealing or trying to steal an organization’s confidential data. A
confidentiality attack is not necessary only physical but can be logical also. An attacker may try to copy sensitive
files onto a USB Memory without the information of the owner, or even without leaving a trace. It is difficult to track
any unauthorized copying or leakage of data without auditing and monitoring the data at all times. Confidentiality
attacks are classified into two groups; physical and logical.
Logical Attacks
Packet Sniffing
Packet sniffing is a technique used to intercept and log the traffic passing over a network. It is also known as a
packet analyzer. A sniffer is basically a computer program or a piece of hardware that will capture each packet
flowing in the network and check its contents. There are various such free and paid software’s available on the
Internet. These attacks are discussed in the later module of “Ethical Hacking”.
Port scanning
Port scanning is a technique which scans a system for the ports open to communicate. As we have already seen in
the previous module that each protocol and service uses a different port on the system to communicate. Therefore,
in any system, there are many numbers of ports that are always open. These ports can be scanned by attacker, to
breach the confidentiality of an organization.
Social Engineering
Social Engineering is when an attacker uses the social skills like relationships or other social media to manipulate
or gather sensitive organization information. Bribing an employee, sending emails or links to a person within the
organization to collect organization data is also coined as social engineering.
The above given attacks are just the starting; more has been discussed on all the tools and techniques in
the “ETHICAL HACKING” module.
Physical Attacks
Dumpster diving
Dumpster diving is a technique in which an attacker can search for information, or try picturing a information from
waste disposed by the company. In this technique an attacker can look for information like phone number, charts,
memos, or any other organization material using which a valuable source of information can be built.
Wiretapping
Wiretapping is a physical confidentiality attack in which an attacker monitors the wires (telephones, Internet, etc)
without the knowledge of the organization. In this case the attacker has his wiring attached to the wiring of the
company, and as a third person, attacker simply taps the communication.
Network Security Objectives
From the earlier discussion we have seen how a network can be attacked. The only secured computer in a network
is the one which is not connected to the network, is still inside the box and is thrown deep down in the ocean, but
we know that such computer will have no meaning and no use. Our objective is to use the computers in the
network and at the same time, secure them as well. Below given are some of the objectives of network security.
Assumptions
Before developing a security solution for a network, it is necessary to assume many fundamentals. To name a few,
we need to think about the future expansion of the network, change in future operating systems, change in other
software’s, change in internet connections, or change in physical location of an organization, etc. Like any software
development application, a Life Cycle has to be calculated. A network engineer must be able to answer any
physical and logical changes that can be done in a network.
Requirements
The basic security principles have a few requirements like confidentiality, Integrity and availability. We will discuss
the above requirements as goals of a network security environment at the end of this module.
Security Principles
Network security can be in form of software or a hardware which guards us by not letting the objectionable traffic
flow from an unknown network to our network. The network security can be shown by a security pyramid.
Prevention
Prevention is the foundation of the security pyramid. To provide security it is vital to execute measures for averting
the network threat. In budding network security methods, organizations take precautionary measures over
recognition and reaction. It is easy, and more money-making to prevent a security breach than to detect or
respond. A company always wants that their preventative measures are strong enough to put off likely criminals
(inside, and outside the network).
Detection
Once preventative processes are implemented, actions need to be introduced to detect potential problems or
security breaches, in the event precautionary measures fail. It is important that problems be perceived
immediately, the sooner a trouble is identified the easier it is to rectify and crackdown.
Response
Businesses need to develop a sketch which will classify the response to a protection breach. The plan should
identify who is responsible for what actions and their responses and levels of intensification. A response is an
answer that will be specified when a breach has been committed in the network.
Implementing Network Security
From all the above discussion, a network security solution has to be implemented in two broader categories;
physical and logical.
Physical Network Security
Before trying to secure a network environment with a good security solution, it is necessary to secure the network
using good physical and technical controls. To name a few, an intruder detection system (doesn’t let an outsider to
enter an organization), security guards, locks, safes, racks, UPS (Uninterrupted Power Supply), Fire support
systems, and Air-flow systems, etc. are some of the examples.
Logical Network Security
Logical network security is the actual security that is provided either as a piece of hardware of software installed in
an organization’s network. The trending logical security started with the development of firewalls which is
discussed in the sections below.
Evolution of Firewalls
When network security first started to be implemented, it was as a firewall solution. This solution restricted the flow
of packets. A firewall does not have a fixed meaning. However, it can be understood as partially hardware and
somewhat software which is used to block any objectionable traffic on a network. By the meaning of the word we
can understand that a firewall is “a barrier inside a building, designed to limit the spread of fire”.
For more information refer Cyberoam
Academy Courseware
Terminologies
Before we can actually move on to what is ethical hacking and penetration testing it is essential for us to
understand a few basic concepts about hacking like
Why information security is important?
In the modern era with digitization making the world a small place, it is very essential to safeguard sensitive
information like credit card numbers, social security numbers, private details of a person, etc. In the case of an
organization there are major examples like private data of a customer, organization’s own private data like design
files, code files, marketing secrets, etc.
Not only does it show that it is vital for an organization to protect the information, but also to take precautionary
steps and be prepared for the worst case to happen. Hence what is required here is that the organization be
prepared for any type of attack by a hacker. It is rightly said that to prevent a theft, think like a thief. Hence, to
prevent a network from being hacked, think like a hacker and act like a hacker. In other words, an Ethical hacker is
required to find the flaws in this system and provide security.
What are the elements of security?
We have already seen the elements of security in module 2. The elements of security are confidentiality,
authenticity, integrity and availability.
Before knowing what is hacking, it is mandatory to know the following terminologies
Threat
Any event that has the potential to compromise security is a threat. Threat can be any event or action.
Vulnerability
A loophole or bug in the system is known as its vulnerability. Vulnerabilities can be classified into two major
categories, hardware vulnerability and software vulnerability. The other categories of vulnerability are based on its
seriousness or severity. i.e. Low, Medium, High, Critical, etc.
Attack
Attack is an abstract term relating to the intention of an individual to either explore an already known vulnerability or
generate an attack to find a new vulnerability.
Exploit
Exploit is the defined way in which using a vulnerability, the security can be compromised. Exploit can be a piece
of code (normally known as a tool). A common example can be given for all the terminologies above A person
starts thinking about compromising an organization’s security (Threat). The same person tries to break through an
organization’s infrastructure (Attack). He finds a way (Vulnerability) in which attack can be done (Exploit).
Phases of hacking
Because it requires an ethical to know what a malicious hacker will do, we now see what an actual hacker will do.
An actual hacker’s activity can be divided into 5 phases, please note, these phases are described in detail in the
next section (“What is Ethical Hacking?”). The five phases are:1. Reconnaissance
2.
3.
4.
Scanning
Gaining Access
Maintaining Access
5.
Clearing Tracks
Classes of Hackers
There are four basic types of hackers or classes of hackers namely, Black Hats, Grey Hats, White Hats and
Suicide Hackers.
Black hats are the bad guys also known as crackers. They generally use destructive activities to take down the
target, with a reason or without a reason. Black hats have extraordinary computing skills.
White hats are the individuals who have good hacker skills and use them to defend against the black hats. These
people are also known as security analysts and ethical hackers.
Grey hats are the individuals who at times work as black hats and sometimes as white hats.
Suicide hackers are those type of hackers whose aim is to compromise critical processes and do not care even if
they were jailed for lifetime.
Hence, from the above we now know that ethical hackers are the white hat community. Therefore to define an
ethical hacker, we can say that an ethical hacker is a person who uses their hacking skills to defend against the
black hats.
Cyber laws
As a learner who wants to be an ethical hacker, it is essential to know the Cyber laws prevailing in each country.
To be specific, every country has their own law for hackers. Hackers are dealt with severely in each country. If any
hacker is found to be doing an activity that can endanger life of an individual, they can even be given a life
sentence. A few acts and laws are stated below for reference

