Skip to the content.

🔗 Link to the Room

🏷️ Table of Contents

  1. What is the Purpose of Network Traffic Analysis
  2. What Network Traffic can we observe?
    2.1 Application Layer
    2.2 Transport Layer
    2.3 Internet Layer
    2.4 Link Layer
  3. Network Traffic Sources and Flows
    3.1 Traffic Sources
    3.2 Traffic Flow Types
  4. How can we observe Network Traffic?

📚 Study Notes

 

 

 

What is the Purpose of Network Traffic Analysis

image

image

[!TIP] Always compare activity against a network baseline — abnormal spikes in DNS or HTTP traffic often signal compromise.
DNS TXT records are commonly abused for C2 communication.
If logs raise suspicion, move to packet-level analysis to confirm what’s really happening.

 


❓What is the name of the technique used to smuggle C2 commands via DNS?DNS tunneling

 

What Network Traffic can we observe?

image

 

Application Layer

image

 

[!NOTE] Logs show what was requested — packet captures show what was actually delivered. This is critical when checking for malware downloads or data exfiltration.

 

Transport Layer

 

[!CAUTION] A large, unexpected jump in TCP sequence numbers can signal session injection or hijacking attempts.

 

Internet Layer

 

 

image

 

[!CAUTION] If one MAC address keeps claiming multiple IPs, you may be seeing ARP poisoning in action.

 

Each TCP/IP layer gives us different visibility into network behavior. Logs only provide partial insight, while packet captures reveal the complete picture.

 


❓Look at the HTTP example in the task and answer the following question: What is the size of the ZIP attachment included in the HTTP response? Note down the answer in bytes.10485760

❓Which attack do attackers use to try to evade an IDS?fragmentation

❓What field in the TCP header can we use to detect session hijacking?sequence number

 

Network Traffic Sources and Flows

  1. Where is this traffic coming from? (Source type)
  2. Where is it going? (Flow direction)

 

Traffic Sources

Intermediary Devices (Traffic Pass-Through Devices)

 

Endpoint Devices (Where Data Actually Lives)

 

Traffic Flow Types

 

North–South Traffic (LAN ↔ Internet)

 

East–West Traffic (Internal ↔ Internal)

 

FLOW Example

 

HTTPS with TLS Inspection (Proxy in the middle)

image

 

External DNS Flow

image

[!CAUTION] DNS tunneling, beaconing, or strange domains can indicate malware.

 

SMB + Kerberos (Internal Authentication Flow)

image


❓Which category of devices generates the most traffic in a network?endpoint

❓Before an SMB session can be established, which service needs to be contacted first for authentication?kerberos

❓What does TLS stand for?Transport Layer Security

 

How can we observe Network Traffic?

 

Logs – Your First Layer of Visibility

image

 

Log Forwarding Protocols

[!CAUTION] If something suspicious happens and the logs don’t include the necessary fields, you must correlate multiple log sources, look at full packet capture and analyze flow statistics.

Logs are visibility — but limited visibility.

 

Full Packet Capture (FPC)

Everything.

 

How to Capture Full Packets

image

 

Physical Network TAP

 

Port Mirroring (SPAN)

image

 

TAP vs Mirroring

Feature TAP Port Mirroring
Performance impact near zero can impact performance
Detectable by attacker very difficult possibly
Hardware required yes no
Flexibility physical placement needed software configurable

image

 

Best Practices for Full Packet Capture

1.Placement:

  1. Duration & Storage Requirements:
    • Full packet capture consumes massive storage.
    • Example: Capturing 1 Gbps continuously for 24 hours ≈ 10.8 TB
    • Now imagine: 10 Gbps or 40 Gbps
    • Storage planning is critical.
  2. Network Statistics (Flow Data):
    • This is not full packets — it’s metadata about flows.
    • Instead of capturing every packet, we collect summaries like:
    • Source IP
    • Destination IP
    • Source port
    • Destination port
    • Protocol
    • Byte count
    • Packet count
    • Duration

Tools for Packet Analysis

Network Statistics

NetFlow

IPFIX


❓What is the lag found in the HTTP traffic in scenario 1? The flag has the format THM{}THM{F*************E}

❓What is the flag found in the DNS traffic in scenario 2? The flag has the format THM{}THM{C************d}