NW Investigator
NW Investigator
NW Investigator
Version 9.0
October 2009
Subject to the terms and conditions set forth herein and in the License Agreement,
NetWitness Corporation hereby grants to Licensee a nontransferable, nonexclusive,
limited license to use the NetWitness Corporation computer software products, together
with all documentation and other materials accompanying such product(s) (together, the
Software).
NetWitness®NextGen
Investigator User Guide
Table of Contents
Version 9.0
October 2009
Chapter 1
Overview 1
NETWITNESS® Products. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Install NetWitness Investigator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Uninstall Investigator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
License Key Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Chapter 2
Getting Started 7
About the Investigator Main Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Configure Investigator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
NETWITNESS CORPORATION i
R1.3.1009
NetWitness® Investigator User Guide
General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Capture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Audio Codecs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Advanced . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Chapter 3
Investigator Basics 21
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
License Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
About Parsers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Investigator Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
About the Investigator Menus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Collection Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Edit Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
View Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Bookmarks Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
History Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Help Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Collection Navigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Navigation View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Context Menus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Navigation Toolbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Navigate Multiple Views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Content Pane Display Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Session List View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Session List Toolbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Content View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Content Toolbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Chapter 4
Collection Management 37
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Accessing Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
ii NETWITNESS CORPORATION
R1.3.1009
Table of Contents
Collection Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Collection Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Investigator Toolbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
How to … . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Create a New Collection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Configure the New Collection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Import a Data File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Reprocess a Collection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Chapter 5
Data Capture 47
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Custom Parsers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Configure Parsers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Rules Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Network Layer Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Application Layer Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Capture Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Capture Configuration Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Network Adapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Advanced Capture Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Evidence Handling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Real-Time Network Capture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Start/Stop the Live Capture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Chapter 6
Data Analysis 61
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Summary View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Navigation View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Navigation Toolbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Custom Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Context Menus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Navigation Context Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Drills and Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Appendix A
Rules 91
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Packet Data Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Session Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Session Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Rule Order . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Rule Sets and Expressions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Rule Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Supported Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Appendix B
Parsers and Feeds 97
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Parsers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
GeoIP Parser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Search Parser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Language Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Language Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
iv NETWITNESS CORPORATION
R1.3.1009
Table of Contents
Appendix C
Reference List Documents 119
Parsers and Associated Metadata . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Ethernet Protocol Reference List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Internet Protocol Reference List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
TCP Protocol Reference List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
UDP Protocol Reference List. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
Appendix D
SDK Data Types 143
Supported Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Appendix E
Wireless Packet Capture 147
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Capture Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Netmon Capture Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Linux Capture Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
802.11 Parsers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Supported Platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Windows 2000, XP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Windows Vista, Windows 7, Windows Server 2003, Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . 151
Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Wired Equivalent Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
NETWITNESS CORPORATION v
R1.3.1009
NetWitness® Investigator User Guide
vi NETWITNESS CORPORATION
R1.3.1009
About This Guide
This NetWitness® Investigator User Guide provides information about performing the analysis of the
data captured from your network or from other collection sources using INVESTIGATOR. To use
this dynamic tool effectively, basic strategies are presented to illustrate the possible approaches.
There are no absolutes. The user must become familiar with the capabilities of the application in
order to effectively evaluate potential threats to your network.
This guide applies to releases beginning with the version 9.0 series. There will be periodic updates
made to the content.
Anyone using this guide should possess experience as a network engineer, equivalent to at least
that of a journeyman, and also have a strong understanding of network concepts and TCP/IP
communications.
Related Documentation
The following document is also available:
Conventions
bold sans serif For text that appears in windows or dialog boxes (e.g., the Close and OK
buttons, the File menu) and for file names (e.g., c:\control.ini, /etc/hosts) that
appear within the text of paragraphs.
SMALL CAPITALS For keyboard key names, such as ENTER or TAB.
monospaced Used for listing the contents of files and code samples.
font
means you should replace d: and directory with the actual drive and path of
the file in question, when performing the task; for example,
c:\windows\control.ini
Special Symbols
J This arrow is used to show a series of selections (menu options, tabs, links, etc.). For
example:
… select File J New J Folder …
means you should pull down the File menu and select New and then Folder.
The caution symbol indicates that you should carefully read and follow any directions
associated with it to prevent serious errors or data loss.
The note symbol identifies a helpful tip or technique, or additional information about
the current topic.
Phone: 866.601.2602
Fax: 703.651.3126
Contact: http://community.netwitness.com
Preparing to Call
When you contact Customer Care, you should be at your computer and have the appropriate
product documentation at hand. Be prepared to give the following information:
A description of what happened and what you were doing when the problem occurred.
If possible, a screen print demonstrating where the problem or issue occurs. This helps the
Customer Care Engineer with the resolution process.
NETWITNESS CORPORATION ix
R1.3.1009
NetWitness® Investigator User Guide
x NETWITNESS CORPORATION
R1.3.1009
Chapter 1
Overview
NETWITNESS® Products
NETWITNESS provides a group of products to capture all network traffic and use the same data to
solve a broad range of business and security problems.
Administrator—a Graphical User Interface (GUI) that allows you to manage a NetWitness
Service product. Management capabilities include:
Configuration
Decoder—an appliance-based network capture device that fully reassembles and normalizes
traffic at every layer for full session analysis. This enables users to collect, filter, and analyze full
network traffic by an infinite number of dimensions.
Concentrator—a network appliance that consolidates multiple DECODERS to create single
logical views for analysis. This enables users to instantly analyze network and application layer
detail across multiple capture locations, including full content.
Both DECODER and CONCENTRATOR are compatible with the free NETWITNESS®API/SDK applications.
For more information about these applications, contact support@netwitness.com.
Broker—a NetWitness application that brokers and distributes queries across multiple
CONCENTRATORS (concentration points) to provide a single view across an entire network
NETWITNESS CORPORATION 1
R1.3.1009
NetWitness® Investigator User Guide
NwConsole—a command interface accessed through the Windows Command Shell or the
Secure Socket Shell (SSH). In addition to the management capabilities outlined in
Administrator, you can run scripts from the NwConsole.
System Requirements
Hardware
Hardware requirements vary greatly based on the volume and nature of the network being monitored.
The following are the core hardware specifications and configuration for NetWitness DECODER and
CONCENTRATOR products:
Intel Xeon (or AMD equivalent) x86-64 dual-core processor – 2 GHz or higher
16GB RAM
High speed, high capacity RAID storage system with 4 separate physical and logical volumes,
with ample storage for collected data(>4TB)
Software
NetWitness products are offered as software for certain environments. The following are the core
operating system requirements:
Servers
Client Applications—Windows® XP, 2003 Server, or Vista with Internet Explorer v7+
2 NETWITNESS CORPORATION
R1.3.1009
NetWitness® Investigator User Guide
The installation of ADMINISTRATOR must be performed on the Windows platform. The necessary
files are included in the installer package, available from netwitness.com/downloads.
3. The Choose Install Location window opens. Click Install to accept the default Destination Folder
displayed or click Browse to select another folder.
NETWITNESS CORPORATION 3
R1.3.1009
NetWitness® Investigator User Guide
4. When the installation is complete, click Close to close the SETUP WIZARD.
Uninstall Investigator
1. Close all programs.
4. Highlight NetWitness Investigator 9.0 from the list of installed applications, and then click Remove.
3. Re-open the License Key Manager window and click the IMPORT KEYS button. The Open window
appears.
4. Select the .nwk file and then click the OPEN button.
5. Click OK. The valid keys display on the NetWitness License Key Manager window.
a. To view the Product, Status, Generated and Expires for the license key, click the KEY DETAILS
button.
b. To delete a key, select the key that you want to delete and then click the DELETE KEYS button.
6. Click the EXIT button.
7. Incorrect license key entry is a common source of NetWitness operation errors. Therefore,
please verify your key options including product, number of sources, and expiration date. For example,
you cannot use an 8.6 key for a 9.0 product. If you are still having problems, please contact
NetWitness Support at support@NetWitness.com, preferably with a screenshot of the KEY DETAILS
dialog.
4 NETWITNESS CORPORATION
R1.3.1009
NetWitness® Investigator User Guide
NETWITNESS CORPORATION 5
R1.3.1009
NetWitness® Investigator User Guide
6 NETWITNESS CORPORATION
R1.3.1009
Chapter 2
Getting Started
This User Guide illustrates the capabilities of INVESTIGATOR, although your effectiveness depends
upon the types of threats your organization is experiencing. Generally, there are two main
categories that concern an organization:
Anomalous activity–This can be anything from downloads from your network during
off-peak hours to excessive activity with a suspicious source or content.
INVESTIGATOR, through the NetWitness Data Model, enables you to see the content through
filters that you customize to fit your specific objective(s). How you do this necessarily depends on
your understanding of the characteristics of your network. It is beyond the scope of this
document to attempt to illustrate an extensive number of scenarios describing how
INVESTIGATOR should be utilized on any specific network.
INVESTIGATOR can enable an historical investigation into events leading up to a network alarm or
incident.
If you know that a certain type of activity is taking place on your network, you can select only the
reports of interest to examine the content of data collections.
Once you become familiar with data navigation methods, you can explore the data more
completely through:
Drilling into reports and report values
The initial task of configuring INVESTIGATOR is described in the remainder of this chapter. As
you work with the application, you may decide to change certain settings to optimize
performance.
NETWITNESS CORPORATION 7
R1.3.1009
NetWitness® Investigator User Guide
Toolbar - Provides
shortcut buttons for
common functions.
Capture Control
Start/Stop button
Connecting
Unable to Connect
Ready
Processing
Exporting
Importing
Error
8 NETWITNESS CORPORATION
R1.3.1009
Chapter 2 Getting Started
Configure Investigator
You access the configuration options from the Edit menu on the INVESTIGATOR main window.
Settings that are not listed in these options may be viewed or changed in the Application Data
File
The complete configuration settings for INVESTIGATOR are available in the Application Data File on your system
after installation. For a detailed description of these settings, see Investigator Configuration Settings on page 131.
NETWITNESS CORPORATION 9
R1.3.1009
NetWitness® Investigator User Guide
General
This section allows you to determine where all collections are stored, thumbnail size, and warning
prompt settings.
Default Collection Path–This is the default directory path where all collections are stored on the
system. The default path is My Documents\NetwWitness\Collections.
Automatically Check for Updates–When checked, INVESTIGATOR automatically checks for new
updates and prompts the service to download them.
Show Descriptive Tooltips–When checked, tooltip descriptions display as you roll over icons or
regions of the INVESTIGATOR pane(s).
Restore Default Settings–This button restores all settings to their default values.
10 NETWITNESS CORPORATION
R1.3.1009
Chapter 2 Getting Started
Display
This section allows you to specify the way INVESTIGATOR appears and options for Session and
Content View.
Theme
A theme is a set of elements, such as color scheme, that allows the user to personalize the
appearance of INVESTIGATOR.
