Skip to content

Latest commit

 

History

History
48 lines (31 loc) · 2.09 KB

README.md

File metadata and controls

48 lines (31 loc) · 2.09 KB

Net DFIR

Perform baselining and analysis on network captures.

Use

sudo ./net_dfir.sh -r <pcap_file> -e
  • -r : Specify the input PCAP file for analysis (required)
  • -e : Export files detected in data streams (optional)

Example Output

To help with the process of determining malicious traffic, adversary IP addresses and indiciators of compromise:

  • All public IPs are mapped to their country of origin.
  • Countries that are blacklisted are highlighted in red.
  • Known malicious IP addresses are also highlighted red.

Active Directory

Net DFIR will attempt to pull information about the local Windows AD environment. Information regarding the DC, Windows Hosts and Windows Users will be logged along with associated IP's and MAC addresses. Any outgoing connections will be listed with associated ports and occurences.

IP Addresses

A list of all IP addresses found within the PCAP are collated and listed based on the number of occurences decending. IPs are mapped to originating country and highlighted based on blocklists and known malicious IP lists.

User Agents

A list of user agents found within HTTP traffic are collated and listed based on the number of occurences decending.

Server Hosts

Request URIs

HTTP Objects

SMB Objects