SPY Act

U.S. Federal Law
Given below is the list of US Federal Laws for Cyber Crimes. More of the laws can be found on the judicial website
of your country.
Posse Comitatus Act of 1879
Antitrust Laws and Section 5 of the Federal Trade Commission Act
National Institute of Standards and Technology Act
Federal Power Act
Communications Act of 1934
National Security Act of 1947
US Information and Educational Exchange Act of 1948 (Smith-Mundt Act)
State Department Basic Authorities Act of 1956
Freedom of Information Act (FOIA)
Omnibus Crime Control and Safe Streets Act of 1968
Racketeer Influenced and Corrupt Organizations Act (RICO)
Federal Advisory Committee Act (FACA)
Privacy Act of 1974
Counterfeit Access Device and Computer Fraud and Abuse Act of 1984
Electronic Communications Privacy Act of 1986 (ECPA)
Department of Defense Appropriations Act, 1987
High Performance Computing Act of 1991
Communications Assistance for Law Enforcement Act of 1994 (CALEA)
Communications Decency Act of 1996
Clinger-Cohen Act (Information Technology Management Reform Act) of 1996
Identity Theft and Assumption Deterrence Act of 1998
Homeland Security Act of 2002 (HSA)
Federal Information Security Management Act of 2002 (FISMA)
Terrorism Risk Insurance Act of 2002
Cyber Security Research and Development Act, 2002
E-Government Act of 2002
Identity Theft Penalty Enhancement Act
Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA)

U.K Cyber Laws

European Law

Japan’s Cyber Law

Australia’s Cybercrime Act

India’s Information Technology Act

Germany’s Cyber Law

Singapore’s Cyber Law

Belgium Law

Brazilian Law

Canadian Laws

France Law

Italian Law
What is ethical hacking?
To understand “Ethical Hacking”, we must first understand what is hacking and how it can be ethical. Hacking is
the terminology used for an activity in which a person (hacker) gains unauthorized access to a resource which he
should not be using. Unlawful hacking is the process when the hacker not only gains unauthorized access, but also
modifies the content of the information in such a way that it can harm the organization. Ethical means doing a deed
by abiding the principles. Hacking is no way ethical, but ethical hacking involves the hacker to use the hacking
techniques to find any vulnerability in an organization’s network.
Purpose of ethical Hacking
As from the above we now know that an ethical hacker is a computer and network expert who attacks the
resources on behalf of its owners, seeking exploits that a malicious hacker could exploit. The primary purpose of
perform ethical hacking is to test a security system. Ethical hackers use the same methods as the malicious
hackers, but report problems instead of taking advantage of them.
Phases of Ethical hacking
Ethical hacking can be broadly divided into five major phases
1. Reconnaissance
Reconnaissance is the phase in which information is gathered about the victim to be attacked. Reconnaissance is
a very broad term which also includes creating a foot print of the network. More about reconnaissance and
Footprinting can be understood from Footprinting in the later part of this module. In Reconnaissance gathering the
details with the use of computers and without the use of computers is covered. In our case, we shall see
Reconnaissance and Footprinting in which a computer is used to gather information about the victim.
2. Scanning
Scanning involves the task to examine the information gathered from the reconnaissance.
3. Gaining Access
This is the phase in which the hacker gains access to the vulnerability discovered.
4. Maintaining Access
Once an access is gained, the hacker wants to keep the access for future use to launch other attacks.
5. Covering Tracks
Once a hacker has been able to gain and maintain access, it becomes important for the hacker to cover the attack
by adding a patch, or adding another layer of security.
The major phases of ethical hacking discussed above, are discussed in detail in the later part of this
module.
Being ethical
As we have discussed about hacking and ethical hacking, we now know that an ethical hacker is the good guy,
also known as White Hat. A malicious hacker is known as a Black Hat. There are some hackers who sometimes
are ethical, and sometimes malicious, these are categorized as Grey hats. When we talk about being ethical, we
are talking of the white hats.
Perform penetration test
Penetration Testing is the first job that can be done by an ethical hacker, the main function in this type of a test is to
carry out an entire test on the network and check for any loop holes. If loopholes exist, the ethical hacker shall
report it to the owner of the network. In this module we shall see more of ethical hacking, penetration testing in the
later part of this module.
Footprinting
Footprinting is a pre-attack phase which starts just after information is collected without the use of computer. We
already know that during the reconnaissance phase, the hacker tries to collect as much information as possible
about the target. Footprinting involves the hacker making a blueprint of the security profile defined by the
organization. It is also said that the hacker spends 90% of the time collecting the information about the target and
10% to launch to the attack. Listed below are the areas which the hacker seeks during the Footprinting phase.
The hacker tries to collect the following information about the target, irrespective of whether the target is on the
Internet, or Intranet.
1. Domain name
2.
3.
Network Blocks
IP Addresses of systems that are reachable
4.
5.
Open ports
Running services (TCP & UDP)
6.
7.
ACL’s
Enumerating System Users, and Groups (getting SNMP info.)
8. And more…
The major steps involved in Footprinting are described in the paragraphs to follow
Gathering target information
For an attack to take place, it is important that all the information about the target is gathered. It is rightly said that
more time is spent over collecting the information about target than in launching the attack on the victim. The
methodology adapted here includes
In this process the hacker starts from the scratch, collecting all the information like company’s URL, getting an
archive of the company website, getting more company information from search engines like Google, doing a
people search over switchboard, yahoo, Google, etc., getting the company maps from Google earth, etc. The latest
and proven technique to gather target information is also by scrolling job sites.

Getting the initial target information

Locating network range

Finding active machines in the network

Discovering open ports

Detecting operating systems

Mapping the network
Using Google and other search engines
Google is by far the most used search engine in the world today. Google can be used to find information about any
individual or organization. Searching on Google is comparatively easy. Google and some other popular websites
can be used to get the email address, Phone number, and other details on any victim.
From the screen above, we can see that Google can be used for advanced searching. It allows the user to search
the content matching all the words (1), exact phrases (2), any of the words (3), and many more. Moreover, Google
also allows to search by the type of file. The most common file types that can be searched are Word documents
(doc), Shockwave Flash object (swf), Adobe PDF file (pdf), Excel spreadsheet (xls), and a few more.
DNS records
In the context of a web site attack, the DNS records of the website can be searched to get the names of the
registrant of the website. The DNS records also give the phone number and other contact details of the person in
whose name a particular website is registered. In most cases, the registrant of a website is always the
administrator, or the owner/CEO of the organization.
Social engineering
Social engineering is the best way to gain information about any person. Social engineering involves gathering
information about target through socialization. Like for example, the attacker can send emails to a victim for
friendship, or if in a case the attacker already knows the victim, they can directly approach the victim by offering
some gifts and try to get the organization vital data. Social engineering is covered again at the end of this module.
Tools
In this section, we will see the some of tools used in gathering information.
WHOIS
WHOIS also pronounced as who is, is a well known tool to find the owner information from any domain name.
Lookup in WHOIS is free and can be used any person over the globe. There are several websites which offer the
WHOIS service like www.whois.com, www.whois.net, and many more. A sample from whois.com is shown below.
For more information refer
Cyberoam Academy Courseware
Introduction
Network Forensics can be treated as a separate branch of computer science which deals with investigation of
computer security breach. Not only is forensics defined at the level of computer security breach but can also be
defined in data breach or a policy breach. A data breach is when data of an individual or an organization is copied or
transmitted in any form without the permission of the foresaid. A policy breach is when an individual attempts to
breach a policy like for example, browsing restricted website, resource, etc.
Companies like Cyberoam have been constantly researching these facts and have an free (open source) reporting
software known as Cyberoam iView. iView is free to use, distribute and does not require licensing. However when
the vendor like Cyberoam makes a UTM device, it also makes sure that the reporting solution iView is available on
the appliance itself.
In the topics to follow we will discuss the network forensics with help of 2 different case studies.
What is Forensics?
Network Forensics is monitoring, analyzing and recreating a scene for the purpose of information gathering, legal
evidence or an intrusion. Network forensics has two uses.
1. To implement security, which consists of monitoring the network and logging all the activity like for example the
Cyberoam appliance and its open source on-appliance reporting solution iView.
2.
Relating to law enforcement, which consists of investigating/recreating a network crime scene.
Generally, when the first use mentioned is well implemented, the second use can be easily achieved. For an
example, iView offers compliance based reporting for compliances like CIPA, HIPA, etc. therefore in a case of
breach the compliance reports can be sought to get evidences. We shall look into law enforcement and how iView
can be used for network forensics in the case study which follows at the end of this module.
Types of Forensics
Forensics is a mammoth term, hence to break it down in order to simplify, we can list the types of forensics. This
section will help us understand the types of forensics.
Network
Network forensics is when forensic activity is done on the network, meaning no individual computers are referred for
information. Network forensics include each activity over the network like