Choosing any of the 2007 themes allows the use of docking guides, as described in Navigate
Multiple Views on page 32.
Limit Thumbnail Size–When Automatic Thumbnail Generation is checked, the user can specify a
size limit for thumbnail generation for any session content above the limit.
Do Not Embed Application Types–When checked, application, audio, and video content types are
not embedded into the NetWitness content display page.
NETWITNESS CORPORATION 11
R1.3.1009
NetWitness® Investigator User Guide
Enable CSS Reconstruction–When checked, the application attempts to find and load the
website’s CSS files from other sessions. If you are having problems viewing specific
websites, try checking this option.
Disable Native Content Views–When checked, the user is prevented from viewing content in
Web, MAIL, IM, and VOIP formats. This option is not normally used.
RSA Keys Folder–When the Decrypt SSL Sessions is checked, the user can specify the
location to specify RSA keys.
Reports
The user specifies the reports that are compiled when data is processed. For example, if the user
only enables the Service, Time, and Address reports, any Collection processed with those settings,
only those three reports are listed in the view. The Reports Toolbar allows the user to group or
re-arrange reports for ease of use.
Reports Toolbar
Reports Toolbar
12 NETWITNESS CORPORATION
R1.3.1009
Chapter 2 Getting Started
Capture
In this section, you specify the capture configuration options for INVESTIGATOR.
Network Adapter
Select the appropriate adapter for your network. If you are using a wireless capture device, see
Wireless Packet Capture on page 147.
The default network adapters available are set at installation. Consult your System Administrator for more
information.
Buffer Size(MB)–Specify the size in MB that is used to cache packets on the network
Evidence Handling
Hash Captures–External files that can be used to validate that the original capture files are
intact.
NETWITNESS CORPORATION 13
R1.3.1009
NetWitness® Investigator User Guide
14 NETWITNESS CORPORATION
R1.3.1009
Chapter 2 Getting Started
Process
There are three processes configured on this tab. Use the scroll bar to move through the dialog
box.
Application Parsers
Use the Select All icon or the Clear All icon to make your selections.
NETWITNESS CORPORATION 15
R1.3.1009
NetWitness® Investigator User Guide
Assembler Properties
SETTING DESCRIPTIONS
Maximum Session Size Assembler maximum session size in bytes. This is the maximum amount of
data a single session can retain. If the size exceeds this value, the data is
truncated to the maximum size.
NOTE: Reducing the amount of memory can improve performance; however,
sessions above this byte limit will be truncated.
Packet Partial Allows for truncated packets and ignores checksum. Enabling partial
packets will allow assembly of truncated packets and also not perform ip
and tcp cheksumming.
Memory
SETTING DESCRIPTION
Session Pool Total sessions to keep in preallocation pool. This is a performance setting
which allocates the number of sessions on NetWitness start.
Meta Pool Total meta objects to keep in the pre-allocation pool. This performance
setting allocates the number of meta objects at NetWitness start.
Packet Pool Total packets to keep in preallocation pool. This is a performance setting
which allocates the number of packets on NetWitness start.
Using a larger packet pool can increase performance.
16 NETWITNESS CORPORATION
R1.3.1009
Chapter 2 Getting Started
Audio Codecs
NetWitness loads the standard Microsoft Operating System codecs; however, the user can modify
existing codecs. Codecs can be bound to the channels for replay; however, the required codecs
must be installed locally to be available for channel assignment.
Format–Select the format you want associated with the codes from the dropdown list.
Attributes–Select the attributes you want associated with the codes from the dropdown
list.
Delete–When you click the Delete button, the actual audio codec is not deleted. Its content is
merely cleared.
Reset–When you click the Reset button and click Yes to confirm, all the standard Microsoft
Operating System codecs are reinstated.
NETWITNESS CORPORATION 17
R1.3.1009
NetWitness® Investigator User Guide
Advanced
This section allows you to set options for Indexing, Threads, and Log Messages.
Threads
Thread Priority–The user can control the thread priority of the overall user interface.
Below Normal –This setting gives priority to the data capture thread during a sustained
capture.
Render Threads–The number of CPU threads allocated for rendering data, as users perform
other analysis operations simultaneously.
18 NETWITNESS CORPORATION
R1.3.1009
Chapter 2 Getting Started
Query Options
Session Threshold–Allowsthe user to control the responsiveness of the application when
scanning meta values to determine session counts. Any meta value with a count that is
above the set threshold will stop its determination of the true session count once the
threshold is reached. The Navigation View shows that the threshold was reached and the
percentage of query time used to reach the threshold.
NETWITNESS CORPORATION 19
R1.3.1009
NetWitness® Investigator User Guide
20 NETWITNESS CORPORATION
R1.3.1009
Chapter 3
Investigator Basics
Overview
NetWitness is a security intelligence product that audits and monitors all traffic on a network. It
creates a comprehensive log of all network activities and interprets the activities into a format that
network engineers and non-engineers alike can quickly understand.
NetWitness INVESTIGATOR is the application you use to analyze the data captured from your
network in order to identify possible internal or external threats to your security and IP
infrastructure. You can import data from other collection sources or, if you have the Field
Edition, perform live data capture (see License Options on page 22).
You can capture directly from a local network interface or download a collection from a localhost
or a remote service (such as a DECODER or CONCENTRATOR). Username/password are required
to authenticate to the NetWitness Framework. Connection can be encrypted with SSL.
Application and Network rules are created for live capture collections as well as for imported
collections. Users can customize these rules or disable them as needed (see Rules Overview on
page 49).
NETWITNESS CORPORATION 21
R1.3.1009
NetWitness® Investigator User Guide
The user can keep several windows open, arrange them on the screen to facilitate comparison, or
create tabs to view the content as the analysis progresses.
Investigator Concepts (see page 24)
License Options
NetWitness INVESTIGATOR has extensive licensing options. Some features in this User Guide
may not be available to you. Please contact your account manager for more details.
22 NETWITNESS CORPORATION
R1.3.1009
Chapter 3 Investigator Basics
About Parsers
A parser is a program, usually part of a compiler, that receives input in the form of sequential
source program instructions, interactive online commands, markup tags, or some other defined
interface and breaks them up into parts (for example, the nouns (objects), verbs (methods), and
their attributes or options) that can then be managed by other programming (for example, other
components in a compiler). A parser may also check to see that all input has been provided that is
necessary.
The metadata contains important information such as network and application events. All
enabled parsers examine sessions and produce metadata. For example, in an FTP session, the
FTP parser will produce metadata such as login name, password, and file operations including get,
put, or delete. For a detailed list of the 45 parsers used by NetWitness, see Parsers and Associated
Metadata on page 120.
The custom-defined Search parser and the FLEXPARSE™ program can be configured by the user,
extending your analysis capabilities considerably (see page 57).
NETWITNESS CORPORATION 23
R1.3.1009
NetWitness® Investigator User Guide
Investigator Concepts
Some of the concepts that pertain to using INVESTIGATOR are briefly described in the following
table.
CONCEPT DESCRIPTION
Parser A program, usually part of a compiler, that receives input in the form of
sequential source program instructions, interactive online commands,
markup tags, or some other defined interface and breaks them up into
parts (for example, the nouns (objects), verbs (methods), and their
attributes or options) that can then be managed by other programming
Drill The action of clicking on a link to the next level of detail. A drill point refers
to focusing the analytic view on a specific subset of a collection defined by
a particular metadata element (See About Parsers on page 23).
For example, to focus analysis on sessions related to a specific IP
address, the user can drill into that IP address to refocus the analytic
view to only those sessions related to the selected IP address. Drilling
will create a breadcrumb trail in the Navigation view that shows the user
the path traversed to the current drill point.
Collection Summary A scalable high-level view of the characteristics (session count, session
size, packet count) of a selected collection for a specific timeline.
Navigation View The central mechanism for drilling into the extracted metadata.
Search View The mechanism for locating individual sessions with specified string values
or regular expressions.
Breadcrumb Breadcrumbs are a way to maintain a path from the root of the collection to
the current drill point. The user can click on any element within the
breadcrumb to jump back to that point in the drill path. For example, if the
user has drilled into service HTTP:size medium:protocol TCP:time 11 AM,
clicking on size medium will jump the navigation window back to that drill
point.
View The relative position you are using to look at the captured data, in
descending order:
Summary
Collection
Report
Session
Search
Content
24 NETWITNESS CORPORATION
R1.3.1009
Chapter 3 Investigator Basics
CONCEPT DESCRIPTION
Sessions A group of related data packets. These packets are grouped into sessions
based on the transactional nature of the communication, as in the
client/service request and response.
Content The actual information or object represented in the data capture. The
content of a session consists of every packet captured for that session.
Session content can be viewed by its content type (web, e-mail, IM, text,
etc.).
Metadata Specific data types (Service Type, Action Event, Source IP Address, etc.)
used by the parsers to count and itemize in the captured data. A detailed
list of metadata for each parser may be found in the NetWitness System
Administrator Guide.
Index Indexes are internal NetWitness data structures that organize the metadata
elements of sessions and are generated during data processing for a
collection. The content of the index, and consequently the metadata
elements that are displayed in the Navigation view, are controlled by
settings in effect during collection processing. Rebuilding a collection will
regenerate the index.
NETWITNESS CORPORATION 25
R1.3.1009
NetWitness® Investigator User Guide
Each menu contains commands that perform specific functions inherent in INVESTIGATOR
procedures. While the menus are available on all screens in INVESTIGATOR, some of the menu
options are dependent upon the level where you are working. An option must appear highlighted
for it to be available. If it is gray or dimmed, the option is not available.
You should also be aware of the right-click option menus. There may be options available that are not
represented by an icon on the toolbar for a particular view. These are explained in the chapter on Data Analysis on
page 61.
Each menu lists commands that can be executed by clicking on the command or by using a
shortcut key. An underlined character in a command, when pressed simultaneously with the CTRL
key, serves as a shortcut key for that command. Some commands have an additional shortcut key
or keystroke combination that is listed alongside the command.Some commands carry out an
action immediately while others open a dialog box allowing you to select options. A description of
each menu and its options follows.
Collection Menu
Import Packets CTRL + I Import packet files into the selected collection.
Export Collection [NONE] Export packet files to a saved format (.pcap, .payload, .xml, .csv, .txt).
Reprocess Collection [NONE] Allows the user to export the selected collection to a new collection,
thereby reprocessing into a new collection and applying the active rules.
Delete Content Cache CTRL + DEL Clears the content cache for the selected collection.
26 NETWITNESS CORPORATION
R1.3.1009
Chapter 3 Investigator Basics
Edit Menu
Cut CTRL + X Removes the value from the field (or highlighted text)
and places it on the Windows Clipboard.
Copy CTRL + C Copies the value from the field (or highlighted text) and
places it in the Windows Clipboard.
