Erik Hjelmvik: Network Forensics Training

Presented By: Erik Hjelmvik

The network forensics training class consists of a mix of theory and hands-on labs, where students will learn to analyze Full Packet Capture (FPC) files. The scenarios in the labs are primarily focused at network forensics for incident response, but are also relevant for law enforcement/internal security etc. where the network traffic of a suspect or insider is being monitored.

The 2 day course will take place on the 12th & 13th September 2017 at etc venues The Hatton.

Cost is £ 1,300.00 (inc VAT). Buy your place in our shop now.

Course Outline

Day 1: Theory and Practice using Open Source Tools

  • Theory: Ethernet signalling
  • Hardware: Network TAPs and Monitor ports / SPAN ports
  • Sniffers: Recommendations for high-performance packet interception
  • PCAP analysis: Extracting evidence and indicators of compromise using open source tools
  • Defeating Big Data: Techniques for working with large data sets
  • Whitelists: Learn how to detect 0-day exploit attacks without using IDS signatures
  • Challenge Day 1: Find the needle in our haystack and win a honourable prize!

Day 2: Advanced Network Forensics using Netresec Tools

  • NetworkMiner Professional: Learning to leverage the features available in the Pro version
    • Port Independent Protocol Identification (PIPI)
    • DNS Whitelisting
  • NetworkMinerCLI: Automating content extraction with our command line tool
  • CapLoader: Searching, sorting and drilling through large PCAP data sets
    • Super fast flow transcript (aka Follow TCP/UDP stream)
    • Filter PCAP files and export frames to other tools
    • Keyword search
  • Challenge Day 2

The Scenario

The scenario used in the class involves a new progressive Bank, which provides exchange services for Bitcoin and Litecoin. We’ve set up clients and a server for this bank using REAL physical machines and a REAL internet connection. All traffic on the network is captured to PCAP files by a SecurityOnion sensor. In the scenario this bank gets into lots of trouble with hackers and malware, such as:

  • Defacement of the Bank’s web server (see zone-h mirror)
  • Man-on-the-Side (MOTS) attack (much like NSA/GCHQ’s QUANTUM INSERT)
  • Backdoor infection through trojanized software
  • Spear phishing
  • Use of a popular RAT (njRAT) to access the victims machine and exfiltrate the wallet.dat files for Bitcoin and Litecoin
  • Infection with real malware (Nemucod, Miuref / Boaxxe and more)

Class attendees will learn to analyse captured network traffic from these events in order to:

  • Investigate web server compromises and defacements
  • Detect Man-on-the-Side attacks
  • Identify covert backdoors
  • Reassemble incoming emails and attachments
  • Detect and decode RAT/backdoor traffic
  • Detect malicious traffic without having to rely on blacklists, AV or third-party detection services

Professional software included FREE of charge

Each attendee will be provided with a free personal single user license of NetworkMiner Professional and CapLoader. These licenses will be valid for six months from the first training day.

Target Audience

Incident responders, digital forensics specialists and anyone else who want to improve their skills at finding evil stuff in full content packet captures.

Student Requirements

Previous experience using Wireshark to analyse network traffic is recommended.

You don’t need to be a bash expert, but please don’t attend this training if you are afraid of using Linux command line tools.

What to Bring

Attendees will need to bring a laptop that fits the following specs:

  • A PC running any 64 bit Windows OS (can be a Virtual Machine)
  • At least 4GB RAM
  • At least 40 GB free disk space
  • VirtualBox (64 bit) installed (VMWare will not be supported in the training)

A VirtualBox VM will be provided on USB flash drives at the beginning of the training.

Please note that having a 64-bit CPU and a 64-bit OS is not always enough to support 64-bit virtualisation. You might need to enable features such as ”AMD-V”, ”VT-x” or ”Hyper-V” in BIOS in order to run virtual machines in 64-bit mode. You might also need to turn off “Intel Trusted Execution” in BIOS. One way to verify that your laptop supports 64-bit virtualisation is to download the SecurityOnion ISO and see if it boots up in VirtualBox.

About the Trainer

Erik Hjelmvik is an incident responder and developer who is well known in the network forensics field for having created NetworkMiner, which is used by incident responders and law enforcement all around the world. Erik has a background in SCADA security and has spent over 5 years doing incident response at one of the best CERTs in Sweden. Nowadays Erik runs the company Netresec AB, where he develops network forensics software and occasionally teaches network forensic classes.

 

Book your 44CON 2017 training course now!