• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • Instructor
  • Syllabus
  • Lecture & Notes
    • Lecture 1: Introduction to Incident Response and Intrusion management
    • Lecture 2: CIRT
    • Lecture 3: Wireshark / Packet Captures
    • Lecture 4: IDS/IPS
    • Lecture 5: Detecting Intrusion
    • Lecture 6: Escalation
    • Lecture 7: LOGS / SIEM
    • Lecture 8: LOGS where to get them
    • Lecture 9: SOC : How to build a SOC for Incident Response Center
    • Lecture 10: SPLUNK
    • Lecture 11: Executive Brief
    • Lecture 12: Final
  • Assignments
    • Short Paper 1
    • Short Paper 2
    • Short Paper 3
    • Term Paper
    • Executive Brief: Presentation
  • Blog Post
    • Welcome
    • Week 2 Blog
    • Week 3 Blog
    • Week 4 Blog
    • Week 8 blog
  • LABS
    • LAB 1
    • LAB 2
    • LAB 3
    • LAB 4
    • LAB 5
    • LAB 6
  • Webex
  • Gradebook

Intrusion Detection & Response

Temple University

Week 3 Blog

Packet capture has proven itself as one of the core activities in network monitoring for all sorts of network issues:  Poor Network performance, attacks (Internal or External), and network baseline.

A cyber security analyst, must be proficient in the network analysis to be an effective security analyst.  If you don’t know what is present on your network, then how can you know what should not be there.

Unfortunately, trying to locate the signs of that breach within your network traffic, is like trying to find the needle in the proverbial haystack.

While a packet capture tool can detect all sorts of network traffic, it really is ineffective against encrypted traffic.  So, if a protocol being used on the network is open such as telnet / ftp / http, we would be able to detect and read the packet – payload to identify the content.  If the traffic in encrypted, then the payload will also be encrypted, hence it will be unreadable.

It is for this major concern that many organizations may not encrypt the traffic internally, and but encrypt the traffic as it leave the organization’s network at the perimeter. While this is a good approach, it is almost impossible to not have any encrypted traffic internally.  Since all of the users of network will visit external websites, which operate with the TLS protocol or https to protect the information.

When dealing with this kind of situation, we as analysts are forced to monitor the source and destination hostnames/IP addresses to ensure that the endpoints in question in a network conversation is legitimate and expected.

During this week, we will be installing and getting familiar with the Wireshark tool.  Wireshark is a GUI based packet capture tool.  It is available on various operating systems.  We will also discuss the strategy behind the use of wireshark in terms of capturing network traffic and the duration of the capture.

 

Reader Interactions

Comments

  1. Joseph Nguyen says

    May 30, 2017 at 12:24 am

    Got all kind of issues with snort windows starting with having no interfaces showing up with command snort -W then with the snort.config file. that doesn’t find the file white.list that was created under c:\Snort\rules\

    Log in to Reply
    • Deval Shah says

      May 30, 2017 at 10:19 am

      Lets not worry about snort yet. This will be at a later time. We will focus on Wireshark right now.

      Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Week 01
  • Week 02
  • Week 03
  • Week 04
  • Week 06
  • Week 08
  • Week 09

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in