Select All CTRL + A Selects all the values or items based on where the cursor
is placed.
Rules CTRL + U Opens the Rules Configuration (see page 37) dialog
box:
Net Rules
App Rules
View Menu
Session [NONE] Allows the user to view a specific session in the active
collection by entering the session ID.
NETWITNESS CORPORATION 27
R1.3.1009
NetWitness® Investigator User Guide
URL Bar If checked, the time range, collection view, and search
3 fields are displayed.
Bookmarks Menu
History Menu
The History Menu displays and allows an immediate jump to any of the last 10 drill points created by
the user.
28 NETWITNESS CORPORATION
R1.3.1009
Chapter 3 Investigator Basics
Help Menu
Check for Update Advises if there is a more current Version of INVESTIGATOR available.
License Manager Displays your computer ID and the Product Keys for each NetWitness
application. The status of the Product Keys and the date generated is
provided, as well as any applicable expiration date.
Show Log This text file is analogous to the log files created by the DECODER and
CONCENTRATOR. It provides a record of all INVESTIGATOR actions and also
records system warnings and failures.
About INVESTIGATOR Displays the version of the INVESTIGATOR software installed on your system
Collection Navigation
As you explore the data in a collection, it is important that you understand the features in
INVESTIGATOR so that you know where you are in the collection. Because there are multiple data
items that you can drill into at any point along the way, it would be easy to direct yourself away
from an item of interest and proceed down a less productive path.
NETWITNESS CORPORATION 29
R1.3.1009
NetWitness® Investigator User Guide
Navigation View
On the main Collection screen, double-click the desired collection (Sample Data) to open a new tab
for the Navigation process.
Navigation
Toolbar
Report
Values
Session
Counts
Report
Icons
The tab for the selected collection shows a listing of the processed reports (e.g. IP Protocol, Service
Type, Action Event, etc.). Each
of the report types (see page 120) lists report values and their
associated session counts.
30 NETWITNESS CORPORATION
R1.3.1009
Chapter 3 Investigator Basics
Context Menus
In each of the views, the user can access other options by right-clicking in the window.
OPTION DESCRIPTION
Select All Selects all items in the pane.
Sort By Totals|Values
Ascending|Descending
Force Database Scan Overrides the session threshold limit for full scan of data.
Navigation Toolbar
The appearance of the collection reports and the data contained are determined by the
combination of selections you make on the Navigation toolbar. For example, the Time Graph
allows you to expand a section of time for closer examination. For a detailed explanation, see
Navigation Toolbar on page 64.
NETWITNESS CORPORATION 31
R1.3.1009
NetWitness® Investigator User Guide
The user can now perform either of the following two functions:
FUNCTION DESCRIPTION
Drill into a Report Value This will refocus the current view into a Navigation View with that particular
report value as a filter.
Drill into a Session List This will display a list of all the sessions for a specified drill point and their
associated metadata. Session content may be viewed from this list.
Navigation Bar
Content
Tool Bar
Session List
Pane
Content
Pane
32 NETWITNESS CORPORATION
R1.3.1009
Chapter 3 Investigator Basics
If you want change the position or orientation of the Session List pane or the Content pane,
grab the edge of the pane and drag it out of position. Docking guides show possible
positioning for the pane. The transparent blue area indicates the new position for the
content. Releasing the cursor docks the Content pane in the new position.
The Docking Guides are only available if you are using one of the 2007 themes (Edit J Options).
One possible re-arrangement of the panes is shown here. You can determine which arrangement
works best for yourself.
NETWITNESS CORPORATION 33
R1.3.1009
NetWitness® Investigator User Guide
NOTE: The Floating option is useful if you are using dual monitors.
AutoHide hides the current Content pane and creates a tab to restore the
content view.
34 NETWITNESS CORPORATION
R1.3.1009
Chapter 3 Investigator Basics
Session List
Toolbar
Thumbnail
image
Timestamp
Service Type
File Size
Events
Thumbnail image– A small image of the content for that session. If you click on the image, the
Content pane opens.
For example, if a user has clicked on a session count of 212 to the right of a particular Address
report value from the Navigation view, the resulting 212 sessions will be listed on the Session List
view.
NETWITNESS CORPORATION 35
R1.3.1009
NetWitness® Investigator User Guide
Content View
To view the content in a particular session, you click on the Thumbnail image. A separate pane
displays the content detail for that session. You can select any one of the following formats, such
as View Web , from the Content Toolbar.
View Web
You can continue to explore the data through drilling into specific items, search the session for a
particular term, string, or other values.
For more details about viewing content through INVESTIGATOR, see Content View on page 81.
Content Toolbar
When you view content, INVESTIGATOR selects the probable best format, based on the
collection’s type of service. Once you open the Content view, you are able to change from the
default Auto to any of the other options. For more information, see Content Toolbar on page 81
36 NETWITNESS CORPORATION
R1.3.1009
Chapter 4
Collection Management
Overview
Collections are logically-related sets of packet data. This packet data is processed by NetWitness®
INVESTIGATOR into the NetWitness Data Model. Once processed it is available for analysis.
INVESTIGATOR has very flexible configuration options to reduce the amount of time required to
process the data analysis. This chapter describes how to configure your data collection to find a
specific kind of activity.
Collections are created and populated with data through import from another source or live
network capture before analysis with INVESTIGATOR may occur.
Accessing Data
INVESTIGATOR enables you to analyze data from two sources:
A remote device, such as a DECODER or CONCENTRATOR
A Local collection, either a live capture or packet imports (size is defined by the NetWitness
License Agreement (see License Options on page 22)
Collection Configuration
Before actually capturing data for analysis, you must set the options for the collection that govern
the behavior of data processing and the user interface.
There are two levels of configuration that are required with INVESTIGATOR.
Application Level -
Settings for new collections, such as where collections are stored,
thumbnail size, index settings and content view, and warning prompt settings. Changes at
this level do not affect existing saved collections. (see page 9)
NETWITNESS CORPORATION 37
R1.3.1009
NetWitness® Investigator User Guide
Collection Level
When you create a new collection, the configuration dialog box displays.
Enter a unique name for the new collection in the New Local Collection dialog box.
NOTE: Collection names may not contain the following characters: / \ * ? : " < > |
Specify a location for the new collection if you want it saved other than the displayed folder
by checking the Override Default Location checkbox.
Check the Lock Collection checkbox if you want to prevent the collection from being deleted
or used for future capture/import.
Check the Auto Connect checkbox if you want the collection to open each time you open
INVESTIGATOR.
38 NETWITNESS CORPORATION
R1.3.1009
Chapter 4 Collection Management
Investigator Toolbar
The INVESTIGATOR toolbar contains shortcut buttons that are used frequently to work with
collections. Some of these operations can be accessed with keyboard shortcuts. There are other
actions available from the Collection menu (see Collection Menu on page 26).
CTRL + S Creates the sample Data Summary for the selected collection.
How To...
Create a new collection in INVESTIGATOR (see page 40)
NETWITNESS CORPORATION 39
R1.3.1009
NetWitness® Investigator User Guide
These steps are included as part of the Welcome Page under Frequently Asked Questions.
a. Enter a unique name for the new collection in the New Local Collection dialog box.
NOTE: Collection names may not contain the following characters: / \ * ? : " < > |
b. Specify a location for the new collection if you want it saved other than the
displayed folder by checking the Override Default Location checkbox.
c. Check the Lock Collection checkbox if you want to prevent the collection from
being deleted or used for future capture/import.
d. Check the Auto Connect checkbox if you want the collection to open each time
you open INVESTIGATOR.
40 NETWITNESS CORPORATION
R1.3.1009
Chapter 4 Collection Management
2. Click OK. The named collection is added to the list on the Collections tab.
Double-click the collection to connect to the database. When the Status shows Ready,
continue to the Capture Control box.
The INVESTIGATOR Welcome Page provides a group of Frequently Asked Questions (FAQs).
Capture Toolbar
Start/Stop button
Target Collection
3. Select the target collection from the dropdown box. Proceed to configure the collection.
Importing an existing data file (see Input File Types List on page 45)
The file is processed based on the current INVESTIGATOR configuration settings (see
Configure Investigator on page 9).
NETWITNESS CORPORATION 41
R1.3.1009
NetWitness® Investigator User Guide
3. Navigate to the folder where the capture files are saved. Select the file to import and click
OK.
If you are importing multiple files, you can select the check box to enable you to track the
file names.
If you import a collection under a different name, you can apply a different set of Network and Application layer
rules (see Rules Overview on page 49) to obtain a different view of the same data.
Reprocess a Collection
When you capture data with INVESTIGATOR, the Network layer and Application layer rules that
you define are applied to the data. You might decide that it would be beneficial to use a different
set of rules. The rules on INVESTIGATOR apply to all collections. In order to reprocess an existing
collection, you must delete the existing rules and replace them with the new set of rules.
1. Export your rules to a file (.nwr) and then delete the existing files for the Network layer and
Application layer rules.
Any rules you do not delete will be applied with the new rules to the collection when it is reprocessed.
42 NETWITNESS CORPORATION
R1.3.1009
Chapter 4 Collection Management
2. On the Collections Pane, highlight the collection that you want to reprocess.
4. Click YES to confirm that you want to proceed with reprocessing the selected collection. If
you click NO, the procedure terminates.
NETWITNESS CORPORATION 43
R1.3.1009
NetWitness® Investigator User Guide
5. Enter a unique name for the reprocessed collection and click OK.
6. As the data is exported from the original collection and imported into the new collection,
the progress is shown in the Collection Pane.
Original collection
to be
reprocessed
44 NETWITNESS CORPORATION
R1.3.1009
Chapter 4 Collection Management
NetWitness INVESTIGATOR can read as file-based input any of the file types listed in the table
below. Packets provided in TCPDump format are preferred since this is the industry standard for
packet data. If data is in a format not listed here, a conversion utility, editcap, can perform format
conversions either the open-source Ethereal or Wireshark.
NetWitness Data files (.nwd) are a proprietary file type that can be created when exporting data from one
NetWitness Collection to another.
NETWITNESS CORPORATION 45
R1.3.1009
NetWitness® Investigator User Guide
46 NETWITNESS CORPORATION
R1.3.1009
Chapter 5
Data Capture
Overview
This chapter explains the steps necessary to prepare INVESTIGATOR for live data capture, as well
as the way captured data is processed. The two areas that affect how the data will be processed
are:
NETWITNESS CORPORATION 47
R1.3.1009
NetWitness® Investigator User Guide
Custom Parsers
NetWitness INVESTIGATOR users can create custom parsers to unique specifications using any
one of several special parsers.
FLEXPARSE™–This parser format that allows the user to define a parser for a new
application protocol.
For more information about these parsers, see Parsers and Feeds on page 97.
