
Wireshark is more of a traffic capturing and analysis tool than an offensive network security tool, and it can greatly help during network forensic investigations. The filters available in Wireshark make it easy to perform both troubleshooting as well as investigations. On the system, where Wireshark is running, one can choose the interface on which traffic needs to be captured. Wireshark is an open-source tool available for capturing and analyzing traffic with support for applying filters using the graphical user interface. For instance, if we want to identify the rogue access points available within the range, we can use airmon-ng to identify details such as SSID, mac address, the channel it is running on. However, the same tools and techniques can also be used to investigate wireless networks. Aircrack-ng suite of tools are primarily used by security professionals during security assessments. This will help users and developers to script and develop tools by taking advantage of the ability to run these tools from the command line. It focuses on different areas of WiFi security such as monitoring, attacking, testing and cracking.”Īll tools that are part of the aircrack-ng suite can be run from the command line. The properties of both hardware appliances and packet analyzer software are reviewed from the perspective of their potential use in network forensics.According to the official website, “ Aircrack-ng is a complete suite of tools to assess WiFi network security.

Considering that not all network information can be used in court, the types of digital evidence that might be admissible are detailed. This paper is a comprehensive survey of the utilization of packet analysis, including deep packet inspection, in network forensics, and provides a review of AI-powered packet analysis methods with advanced network traffic classification and pattern identification capabilities.

This can be used to find traces of nefarious online behavior, data breaches, unauthorized website access, malware infection, and intrusion attempts, and to reconstruct image files, documents, email attachments, etc. Packet analysis is a primary traceback technique in network forensics, which, providing that the packet details captured are sufficiently detailed, can play back even the entire network traffic for a particular point in time.
