Basic Network Intrusions Training

An Introduction To Responding to Cyber Intrusions

Posted by Daniel Farid on September 17, 2024 · 5 mins read

This week I has lucky enough to attend the National Center of Computer Forensics in Hoover, AL for a second time. This week long course centered on basic network intrusion techniques and network incident mitigation methods.

Purpose

The Basic Network Intrusions Training course just wrapped up, and it was an eye-opening week-long experience packed with practical insight and hands-on learning. This is a detailed course designed for investigational purposes and supervisory staff and looks into network investigation techniques and incident mitigation. I received my first taste of training at NCFI, with Introduction to Linux Forensics last year, which was both hands-on and technical. This course is a nice introduction to network intrusion investigations with nicely blended lecture and practical excercises with the focus on incident response.

Highlights

One of the highlights was learning how to effectively respond to hacking incidents. The course offered practical exercises on using essential tools that are pivotal in these scenarios. We delved into the command line for efficient navigation and management of network systems, mastering crucial commands like netstat for connection monitoring and tcpdump for packet capture analysis. Wireshark proved invaluable for analyzing network traffic, helping us pinpoint unusual activity and potential breaches through its powerful filtering capabilities and protocol analysis features. We also explored Autopsy for digital forensics, allowing us to piece together evidence from network artifacts and conduct detailed timeline analysis of system events. FTK Imager was another key tool we used, providing comprehensive imaging of drives to ensure data integrity during investigations, particularly important for maintaining proper chain of custody in cybersecurity incidents.

We also utilized a variety of free open source tools for network forensics such as Volatility for memory analysis and malware detection, WinPmem for rapid memory acquisition in Windows environments, Kape for automated evidence collection and triage, Cedarpelta for advanced network traffic analysis, and others! The hands-on experience included creating detailed incident response playbooks, practicing proper evidence handling procedures, and learning to generate comprehensive forensic reports that would stand up to scrutiny in professional environments. We also covered advanced techniques like memory dump analysis, registry forensics, and malware basics. The integration of these tools into a cohesive incident response workflow was particularly helpful, showing how different tools can complement each other during complex investigations.

Take Aways

The blend of instructor-led discussions and hands-on practical exercises made complex topics like network topologies, connectivity, and incident management approachable. I am very happy that I started my preparations to take the Network+ Exam prior to attending this class. The training was delivered in a very easy to understand method but a basic understanding communication protocols is assumed. The group exercise at the end brought everything together, demonstrating how to apply our new knowledge in real-world scenarios. Overall, BNIT was a fantastic course for anyone looking to build a solid foundation in network investigations and response strategies.