Configure Parsers
In INVESTIGATOR, to configure the parsers:
PATH: Edit J Options J Process
Parsers
Metadata
To customize the parsers for use in a particular collection, you can begin with all parsers selected
or clear the entire list of parsers and manually enable the parser(s) and which associated metadata
you wish to use. For the first method:
1. Click on the Select All Parsers icon to select all parsers and associated metadata enabled.
2. Scroll through the list to disable any of the parsers or the associated metadata in the list.
Click OK.
48 NETWITNESS CORPORATION
R1.3.1009
Chapter 5 Data Capture
1. Click on the Clear All Parsers icon to disable all the parsers and associated metadata.
2. Scroll through the list to select the parsers and the associated metadata to enable.
Click OK.
When you define a new parser, it does not appear in this list of parsers until the next time you open INVESTIGATOR.
Rules Overview
Rules can be defined as filters created for specific metadata, that when matches are found, can
result in predefined behavior(s), known as actions. For example, if the user wanted to keep all
traffic that fit certain criteria, but filter all others, they might create a rule with the necessary
actions in order to fulfill this requirement. When applied, rules will affect both packet capture file
importing, as well as live network capture.
To filter out certain types of traffic that does not add value to the analysis of the data.
To alert, and thereby create a custom alert meta value, when certain conditions are found
while INVESTIGATOR is processing and reconstructing packets into sessions.
By default, there are no rules defined when you first install INVESTIGATOR. Unless there are rules
specified, the packet(s) will not be filtered.
To configure the Network Layer and Application Layer rules, from the INVESTIGATOR menu bar:
PATH: Edit J Rules
You configure the software rules for live network capture, as well as processing packet data
previously collected. There is a tab for each type of rules:
Network Layer Rules (see page 49)
Network Rules are applied prior to session reconstruction and Application Rules are applied after session
reconstruction. For additional information about creating rules, see Rules on page 91.
NETWITNESS CORPORATION 49
R1.3.1009
NetWitness® Investigator User Guide
1. From the INVESTIGATOR Edit menu, select the Rules option. The Rules Configuration dialog
displays.
3. Click the New Rule Type icon to specify whether the rule applies to:
a. Network Capture
or
b. File Import
The same rules can be applied for both live Network Capture or File Import.
4. In the Add Rule dialog, enter a descriptive name in the Rule Name field.
5. Complete the Definition field by entering directly in the field or by double clicking a meta
from the Intellisense window. As you build your rule definition, Intellisense displays syntax
errors and warnings.
If the Stop Rule Processing option is checked, network rule evaluation ends if the rule is matched.
50 NETWITNESS CORPORATION
R1.3.1009
Chapter 5 Data Capture
Intellisense lets you know that the rule you created is valid. For more information about capture rules,
refer to Rules on page 91.
PACKET DATA
Truncate The packet payload is not saved when it matches the rule.
SESSION OPTIONS
Assemble The assembler assembles the packet chain when it matches the rule.
Network Meta The packet generates network metadata when it matches the rule.
Application Meta The packet generates application metadata when it matches the rule.
Alert The packet generates a custom metadata when metadata matches the rule.
NETWITNESS CORPORATION 51
R1.3.1009
NetWitness® Investigator User Guide
b. Edit – Click the icon to change the parameters of the existing rule.
c. Enable– Click the icon to make the selected rule active.
d. Disable– Click the icon to make the selected rule inactive.
f. Promote – Click the icon to move the selected rule up in execution priority.
g. Demote – Click the icon to move the selected rule down in execution priority.
52 NETWITNESS CORPORATION
R1.3.1009
Chapter 5 Data Capture
h. Import – Click the icon to load rules from a file and append to the rules list.
When you attempt to import a group of rules, INVESTIGATOR checks the type of rules imported. If you are
successful, a message displays the number of rules imported. If the rule type differs from the active tab type, you
must re-import the group under the correct tab or select another file to import.
1. From the INVESTIGATOR Edit menu, select the Rules option. The Rules Configuration dialog
displays.
2. The Net Rules tab is selected by default. Select the App Rules tab.
3. Click the Add a New Rule icon. You must designate the rule type.
b. Edit – Click the icon to change the parameters of the existing rule.
c. Enable– Click the icon to make the selected rule active.
d. Disable– Click the icon to make the selected rule inactive.
NETWITNESS CORPORATION 53
R1.3.1009
NetWitness® Investigator User Guide
f. Promote – Click the icon to move the selected rule up in execution priority.
g. Demote – Click the icon to move the selected rule down in execution priority.
h. Import – Click the icon to load rules from a file and append to the rules list.
When you attempt to import a group of rules, INVESTIGATOR checks the type of rules imported. If you are
successful, a message displays the number of rules imported. If the rule type differs from the active tab type, you
must re-import the group under the correct tab or select another file to import.
4. In the Add Rule window, enter a descriptive name in the Rule Name field.
5. Complete the Definition field by entering directly in the field or by double clicking a meta
from the Intellisense window. As you build your rule definition, Intellisense displays syntax
errors and warnings.
Intellisense lets you know that the rule you created is valid. For more information about capture rules, refer to
Rules on page 91.
6. In the Session Data area, specify the action for the new rule.
7. In the Session Data area, indicate whether you want an Alert to be created and verify that the
new rule is valid.
54 NETWITNESS CORPORATION
R1.3.1009
Chapter 5 Data Capture
SESSION DATA
Truncate The packet payload is not saved when it matches the rule.
Stop Rule Processing If checked, further rule evaluation ends if the rule is matched. The session is
saved as indicated.
SESSION OPTIONS
Alert The packet generates a custom metadata when metadata matches the rule.
NETWITNESS CORPORATION 55
R1.3.1009
NetWitness® Investigator User Guide
b. Edit – Click the icon to change the parameters of the existing rule.
d. Demote – Click the icon to move the selected rule down in execution priority.
e. Promote – Click the icon to move the selected rule up in execution priority.
f. Import – Click the icon to load rules from a file and append to the rules list.
56 NETWITNESS CORPORATION
R1.3.1009
Chapter 5 Data Capture
When you attempt to import a group of rules, INVESTIGATOR checks the type of rules imported. If you are
successful, a message displays the number of rules imported. If the rule type differs from the active tab type, you
must re-import the group under the correct tab or select another file to import.
Capture Configuration
1. From the INVESTIGATOR Edit menu, select Options. The Options dialog displays. The default
focus is on the General tab.
The default network adapters available are set at installation. Consult your System Administrator for more
information
Max Disk Usage–The percentage of drive space allowed to be used by the system.
If this value is 100, the drive is allowed to fill up completely.
Buffer Size(MB)–Specify the size in MB that is used to cache packets on the network card.
Evidence Handling– Specify whether Hash Captures are to be saved and their file location.
NETWITNESS CORPORATION 57
R1.3.1009
NetWitness® Investigator User Guide
Network Adapter
Verify that the appropriate setting is being used.
Buffer–Theuser designates the percentage (1% - 100%) of the drive that is reserved as a
temporary storage area.
Evidence Handling
This setting allows the user to designate whether the system hashes the output .pcap files as they
are written to the hard drive. The user can also designate where the hash value file will be written.
There will be a hash file written for every .pcap file written.
To protect the integrity of the hash values written during live capture, the user should consider designating an
external drive for the hash value files.
58 NETWITNESS CORPORATION
R1.3.1009
Chapter 5 Data Capture
This feature may or may not be supported under your organization’s license agreement with NetWitness. Please
contact your account manager for more information.
When NetWitness INVESTIGATOR Collection window opens, the live traffic capture configuration
options and controls are located on the Capture Toolbar in the lower panel.
Capture Toolbar
Start/Stop button
Select Collection Adapter Configuration Line Rate Indicator Packets Captured Counter
2. Verify that the Network Layer and Application Layer Rules are correctly defined. (Rules Overview
on page 49)
NETWITNESS CORPORATION 59
R1.3.1009
NetWitness® Investigator User Guide
3. On the Capture toolbar, click the Start button. The Line Rate counter and the Packets
Captured counter begin increasing as the device actively captures traffic. In addition, the Start
button will blink red to indicate that live capture is in process.
4. To stop the live capture, click the Start/Stop button again and it will stop blinking red when
the capture process terminates.
StealthMode is a configuration that keeps the point of collection logically invisible to hackers or other targets.
NetWitness INVESTIGATOR can collect data in stealth mode on Windows XP and Windows 2003. Stealth mode is
only applicable to Ethernet networks; it is not applicable to Token Ring or FDDI networks.
From the Start menu, select Control Panel.
Open Network Connections.
Position the cursor over a network connection and then right-click the mouse button. In the Options menu,
select the Properties option.
In the This connection uses the following items panel, clear all check boxes. Click OK.
in NetWitness INVESTIGATOR, select the network adapter that you want use to collect data on the Capture
Configuration dialog.
60 NETWITNESS CORPORATION
R1.3.1009
Chapter 6
Data Analysis
Introduction
Data analysis is the process of looking systematically into processed network data for specific
patterns of activity or content that may indicate a threat to the network or to highlight network
sessions of interest.
This chapter describes the two primary methods for analyzing network data processed by
NetWitness. You must become familiar with both methods so that you develop the critical ability
to choose the most effective way to look at the data from your network. Every situation is
somewhat unique in terms of the types of information you are attempting to find. The two
methods to examine the data in a collection are:
Navigation – the central mechanism for drilling into the extracted metadata (see page 63)
Search – the mechanism to locate sessions with specified string values or regular expressions
(see page 81)
INVESTIGATOR presents the content of the captured packet as a Collection. The defined target
metadata are shown as Reports and the number of Sessions is represented as a numerical value.
When you click on one of these values at any given level, you are presented with a view of the
results on the next level.
Views
You can move between the views of data in INVESTIGATOR. They are presented in the order of
specificity. Your familiarity and use of Bookmarks and History as well as the Drill Path makes
navigation among the levels easier. The available views are:
Summary(see page 62)
Navigation (see page 63)
NETWITNESS CORPORATION 61
R1.3.1009
NetWitness® Investigator User Guide
Summary View
This is the highest level that you can look at the characteristics of a selected collection. There are
three snapshots displayed over the timeline.
Session Count
Session Size
Packet Count
1. Highlight a Collection in the INVESTIGATOR Collection Pane.
3. When the Status displays Ready, click on the Collection Summary icon.
In each of the snapshot views, you can zoom into a selected portion of the timeline. You can use
the Navigate icon to open a new tab to navigate to a selected slice of the timeline. You can
return to the previously selected time range by using the Zoom Out icon.
62 NETWITNESS CORPORATION
R1.3.1009
Chapter 6 Data Analysis
Navigation View
To begin data analysis, highlight the desired Collection in the INVESTIGATOR Main window. The
steps you utilize are simply moving from the general to the specific by selecting a more specific
value to add to the drill path. There are many variations in the way you display the data. The basic
pattern is the following:
2. Select a Report.
5. Search for specific content to determine whether it meets your threat criteria.
6. Repeat the process for the next potential threat type in your network.
There may be circumstances that cause you to alter the order or deviate from this basic pattern. Your general
knowledge about network traffic and that of your organization determines the perception of anomalous activity and
how you use INVESTIGATOR to look more closely.
The listing displays the processed reports (e.g. Address, E-mail Address, File, etc.). Each of the report
types lists the report values and the associated session counts. Generally, it is useful to narrow the
scope of your drill in order to reveal the amount and type of activity you are searching.
NETWITNESS CORPORATION 63
R1.3.1009
NetWitness® Investigator User Guide
In this illustration, the reports are ordered to display Destination Country first, so a concern is
evident for suspicious traffic with foreign countries. For more information on configuring the
report display in collections, see Reports on page 12.
Drill Path
Collection Tab
Navigation
Toolbar
Report Icon
Report Type
Value
Sessions
Scroll down to
view additional
reports
Drill Path–Shows the items you have selected as part of your analysis (This allows a quick
method for stepping back to an earlier view of the data.)
Collection Tab–Shows the active collection in this view
Navigation Toolbar–Controls the appearance of the reports and the data (see page 64)
Report Icon–Symbol for the report with a context menu for results display (see page 71)
Report Type–The items selected in the Collection configuration (metadata fields)
Value–The instances in the collection that match the Report Type (20 are displayed by default)
Sessions–The number of instances identified in the network data containing the specific
metadata
Navigation Toolbar
The appearance of the collection reports and the data contained are determined by the
combination of selections you make on the Navigation toolbar.
64 NETWITNESS CORPORATION
R1.3.1009
Chapter 6 Data Analysis
When you first install INVESTIGATOR, the default settings are highlighted:
As each icon is selected, the resulting view is displayed in the following table:
Sort Data
NETWITNESS CORPORATION 65
R1.3.1009
NetWitness® Investigator User Guide
NOTE: When you sort the values by the number of session counts, the default descending setting is still operant.
NOTE: When you sort the data by alphanumeric order, the default descending setting is still operant.
Arrange Data
Ascending Order:
Numeric–Arranges the data from least to greatest.
Alphabetic–Arranges the data in a-z order.
NOTE: When you sort the data in ascending order, the alphabetic order setting is still operant. The leading . character (.admin) is
listed before the first numeric character.
66 NETWITNESS CORPORATION
R1.3.1009
Chapter 6 Data Analysis
Descending Order:
Numeric–Arranges the data from greatest to least.
Alphabetic–Arranges the data in z-a order.
Session Quantifier
NETWITNESS CORPORATION 67
R1.3.1009
NetWitness® Investigator User Guide
Actions
68 NETWITNESS CORPORATION
R1.3.1009
Chapter 6 Data Analysis
View the Session in Google Earth– Using SHIFT+ icon bypasses the
dialog box and displays the last session viewed.
Custom Actions
The Custom Actions Editor allows the user to execute external operations on selected metadata from
INVESTIGATOR Navigation View. There are two variables that can be specified:
${TYPE}– specifies the metadata’s equivalent value.
Use the following steps to create a Custom Action to conduct a Google search for the metadata
value. The Custom Actions you create are saved on your local system and can be applied to any
collection.
NETWITNESS CORPORATION 69
R1.3.1009
NetWitness® Investigator User Guide
1. Click on Custom Actions. Enter the action and the Action Name. Click OK.
2. In the Navigation View, right-click over a select selected value. Click on the Google Search action.
70 NETWITNESS CORPORATION
R1.3.1009
Chapter 6 Data Analysis
Context Menus
When you right-click in a pane (Collection or Navigation) on the INVESTIGATOR screen, a Context
menu opens. The functions on the toolbar, such as Print and Custom Drill, are accessible, as well as
current settings.
NETWITNESS CORPORATION 71
R1.3.1009
NetWitness® Investigator User Guide
The reports display the first 20 results by default. If [open] or [more] is displayed at the end of the
list of value, that means that there are more results that you can view. When you click on a Report
icon, the following options are available:
If the options are greyed out, they are not available from the current view.
OPTION DESCRIPTION
Drill Allows the user to define a custom query?. The resulting Navigation view
allows for all report operations, including drilling and the viewing of session
listings.
Open Report To open the report, the user must confirm that the process may be
time-consuming in Confirm Open dialog:
All Results When there are large numbers of results, the user must specify a maximum
number (1000, 2500, 5000, etc. to 50000) to display
72 NETWITNESS CORPORATION
R1.3.1009
Chapter 6 Data Analysis
OPTION DESCRIPTION
Drill into... Allows the user to input specific values for a custom query?. The result set
is a Navigation view, which will allow for all report operations, including
drilling and the viewing of session listings.
Clicking on a Report Value in the collection removes all items not associated with the chosen value.
This is useful because you are able to see patterns in events more easily. You can also create a
separate tab when you drill into a value or session group. The decision whether to continue to
extend the drill path in one tab, to create a separate tab for a secondary drill, or to create a new
tab with the last level as the root for the drill path depends upon your experience and personal
preference.
If a user were interested in HTTP activity with foreign countries, especially activity that contained
javascript files, a preliminary method for analysis of their network data is provided in this chapter.
In order to keep the drill path clear, a new tab is needed for this drill.
NETWITNESS CORPORATION 73
R1.3.1009
NetWitness® Investigator User Guide
Alt +Click to make the report value the root of the Drill Path in a separate tab.
As you drill further into the collection, having these separate tabs improves your ability to go back
and refine the drill and look more closely at items of interest.
The new view of the data has filtered out the other Service Types.
Drill Path
Focus on
Service Type
HTTP
At this point, you must evaluate the Report Values and Session counts to determine the next item of
interest. Possible drills of interest might include an additional filter for:
A Destination Country (China)
A specific Source IP Address
A Destination IP Address
74 NETWITNESS CORPORATION
R1.3.1009
Chapter 6 Data Analysis
View Sessions
Once the focus of the analysis has been narrowed to a particular type of event, clicking on the
number opens the drill to the Session level.
Click
Session#
to view
Session List
for a value
Session View
The Session view displays a representation of all the sessions that correspond to the drill from the
Navigation view. For example, if a user clicks on a session count of 26 to the right of a particular
IP Address in the Navigation view, the resulting 26 sessions will be listed on the Session List view.
Drill Path
for
navigation
Session List
Toolbar
NETWITNESS CORPORATION 75
R1.3.1009
NetWitness® Investigator User Guide
FUNCTION DESCRIPTION
Paging Control
Click directly on the Page Display to open the Go To Page dialog box. This
lets you move to a specific page of sessions without paging through each
group of sessions. This session group contained only 26 sessions, but
often values are considerably larger. Other ways to find a specific session
are using Bookmarks and History (see page 28).
76 NETWITNESS CORPORATION
R1.3.1009
Chapter 6 Data Analysis
FUNCTION DESCRIPTION
Display Control
Event View– Displays each session on the page in one line (Time, Service,
Size, Events) with hyperlinks to create a new drill.
Actions
NETWITNESS CORPORATION 77
R1.3.1009
NetWitness® Investigator User Guide
FUNCTION DESCRIPTION
Export to File– Export the sessions in the current Session View list to
a.pcap file.
78 NETWITNESS CORPORATION
R1.3.1009
Chapter 6 Data Analysis
2. In the Session View, click on the Google Earth icon. Click on Add IP Range in the Display
Sessions dialog box.
NETWITNESS CORPORATION 79
R1.3.1009
NetWitness® Investigator User Guide
The private IP address range for the sessions to be mapped by Google Earth, as well as a
longitude and latitude for the city and country, are used to update the GeoIP database.
Click OK.
4. If you want to use this information with a DECODER, go back the Display Sessions dialog
box.
80 NETWITNESS CORPORATION
R1.3.1009
Chapter 6 Data Analysis
Content View
To view the content in a particular session, you click on the Thumbnail image. A separate pane
displays the content detail for that session. You can select any one of the following formats on
the Content Toolbar.
Content Toolbar
When you view content, INVESTIGATOR selects the probable best format, based on the
collection’s type of service. Once you open the Content view, you are able to change from the
default Auto to any of the other options.
VIEW REQUEST
Show only the request for the currently loaded session.
VIEW RESPONSE
Show only the response for the currently loaded session.
TOP TO BOTTOM
Alternate request and response packets from top to bottom.
SIDE TO SIDE
Alternate request and response packets from left to right.
BEST RECONSTRUCTION
View data in Auto format, which allows INVESTIGATOR to select the format.
NETWITNESS CORPORATION 81
R1.3.1009
NetWitness® Investigator User Guide
VIEW TEXT
View data in text format.
VIEW HEX
View data is Hex format.
VIEW PACKETS
View data in packet format.
VIEW MAIL
View data in Mail format.
VIEW WEB
View data in Web format.
VIEW IM
View data in IM format.
PLAY AUDIO
Access data in audio (VoIP) format.
OPEN PCAP
Open the currently loaded session as a PCAP.
EXPORT SESSION
Export the currently loaded session.
You can continue to explore the data through drilling into specific items, search the session for a
particular term, string, or other values.
Search View
NetWitness Search allows users to search collections for keywords and regular expressions
(pattern matches). You have the option to create a new search or use any combination of various
common search criteria (e.g. social security numbers, credit card numbers, EIN tax numbers)
found in a compiled library.
The following describes the capabilities of the NetWitness Search engine and explains the various
options that users have when searching through their NetWitness data.
82 NETWITNESS CORPORATION
R1.3.1009
Chapter 6 Data Analysis
Simple Search
To search a collection:
1. Open and navigate to a collection from the list of NetWitness Collections. Click the Content
Search icon found on the Collection Toolbar. The Search Dialog displays, which allows users
to create and run ad hoc searches on either a keyword or a regular expression.
Toggle button to
move between
Simple and
Advanced
Search
Default setting for
Content
You could expand the search to include metadata by changing the settings in Preferences.
You could also specify that your search criteria are to be Case Insensitive, if necessary. For
more details about preference options, see Search Preferences on page 83.
2. The user has the option to designate whether or not the search is in the form of a regular
expression by making the appropriate check in the Regular Expression checkbox. If Regular
Expression is enabled, but the search string entered by the user is not a valid regular
expression, NetWitness notifies the user of an invalid query. If Regular Expression is not
enabled, the search engine treats the search string as a keyword.
NetWitness uses the Boost Perl regular expression engine. All regular expressions must be formatted in the
appropriate syntax. More information about the Boost Perl regular expression library and syntax can be found at
the Boost Homepage
3. Click on the Advanced icon in the upper-left corner of the Search screen to go to
Advanced Search.
Search Preferences
Before initiating either a Simple or Advanced Search, You can set or change your search preference
options by clicking on the Preferences text beneath the search box.
Search Content: This is the default setting.
NETWITNESS CORPORATION 83
R1.3.1009
NetWitness® Investigator User Guide
Search Metadata: Ifthis option is enabled, NetWitness will search the metadata for each
session as well as the content. By default, NetWitness Search only searches through the
content of a session.
Decode Sessions: Often, the payload of a session will be compressed, usually in a gzip format,
to reduce the amount of information sent over the network. If this option is enabled,
NetWitness attempts to decompress the content of every session it searches to find a match
for the search. Many web pages are gzipped on the web service and unzipped by the web
browser. NetWitness also unzips the content so that the search engine can search through
the original plain text.
This option does not mean that NetWitness decrypts the content of a session and extract matches from encrypted
traffic.
Case Insensitive: This option designates whether the search should be case-sensitive.
Advanced Search
Advanced Search allows users to create a more advanced search and save that search to a search
library for future use or use one of the many pre-packaged searches that are standard with
NetWitness INVESTIGATOR.
84 NETWITNESS CORPORATION
R1.3.1009
Chapter 6 Data Analysis
In the Advanced Search dialog, users can select from saved searches by clicking on the drop down
menu, located to the right of Search Name. This list includes all default searches along with any
other advanced searches created and saved by the user.
NETWITNESS CORPORATION 85
R1.3.1009
NetWitness® Investigator User Guide
If you are creating a custom regular expression, it is often useful to include which strings will match the saved
regular expression and which will not. See the description of Social Security Numbers as an example of how to
best save the description of a new regular expression.
The actual search pattern (or text) is specified in the text box next to Search For.
Advanced Searches created by a user must be given a name, description, and search string before
they can be saved. These saved searches continue to exist until they are deleted by selecting the
search to be deleted and clicking the Delete Search text.
If one of the original Advanced Searches is changed, the user can revert to the default criteria by clicking Reload
Default Search Criteria.
86 NETWITNESS CORPORATION
R1.3.1009
Chapter 6 Data Analysis
Search Results
The search for .js files in the 84 sessions from IP Address 192.168.221.129 produced two pages of
results.
The original search results show all .js files in bold. When you enter .js in the search field a second time, each
instance in the results is highlighted.
The service type of the matching session (e.g. HTTP, FTP, MSN IM, etc.)
NETWITNESS CORPORATION 87
R1.3.1009
NetWitness® Investigator User Guide
Once any results are displayed, the user can use the NetWitness Search toolbar to execute any of
the following actions:
Export the results to another collection for further searching and navigating (Click the
Export icon on the toolbar)
Export the results to a .pcap file (Click the Export icon on the toolbar)
Page through the results using the paging controls on the top toolbar
The top bar will also give feedback as to the number of sessions that contained a match. Another
way to export the results of a NetWitness Search is to right click the body of the results page and
select Export Sessions.
Content View
To open and view the content of a search result, either click on the pre-generated thumbnail or
the search term in the content snippet.
The matching search text will be in bold text to make the match stand out from the other text.
88 NETWITNESS CORPORATION
R1.3.1009
Chapter 6 Data Analysis
An Advanced Search can be initiated from the results page by clicking on the Advanced Search
text underneath the input box.
NetWitness Search maintains a record of the last 10 searches. This list drops down
automatically when the user begins a search in the text box.
NetWitness Search caches the results of each search so that the search can be repeated very
quickly.
Multiple search windows can be open and running at the same time. The user is advised
that the number of simultaneous searches may affect the overall performance of
NetWitness INVESTIGATOR, especially when NetWitness is collecting in a sustained mode
with heavy traffic volumes.
NETWITNESS CORPORATION 89
R1.3.1009
NetWitness® Investigator User Guide
90 NETWITNESS CORPORATION
R1.3.1009
Appendix A
Rules
Introduction
Network layer rules are applied at the packet level and are made up of rule sets from Layer 2 –
Layer 4. Multiple rules may be applied to multiple layers (for example, when a network rule filters
out specific ports for a specific IP address.)
Application rules are used to define the data collected by the NetWitness system at the session
level. A rule can be used to either include or exclude all traffic not otherwise selected. NetWitness
processes rules in the order they are listed in the Rules Configuration dialog. A default rule, if used,
must always be placed at the bottom of the rule list. Otherwise, rule processing stops as soon as
the default rule is evaluated since, by definition, all traffic is selected by the default rule.
A general rule of thumb for order of rules is to have filter and truncation rules set as the first rules to
be tested. Then any alert rules follow. Finally, any additional keep or filter rules would be placed at
the very bottom of the list.
Truncate – The payload information is not saved, but the metadata elements are retained.
If the criteria match, no subsequent rules will be evaluated, if the Stop Rule Processing checkbox is checked.
Session Options
For Network Rules, when choosing to Keep or Truncate a rule, the following options are available:
NETWITNESS CORPORATION 91
R1.3.1009
NetWitness® Investigator User Guide
Network Meta–When selected, the capture system directs those packets to the component that
will extract network meta elements (i.e. MAC Address, IP address, tcp/udp port
information, etc.).
Application Meta–When selected, the capture system directs those packets to the component
that will extract application meta elements (i.e. hostnames, filenames, e-mails accounts,
passwords, etc.).
Alert–Creates a new meta element when the rule criteria matches. The new meta element is
listed under the Alert field and the value of the meta element will be the name of the rule.
Session Options
For Application Rules, when choosing to Keep or Truncate a rule, the following option is available:
Alert–Creates a new meta element when the rule criteria matches. The new meta element
will be under the alert field and the value of the meta element will be the name of the rule.
Rule Order
Both network and application rules are applied in a top-down order. When a specific rule is
matched, the operation and options are acted upon. At that point, if the Stop Processing flag is
checked, then no further rules will be applied for that session. Rule evaluation will continue if
Stop Processing checkbox is unchecked.
For example, if there are three network rules and three application rules defined and network rule
#2 has the Stop Processing option checked. If network rule number 2 is matched for a session
which designates a Keep, then network rule number three will not be applied. The application
rules will then be measured against that specific session.
Capture rules consist of three logical parts, called an expression. The simplest form of a
expression would contain these elements:
Example: [<Field> + <Operator> + <Value>] + Action
Expressions may be grouped and logically combined with other expressions using Boolean
Operator(s). A Value can be a single value or a range of values.
92 NETWITNESS CORPORATION
R1.3.1009
Appendix A Rules
Actions are assigned to a rule to tell the NetWitness system how to deal with packets that match
the rule. The following table lists the possible actions for a rule.
ACTION DESCRIPTION
Keep Instructs NetWitness to keep the packet and write it to disk.
Truncate The payload information is not saved, but the metadata elements are retained.
Rule Syntax
The syntax for writing capture rules consists of comparing a field to a value using a comparison
operator. The supported comparison operators are equals (=) and not equals (≠).
Values can be expressed as discrete values, a range of values, an upper or lower bound or a
combination of these three. Greater than (>) and less than (<) comparisons are accomplished
through the use of ranges.You can create a greater than or less than comparison, test equality or
inequality against a range of values or an upper/lower bound.
The following table summarizes the supported comparison operators and the syntax for
expressing values.
SYNTAX DESCRIPTION
* Default rule. By using an asterisk (*) as the sole character in a rule, that rule will select all
traffic.
= Equality operator
!= Inequality operator
|| Logical OR operator
-u Upper bound. For example, to select all TCP ports above 40000 the syntax would be:
tcp.port = 40000-u
l- Lower bound. For example, to select all TCP ports below 40000 the syntax would be:
tcp.port = l-40000
- (dash) Denotes a range. This is only applicable to numeric values. Separate the lower and upper
bounds of the range with a dash (-) character. For example, to select TCP ports between
25 and 443 the syntax would be: tcp.port = 25-443
, (comma) Denotes a list of values. Single values may be used as well as any combination of ranges
and upper or lower bounds. For example, the following is valid syntax: tcp.port =
l-10,25,110,143-255,40000-u
NETWITNESS CORPORATION93
R1.3.1009
NetWitness® Investigator User Guide
SYNTAX DESCRIPTION
Supported Fields
Supported metadata fields for creating capture rules are different for Network or Application
Layer Rules. Refer to Parsers and Associated Meta Data on page 210 for the metadata fields
supported for use in Application Layer Rules. The following metadata fields are supported for use
in Network Layer Rules:
METADATA DESCRIPTION
eth.addr Ethernet source or destination address. Commonly known as the MAC
address.
eth.dst Destination Ethernet address. This is the same as the Ethernet address
field except it selects only packets where the destination address matches
the selected value(s).
eth.type Ethernet frame type. See Ethernet Protocol Reference List on page 125 for
a list of possible values and descriptions.
fddi.dst Same as the Ethernet destination except uses the FDDI address.
fddi.src Same as the Ethernet source except uses the FDDI address.
hdlc.addr High-level Data Link Control physical source or destination address. Same
concept as the Ethernet address.
hdlc.dst Same as the Ethernet destination except uses the HDLC address.
hdlc.src Same as the Ethernet source except uses the HDLC address.
94 NETWITNESS CORPORATION
R1.3.1009
Appendix A Rules
METADATA DESCRIPTION
ip.proto IPv4 protocol field. Internet Protocol Reference List on page 132 for a list of
possible values and descriptions.
ipv6.proto IPv6 protocol field. This maps to the Next Header field in the IPv6 header
and uses the same values as the IPv4 protocol field. See Internet Protocol
Reference List on page 132 for a list of possible values and descriptions.
tcp.dstport Destination TCP port. See TCP Protocol Reference List on page 137 for a
list of common TCP port assignments.
udp.dstport Destination UDP port. See UDP Protocol Reference List on page 140 for a
list of common UDP port assignments.
NETWITNESS CORPORATION95
R1.3.1009
NetWitness® Investigator User Guide
96 NETWITNESS CORPORATION
R1.3.1009
Appendix B
Parsers and Feeds
Introduction
NetWitness uses two kinds of parsers, in addition to those compiled into the INVESTIGATOR. A
custom parser is compiled using the FLEXPARSE™ program in an XML-formatted .parser file. A
custom feed can be created by the user or obtained from an outside source using NetWitness
LIVE. The definition of the feed is saved in an XSD-formatted .feed file.
Parsers
The NetWitness parsing process allows the user to customize definitions of the core parsers for
parsing network data. These FLEXPARSE™ programs are loaded and compiled when either
processing capture files or capturing data with INVESTIGATOR. Most commonly, they are used for
static meta extraction and service identification. This flexible definition allows users to easily
extend the core NetWitness-defined services to provide extra service type identification and
metadata extraction. This is important in today’s world due to the volume of custom applications
that are used on networks around the world.
Each custom parser is defined as an XML-formatted .parser file. Each definition file must contain
at least one parser definition but may contain more. When the definition is created in a text editor
that understands the XML format, it is possible to provide full syntax validation as well as
Intellisense support for the designer.
