
This lesson requires Loopus Pro access. Upgrade to unlock all courses, labs, and challenges.
Network forensics analyzes network traffic to detect intrusions, reconstruct attacks, and gather evidence. Unlike endpoint forensics, network analysis reveals communication patterns between systems and with external infrastructure.
Full packet capture records complete packet contents. This provides maximum detail but requires significant storage. A 1 Gbps link generates over 10 TB daily.
Flow data captures metadata—source, destination, ports, bytes, packets—without content. NetFlow, IPFIX, and sFlow provide visibility at lower storage cost.
Targeted capture focuses on specific traffic: particular hosts, suspicious protocols, or traffic matching detection rules. Balances detail and storage.
Session data reconstructs application-layer conversations. HTTP requests and responses, DNS queries and answers, extracted files.
Perimeter - Captures external communication. Places capture at network edge, inside the firewall.
Internal segments - Captures lateral movement invisible at the perimeter. Segment-level visibility shows internal communications.
Span ports and taps - Network taps provide passive access to traffic without introducing latency or detection risk. Port mirroring (SPAN) can substitute when taps are unavailable.
tcpdump - Command-line capture for Linux/Unix. Widely available, scriptable.
Wireshark - GUI analyzer and capture tool. Excellent for interactive analysis.
Zeek (Bro) - Produces structured logs from traffic: connection logs, HTTP requests, DNS queries, extracted files. Ideal for detection and hunting.
Arkime (Moloch) - Full packet capture with indexing and search. Enables large-scale capture with efficient retrieval.
Network analysis reveals:
Command and control - Beaconing patterns, unusual destinations, encrypted channels to suspicious infrastructure.
Data exfiltration - Large outbound transfers, DNS tunneling, traffic to file sharing services.
Lateral movement - SMB traffic between workstations, remote execution protocols, authentication patterns.
Malware communication - Characteristic protocols, user agents, and connection patterns.
Extract and analyze indicators: IP addresses, domains, URLs, user agents, file hashes from transfers.
What network forensic tools exist?
What tool captures live traffic?
What evidence exists in packets?
What protocol is used for web traffic?
Found the flag? Submit it below to complete this lesson.
Format: LOOPUS{...}