Email forensic

Chat forensic

Protocol forensic

Application forensic (Applications which require Internet Connectivity)
Computer
Computer forensics is when an individual computer is used to recreate an event, or finding out the activity done from
an individual computer. We are aware that any and all forensic activity requires Internet, any forensic activity to be
carried out cannot be done on a computer which is not connected to the Internet merely because the computer will
have its own data there will be no signs of breach, data leakage, or violation of laws.
A computer when connected to the Internet is susceptible to network forensics. Therefore we can explicitly state that
network forensics does most of the part of computer forensics as well and hence, network forensic is the major area
to look at. For an example, if a threatening email is sent by a person X to person Y, we would not refer to Person X’s
computer. The only information that probably can be sought from Person Y’s computer is the email headers. All other
information can be obtained by Network forensics.
Why forensics?
The answer to this question is keeping an eye on the activities done by each user in order to keep the processes of
an organization working smoothly and be able to respond to any incident. The forensic investigation and forensic
reporting is required for the following

Responding to a network incident

Supporting a crime investigation
Forensics in Action
Monitoring user activity
In the context of network security, it becomes essential for an organization to monitor each activity in the network. For
forensics to happen, it is required that logging and reporting solution be in place. There are many network
transactions that need to be captured and recorded like

Authentication events

Email activity

Messenger/Internet application activity

Internal Web Server(s) activity

Web Traffic (HTTP/HTTPS)

Other Protocol Traffic like FTP, etc.
The above points discuss about an organization where there are no restrictions on any user to browse Internet
resources, however we are aware that in most of the organizations, restrictions do apply. In that case also, a
capturing and recording solution is required.
According to a Gartner Survery, for most of the organizations social media should be blocked. The primary reason
behind this is loss of productivity. To add more, an organization’s own personal information can be leaked and
floating on social media. For an example, as of current date the popular social networking site Facebook is banned
in several countries including Republic of China, Iran, Uzbekistan, Pakistan, Syria, and Bangladesh. Additional to
this, many bandwidth hungry applications like online music, games, videos, etc. are also banned by organizations.
However, users try bypassing the corporate network with help of a proxy server. Cyberoam application firewall can
identify these types of bypassing activities and log them for the network administrator to look upon.
Hence, to conclude, not only the organizations having unrestricted Internet access need to capture and record the
network data, but the organizations with strict Internet policies also need it.
Identifying source of data leak
It has majorly been reported by organizations’ that their valuable data is leaked because of availability. The motive of
data being available to its employee’s often leads to data leakage. Data leakage source involves two major
contributors.

Person/Individual/computer from where the data is leaked

Media through which the data is leaked
When we talk about a person or an individual leaking the data, it is very difficult to trace down an individual involved
in data leakage. Primary reason for the difficulty in tracing is because of the organization’s dynamism. To name a few

Dynamic IP address schema

Roaming tendency of a user

Bringing own devices like USB drives, Mobiles, etc. in organization network

Using own network, example 3G.
An individual who wants to leak the data can do the leak in several possible ways like for example

Email

Chat (Messenger)

Web Upload

FTP servers

Cloud Storage Drives

USB Sticks

Mobile device memory
Since our scope is limited to network forensics, we shall enhance more on network forensics only, however for the
information, in cases like USB sticks and mobile device memory, computer forensics comes in handy. We shall also
see a sample incident on data leakage in the case study to follow.
Capturing and Recording Data
For a network forensic solution it is essential from the previous explanation to capture and record all the data about
“What’s going on?” in the network. An efficient forensic solution should be able to capture the following data

Authentication data along with username in place of IP addresses

Email transaction data; each small data from an email transaction like sender, receiver, number of bytes, date
and time of email, subject line, etc.

Website visit data; each website visited by a user data like website URL, sub domain, category of website, data
upload/download to/from the website, total bytes transferred, etc.

Messenger data like message sender, receiver, file name, file type, etc.
Not only should the capturing solution be wise enough to record the above data, but it should also consider
parameters like storage space and security of captured data. Storage space management techniques have to be
employed so that a proper storage space is allotted to the capturing software. Also, it should be make sure that all
the data is being captured, like in case of an organization with multiple branches, it has to be ensured that all branch
office data is collected and sent to head office. Another point to be noted here is the safety of data, principles like 4eye authentication must be in place so that the captured data is seen only by authorized personnel.
Discovering data
Discovering data is primarily related to filtering the captured data, however, it is also related to discovering live data
like live connections, packet capture, traffic discovery and real time traffic logs.
A forensic solution must be able to filter data on many criteria’s listed in the sub topics below

Email
Filtering criteria should include sender name, sender email, sender IP address, receiver name, receiver email,
receiving mail server IP address, subject line, body text search, etc.

Chat (Messenger)
Filtering should include username, message search, file name search, file type search, file MIME header search, etc.

Web Upload
Filtering criteria should include username, website name, URL search, category search, etc.
Analyzing data
Once the capturing, recording and discovering of data is done, there should be a mechanism where the forensic
solution puts the data in proper place, meaning in a sensible format which can be easily understood by the
investigator. The required analysis is different in different forensic situation, however to shorten it down, an
investigator’s five questions should be answered by the forensic solution, namely, How? Where? What? When? &
Why?.
Managing the data
When a forensic solution has loads to data to manage, it should be ensured that proper data management facilities
are available. To list a few, the solution must be able to define the range of dates, asking the administrator to
maintain data between a range, purge data between a range, etc. Also, it is the task of the solution to maintain
proper place and availability on a physical hard disk where the data will be stored. Henceforth we will learn the
forensic solution like iVIew which is available on the appliance like Cyberoam and also as an open-source reporting
solution.
Understanding Data Recording
Reporting solution like iView offers a single view of the entire network activity. This allows organizations not just to
view information across hundreds of users, applications and protocols; it also helps them correlate the information,
giving them a comprehensive view of network activity.
With iView, organizations receive logs and reports related to intrusions, attacks, spam and blocked attempts, both
internal and external, enabling them to take rapid action throughout their network anywhere in the world.
Firewall Captures
The UTM captures are represented on the Log viewer page on the appliance. Log Viewer page allows to view the
logs for modules like IPS, Web Filter, Anti Spam, Anti Virus and Firewall. This page gives consolidated information
about all the events that have occurred.
Web filter
Application Filter
Anti-Virus
For more information Refer
Cyberoam Academy Courseware