When a company gets hacked, network forensics analysts reconstruct exactly what happened by analyzing network traffic.
# Capture live traffic
tcpdump -i eth0 -w evidence.pcap -c 100000
# Collect logs
cp /var/log/syslog /evidence/
cp /var/log/auth.log /evidence/
cp /var/log/apache2/access.log /evidence/# Find suspicious connections
ip.addr == suspected_attacker_ip
# Find data exfiltration
tcp.len > 10000 # Large transfers
# Find DNS tunneling
dns.qry.name contains "suspiciousdomain"
# Find credential theft
http.request.method == "POST"
ftp.request.command == "PASS"Subscribe to ONLY4YOU and get hands-on access to 40+ premium courses — Ethical Hacking, Kali Linux, Metasploit, Network Hacking, Bug Bounty & more!