Title of Tools:: 1) Network Miner 2) Wire Shark
Title of Tools:: 1) Network Miner 2) Wire Shark
Title of Tools:: 1) Network Miner 2) Wire Shark
1) Network miner
2) Wire shark
INTRODUCTION
NETWORK MINER:
Network Miner has, since the first release in 2007, become a popular tool
among incident response teams as well as law enforcement. Network Miner is
today used by companies and organizations all over the world.
WIRE SHARK:
Wireshark is the world's foremost network protocol analyser. It lets you see
what's happening on your network at a microscopic level. It is the de facto (and
often de jure) standard across many industries and educational institutions.
Wireshark development thrives thanks to the contributions of networking
experts across the globe. It is the continuation of a project that started in 1998.
In the past, such tools were either very expensive, proprietary, or both. However,
with the advent of Wireshark, that has changed. Wireshark is available for free, is
open source, and is one of the best packet analysers available today.
Wireshark isn’t an intrusion detection system. It will not warn you when
someone does strange things on your network that he/she isn’t allowed to do.
However, if strange things happen, Wireshark might help you figure out what is
really going on.
Wireshark will not manipulate things on the network, it will only “measure”
things from it. Wireshark doesn’t send packets on the network or do other active
things
APPLICATIONS OF TOOLS
NETWORK MINER:
The way data is presented not only makes the analysis simpler, it also
saves valuable time for the analyst or forensic investigator.
WIRE SHARK:
NETWORK MINER:
Network Miner automatically carves out the files found in the network
stream, saving them to a local folder.
Network Miner is a free Windows utility for analysing network traffic.
The tool is designed to only display the details most relevant to network
forensics.
There are several tools that could capture relevant details about the attack, so
you can analyse them to understand what transpired.
Capture BAT can capture not only process-level activity on the laboratory
system, but also create a p cap file of the observed network traffic.
For a quick demonstration of Network Miner, I’ll use the p cap file I created
for the network forensics puzzle called Ms. Money many Mysterious Malware.
Network Miner makes it easy to perform advanced Network Traffic Analysis
(NTA) by providing extracted artifacts in an intuitive user interface.
The way data is presented not only makes the analysis simpler, it also saves
valuable time for the analyst or forensic investigator.
Network Miner allows the user to insert arbitrary string or byte-patterns that
shall be searched for with the keyword search functionality.
WIRE SHARK:
NETWORK MINER:
WIRE SHARK:
NETWORK MINER:
WIRE SHARK: