Skip to content

Perform artifact driven analysis on network captures.

Notifications You must be signed in to change notification settings

glowbase/net_dfir

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

31 Commits
 
 
 
 
 
 

Repository files navigation

Net DFIR

Perform baselining and analysis on network captures.

Use

./netdfir.sh -r <pcap_file> -e -a
  • -r : Specify the input PCAP file for analysis (required)
  • -e : Export files detected in data streams (optional)
  • -a : Specify an adversary IP address to highlight (optional)

image

Example Output

To help with the process of determining malicious traffic, adversary IP addresses and indiciators of compromise:

  • All public IPs are mapped to their country of origin.
  • Countries that are blacklisted are highlighted in red.
  • Known malicious IP addresses are also highlighted red.

Active Directory

Net DFIR will attempt to pull information about the local Windows AD environment. Information regarding the DC, Windows Hosts and Windows Users will be logged along with associated IP's and MAC addresses. Any outgoing connections will be listed with associated ports and occurences.

IP Addresses

A list of all IP addresses found within the PCAP are collated and listed based on the number of occurences decending. IPs are mapped to originating country and highlighted based on blocklists and known malicious IP lists.

User Agents

A list of user agents found within HTTP traffic are collated and listed based on the number of occurences decending.

Server Hosts

Request URIs

HTTP Objects

SMB Objects

About

Perform artifact driven analysis on network captures.

Resources

Stars

Watchers

Forks

Languages