There are three types of custom parsers:
NETWITNESS CORPORATION 97
R1.3.1009
NetWitness® System Administrator Guide
GeoIP Parser
This fixed parser takes the IP addresses and converts them to actual geographical locations. The
locations are displayed through the Google Earth display. The geolocation data, including
country.src or country.dst, city.*, latdec.*, longdec.* are added for both ip.src and ip.dst. It uses two
external data files (GeoCity.dat and GeoCountry.dat, which are both stored in the application
directory). There are up to eight metadata for each IP address.
Search Parser
The Search Parser is a custom parser, user-configured to generate metadata by scanning for
pre-defined keywords and regular expressions. The parser searches the payload of a reconstructed
session for string matches and can execute a regular expression search. This user configures the
parser by editing the search.ini file. The default search.ini file is found in the Program Files on your
system:
PATH: C:\Program Files\NetWitness\NetWitness 9.0\Investigator
Once you edit the file and save it, the Search Parser adds the new item to its Found and Match
metadata. It is important, before creating new search definitions and enabling the search parser,
to understand both the search mechanism and the data that is to be applied. The new search
definition is used across all protocols.
Keyword + Pattern:Search a stream for a regular expression if it contains any of a given set of
keywords.
EXAMPLE:
[EIN]
Services=20;21;23;25;69;80;110;119;1122;1433;1521;5050;5190;6667;8002;8019
Keywords= EIN; TIN;Employer Identification Number;Tax Identification
Number;E.I.N.;T.I.N.
Pattern=\b\d{2}[-]\d{7}\b
Case=1
98 NETWITNESS CORPORATION
R1.2.0209
Appendix B Parsers and Feeds
Language Definition
Global Settings
MatchLimit Integer > 0 Yes The maximum number of times a search can Default=1
match per stream. Once this limit is reached,
subsequent keywords are ignored and regular
expression evaluation terminates.
[Search Name]
The Search Name will be added as found meta if a match (keyword or pattern) is identified in a stream.
NETWITNESS CORPORATION 99
R1.3.1009
NetWitness® System Administrator Guide
1= When a
keyword is
found, search
up to the
specified
number of bytes
immediately
following the
keyword.
FLEXPARSE™
There are two kinds of Flex parsers:
Language Definition
The following table describes the XML schema used to define a parser using the FLEXPARSE™
tool. The XML node, attribute, and values referenced in descriptive text are bold. The root node
of every file must be the parsers node. Under that node there can be any number of parser nodes.
Each parser node defines a single parser. A parser node can have an optional declaration node and
any number of match nodes.
http://www.w3.org/2001/XMLSchema-instance
parsers.xsd
parser The node that defines a single parser definition. This node must be directly under the parsers
node. There can be more than one per file.
name The name that uniquely identifies the parser. This name
should be short and succinct. This is used by the system
to allow enabling and disabling. It should contain only the
letters [a-z] and [A-Z].
declaration The node that delineates the definition. Each of these definitions can have an associated match
entry.
token Specifies a definition for identifying a token somewhere in the session protocol. This defines a
match callback when the specified tokes in encountered in a session payload. The read position
is set to the byte immediately following the matched token.
options Options specify that the token should start on a new line
or at end of a line (linestart or linestop).
number Defines a numeric variable that can be referenced elsewhere within the parser definition. All
numeric values are 64-bit unsigned values.
scope (optional) Specifies when to reset the variable. This can either be
for each side of a two-sided session or only after a new
session is detected. The possible values are global,
constant, stream, and session (default).
string Defines a numeric variable that can be referenced elsewhere within the parser definition.
scope (optional) Specifies when to reset the variable. This can either be
for each side of a two-sided session or only after a new
session is detected. The possible values are global,
constant, stream, and session (default).
port Defines a match callback when a session is encountered using the specified port. The read
position is set to the first byte of the first stream (client) in the session.
session Defines a match callback for session begin/end events. These events only occur if a token for
the parser is encountered in the session.
stream Defines a match callback for stream begin/end events. These events only occur if a token for
the parser is encountered in the stream.
meta
format Specifies the variant type (e.g. Text, IPv4, UInt32). Refer
to the SDK documentation for a full list.
pattern Defines a regular expression variable for use by the regex function.
scope (optional) Specifies when to reset the variable. This can be for each
side of a two-sided session or only after a new session is
detected. Possible values are global, constant, stream,
and session (default).
match The possible entries for taking an action once a match criterion has been found for a
declaration. These nodes can be nested to provide deeper logic. There are several categories
of execution elements (functions) that can appear as children of a match element:
General
Arithmetic
String
Payload
General Functions
apptype Gets the currently defined service type for the current session.
identify Marks the session with the parser’s service type if the service type has not already been
identified.
if Compares two values. If the comparison is true, executes any sub-actions. Comparisons can
be number or string types, as long as both values are the same type.
while Compares two values and executes any sub-actions if the comparison is true. Comparisons
can be number or string types, as long as both values are the same type.
Arithmetic Functions
NOTE: All numbers are 64-bit unsigned values and subject to both underflow and overflow, depending on the operation.
String Functions
find Searches a string for a provided string value. If it is found, the position is returned and any child
elements will execute. Otherwise, child elements will not execute.
regex Searches a string for matches to the provided regular expression. If a match is found, the
position and, optionally, the matching string is returned. Any child elements will then execute. If
not found, any child elements will not execute.
NOTE: Regular expression operations can adversely affect system performance.
in A string to search.
substring At least one of the optional attributes from and length must be specified.
Payload Functions
These functions operate on a read position, set at the beginning of a match element, as described in
the declaration section above.
find Searches the stream payload starting at the read position for a provided string value. If the
value is found, the offset from the read position is returned. Any child elements will then
execute. If not found, any child elements will not execute.
install-decode To enable tokens to match on payload data that may be fragmented or otherwise encoded. A
r scan decoder can be installed to preprocess a section of the payload before it is scanned for
tokens. An example would be an HTTP response that uses the chunked transfer encoding with
gzip content encoding. By parsing the HTTP header, the necessary type, offset, and length
parameters can all be set, after which the HTTP response payload would appear to the token
scanning as if neither encoding had been applied. However, this incurs significant overhead.
isdecoding Tests whether an installed decoder is currently active. If so, any children of this function will
execute. This function has no parameters.
move Moves the read position forward in the current stream by a specified number of bytes. If there is
sufficient data in the stream, the read position is updated and any child elements will then
execute. If not found, the read position remains unchanged and any child elements will not
execute.
direction (optional) The direction to move the current read position. Can be
forward (default) or reverse.
packetid Returns the id of the packet for the current read position. It is possible for the result to be 0,
which indicates that the packet id could not be determined.
payload-positi Returns the current read position. This is a zero based index into the stream payload.
on
read Reads a specified number of bytes starting at the read position into a variable. If there is
sufficient data in the stream, the read position is updated, the data read assigned, and any
child elements will then execute. If not found, the read position remains unchanged and any
child elements will not execute.
endianess (optional) The byte ordering to use when reading into a number
variable. Can be big (default) or little.
NOTE: The attribute is invalid when reading into a string
variable.
Regex–Searches the stream payload starting at the read position for matches to a provided regular expression.
If found, the offset from the read position and, optionally the matched string, is returned. Any child
elements execute. Otherwise, child elements do not execute.
NOTE: Regular expression operations can adversely affect system performance.
Logging Functions
Provides a means for a flex parser to write to the system log. Logging functions can be extremely
useful when creating a new flex parser, but should be kept to an absolute minimum when a flex
parser is deployed to a production system.
failure Logs a message to the system log with the log level Failure.
warning Logs a message to the system log with the log level Warning.
info Logs a message to the system log with the log level Info.
debug Logs a message to the system log with the log level Debug.
Feeds
NetWitness uses feeds to create creating meta data based on an externally defined meta data
values. A feed is a list of data that is compared to sessions as they are captured or processed and
for each hit additional meta data is created.
Users may create their own custom feeds or set up the NetWitness Live service (see the Live Manager Setup
Guide on the netwitness.com/community/live).
This data could identify/classify malicious IPs or incorporate additional information such as
department and location based on internal network assignments.
Some examples of feeds may include threat feeds to identify BOTNets, DHCP mappings, or even
active directory information such as physical location or logical department.
You need to make the feeds directory since it is not created by an INVESTIGATOR install.
1. To create the initial Feed file, you first create the .xml file according to the Language Definition
(see page 116) and the text data file.
Additional feed definitions can be added by creating a new <FlatFileFeed> section in your
existing feed-definitions.xml file
Definition 1
Definition 2
Each feed file that you add to the feeds-definitions.xml file is then added to the feeds directory
of the INVESTIGATOR install.
Language Definition
The following table describes the XML schema used to define a feed-definitions.xml file. The XML
node, attribute, and values referenced in descriptive text are bold. The root node of every file must
be the feed node. Under that node there can be any number of feed nodes. Each feed node defines
a single feed file. A feed node can have an optional declaration node and any number of match nodes.
Feed Definition The basis for defining any feed type (currently only FlatFileFeed) and as such defines the
common attributes and children of a feed definition.
Language Keys A list of language keys that describe the names and types of meta that this feed will create.
MetaCallback A list of language keys that describe the names of meta that will be received by this feed.
MetaCallback defines the feed as performing lookups against a defined set of Language
Keys as they are created by application parsing.
valuetype:UInt8 | Int8 | UInt16 | Int16 | UInt32 | the type of meta that will be received,
Int32 | Int64 | UInt64 | IPv4 | IPv6 | MAC | Text must correspond to the Meta types.
Meta Descriptive information about the context, quality and condition, or characteristics of the
data.
Language Key The key that describes the name and type of meta that this feed will create.
valuetype: UInt8 | Int8 | UInt16 | Int16 | UInt32 | The type of meta that will be created. It
Int32 | Int64 | UInt64 | IPv4 | IPv6 | MAC | Text must correspond to the Language Key
type.
FlatFeedFile Defines a feed that consists of a flat file of single character delimited, EOL terminated
records. Currently the only FeedDefintion implementation.
separator
comment
Fields A list of Field elements that define the index(es) and value(s) of each record in the feed
data.
type: index|value
index: indicates that the record will contain a lookup value (ip address) at this
position. The ip value must use the dotted-decimal format (e.g. 10.5.187.42).
value:indicates that the record will contain meta data values at this position.
range: low|high
low: the inclusive lower bound of an IP range, only valid for Field elements where
type="index" and another Field element where type="index" and range="high" must
be defined.
high: the inclusive upper bound of an IP range, only valid for Field elements where
type="index" and another Field element where type="index" and range="low" must be
defined.
BITTORRENT None
BitTorrent File Sharing Protocol
FIX None
Financial Information eXchange Protocol
GNUTELLA None
File Sharing Protocol
IMAP None
Internet Message Access Protocol
MSRPC None
Microsoft Remote Procedure Call Protocol
NFS None
Network File System
RIP None
Routing Information Protocol
RTP None
Real Time Protocol for audio/video
SNMP None
Simple Network Management Protocol
In typical operational scenarios, all ports are processed; however, performance can be enhanced
by filtering specific protocols and turning content retention off.
To access Capture Rules in NetWitness INVESTIGATOR, click Edit J Rules. The Rules Configuration
dialog displays. Click the tab for Net Rules.
0x0101 Experimental
0x0200 Xerox PUP Xerox PUP (conflicts with 802.3 Length Field
range)
0x0804 CHAOSnet
0x0888 Xyplex
0x6007 DEC Local Area VAX Cluster (LAVC) System Communication Architecture (SCA)
0x7030 Racal-Interlan
0x7034 Cabletron
0x8006 Nestar
0x8010 Excelan
0x802E Tymshare
0x8046 AT&T
0x8047 AT&T
0x8049 ExperData
0x8069 AT&T
0x806A Autophon
0x806C ComDesign
0x807A Matra
0x8088 Xyplex
0x809C Datability
0x80E0 Allen-Bradley
0x80E4 Datability
0x80F2 Retix
0x80F4 Kinetics
0x812B Talaris
0x8139 KTI
0x817D XTP
0x8191 PowerLAN
0x8582 Kalpana
0x86DD IP version 6
0xAAAA DECNET
To access Capture Rules in NetWitness INVESTIGATOR, click Edit J Rules. The Rules Configuration
dialog displays. Click the tab for Net Rules.
4 IP IP in IP (encapsulation) [RFC2003]
5 ST Stream [RFC1190,RFC1819]
9 IGP Any private interior gateway [IANA] (used by Cisco for their
IGRP)
16 CHAOS Chaos[NC3]
122 SM SM [Crowcroft]
In typical operational scenarios, all ports are processed; however, performance can be enhanced
by filtering specific protocols and turning content retention off.
To access Capture Rules in NetWitness INVESTIGATOR, click Edit J Rules. The Rules Configuration
dialog displays. Click the tab for Net Rules.
9 discard Discard
13 daytime Daytime
23 telnet Telnet
37 time Time
43 nicname Who Is
70 gopher Gopher
79 finger Finger
88 kerberos Kerberos
In typical operational scenarios, all ports are processed; however, performance can be enhanced
by filtering specific protocols and turning content retention off.
To access Capture Rules in NetWitness INVESTIGATOR, click Edit J Rules. The Rules Configuration
dialog displays. Click the tab for Net Rules.
9 discard Discard
13 daytime Daytime
37 time Time
88 kerberos Kerberos
514 syslog 0
518 ntalk 0
561 monitor 0
Supported Fields
Entities
Alias Records
Properties
Introduction
In version 9.0, support for 802.11 wireless LAN (WLAN) capture and parsing has been
introduced. In addition, support for Wired Equivalent Privacy (WEP) decryption is available.
This section provides details about these components and how they relate to wireless packet
capture.
Capture Devices
There are three radio capture devices in 9.0. These capture devices are designed to provide a
source of captured packets for their respective operating system and hardware.
Since Microsoft does not yet permit redistribution of the Netmon DLL, users are required to
download the Netmon application directly from Microsoft, install it, then copy the NMAPI.dll
from the install directory into the directory where the Netwitness with INVESTIGATOR executable
resides. This is all that is required to use the Netmon capture device.
1. Copy the NMAPI.dll to the 9.0 Install directory, specifically co-located with the application
executable.
2. Use the nmwifi.exe application that comes with the Microsoft Network Monitor to place the
USB wireless device into monitor mode as well as set the desired frequency channel.
Windows versions prior to Vista are limited to NDIS 5, which does not support monitor (RFMON) mode.
Therefore, the Netmon capture device does not support these operating systems for the purposes of wireless
capture in monitor mode. However, the Netmon Capture Device does support wired capture in the same
manneras WinPcap. This means that one can use the Netmon Capture device to capture wired traffic in lieu of
installing WinPcap.
3. Start the nmwifi.exe application and select the wireless USB device from the dropdown list.
(
If your PC does not have a wireless USB device, the dropdown list will be empty.
4. Select the desired channel and check the box labeled Switch to Monitor Mode to enable
RFMON on the wireless device.
Not all Linux wireless drivers support monitor mode. In addition, the firmware for the wireless chipsets found on the
USB and PCI wireless adapters do not all support monitor mode. Therefore, one must take great care in selecting
a device to use for wireless packet capture.
The target device for Linux is the USB form factor exclusively. Technically, any wireless USB
device with a Ralink RT73 or RT2574 chipset are ideal. Like the current mmap(2) capture device,
the Linux radio capture device provides a logical interface to capture wireless traffic across all
installed wireless USB NICs simultaneously. This is useful for users who are using multiple
wireless channels (e.g. 1, 6, 11).
802.11 Parsers
There are five link level parsers related to wireless LAN packet capture:
The IEEE 802.11 parser handles standard wireless frames. The other four parsers handle the link
level encapsulation headers that are typically added by wireless drivers to the 802.11 frames
captured by the wireless NIC. There is no standard format for these capture headers and they
vary greatly according to the specific driver and operating system combination being used. We
have attempted to provide parsers for the most prevalent formats available today.
The new 802.11 wireless parsers introduced in 9.0 all share a single configuration file. This
configuration file is used to define any wireless access points the user may have in their network.
The name of this file is wlan-config.xml and its primary purpose is to control decryption. The
BSSID of the access point and the SSID that it's authoritative for is added to this file as well as all
of the active default keys used by the access point. This file is technically optional. If decryption
of 802.11 traffic is not desired, users are not required to create one at all.
This example includes every possible option currently supported. The only required attribute for
the <accesspoint/> element is the bssid. The ssid and the channel are optional and are determined by
the wireless parsers automatically by parsing 802.11 Management frames. If the wireless access
point is configured to use 40/64 bit or 104/128 bit WEP, it should have a child element <wep/>
defined that contains all of the default keys (the standard allows a maximum of 4). The <key/>
element is used for this purpose and it has a single mandatory value attribute where a hexadecimal
key is provided.
Only a string of hexadecimal values can be given for the <key/> element since there is no consistent method to
turn a passphrase into a hex key for WEP for different vendors.
Supported Platforms
The supported platforms for wireless capture are:
Windows Vista, Windows 2003, Windows 2008, Windows 7 (NDIS 6) (see page 151)
The most important goal for the radio capture devices is the ability to place the wireless network
interface card (NIC) into what is known as monitor mode, also known as RFMON mode, which
is one of six modes defined by IEEE 802.11. This mode, in particular, allows applications to
monitor all traffic received from the wireless network, essentially grabbing raw 802.11 packets
right out of the air. Unlike promiscuous mode, which is also used for packet sniffing, monitor
mode allows packets to be captured without having to associate with an access point or ad-hoc
network. The monitor mode is exclusive to wireless networks, while promiscuous mode can be
used on both wired and wireless networks.
Windows 2000, XP
The versions of the Windows operating system are based on the Microsoft NDIS 5 standard, an
API for network interface cards (NICs). Unfortunately, NDIS 5 does not support any extensions
for monitor mode. Therefore, there is no radio capture device in the product that can directly
capture 802.11 frames for those versions of Windows.
However, the existing WinPcap capture device in 9.0 has been updated to support the
commercially available AirPcap wireless product from CACE Technologies. For users who have
an AirPcap device, it is possible to use 9.0 to capture 802.11 traffic using one of two different link
level frame capture formats, namely Radiotap or PPI.
In spite of the shortcomings of NDIS 5, older Windows users may still capture 802.11 packets,
provided they have the AirPcap product. This is possible because the AirPcap product includes a
branded wireless USB adapter and a proprietary device driver that can be used by the WinPcap
library. This is the library that underpins popular network analysis applications such as Wireshark
and WinDump as well as NetWitness. The latest version of AirPcap requires the WinPcap
4.1-beta library to work properly. This is included in the NetWitness product installation.
In other words, using an wireless PCMCIA or USB adapter on Windows Vista that comes with a
NDIS 5 or earlier driver will not support monitor mode. In those cases, the user's only options
are to purchase and use the AirPcap product or obtain a NIC and driver from a vendor that
supports NDIS 6.
Linux
Linux is the most powerful and enabling platform for wireless packet capture. The current
wireless stack used by Linux 2.6 is called mac80211 and is the API used by the Linux radio capture
device. Despite the availability of a superior wireless API for controlling wireless devices, not all
devices, specifically their internal chipset, nor all wireless Linux device drivers, support monitor
mode. Fortunately, a great many do and have become popular choices for wireless Linux network
analysis applications. NetWitness has chosen to develop and test against one of the most popular
chipsets that offer monitor mode in the USB form factor, those produced by the Ralink
Technology Corp. Ralink has been a exemplary supporter of the Linux driver community. Not
surprisingly, their most popular chipsets--the RT73 and RT2500 series--are arguably the most
fully supported of their class on Linux. Due to their cooperation with the Linux community, the
rt73 and rt2500 Linux device drivers, and their respective firmware files, have been included in
the mainline Linux kernel so there should be no need to download, compile, and install drivers
for USB adapters with these Ralink chipsets. We chose to support the RT73 chipset specifically
and all development and testing with that chipset has been exclusively on Fedora and Ubuntu.
Ostensibly, any wireless USB adapter on the market that has the RT73 chipset could potentially
be used by our Linux radio capture device. To date, the capture device on Linux 2.6.27 has been
successfully tested against the following commercially available RT73 devices:
Support for 802.11i, which includes Wi-Fi Protected Access (WPA) is planned for a future
release. It is likely that support for WPA2 will be added at the same time.
A multiple views 32
navigation toolbar 31
application layer rules 53 navigation view 30
sample rules 55 autohide 34
set rule priority 56 content pane 34
content toolbar 36
B hide 34
session list 35
bookmark session list toolbar 35
description 24 new local 26
breadcrumb new remote 26
description 24 refresh 27
status 8
summary 26
C summary view 24
capture collection management
configure 57 configuration
hash 13, 57 collection level 38
live data 47 configure
capture interface application level 37
wireless devices 58 collection level 38
collection collections
configure 37, 41 investigator toolbar 39
auto connect 38 new local 40
lock collection 38 import data file 42
override default location 38 import data file types
connect 26 EtherPeek 45
context menu 31 IPTrace 45
content search 31 NAIDOS 45
custom drill 31 NetMon 45
display values 31 RAW 45
force database scan 31 TCPDump 45
sort 31 reprocess 26, 42
timeline 31 configure
delete 26 application layer rules 53
description 24 capture 57
disconnect 26 collection 41
edit 26 investigator 9
export 26 network adapter 58
import 26 network layer rules 49
navigation parsers 48
R
rules
application layer 53
network layer 49
sets and expressions 92
supported fields 94
syntax 93
S
search
advanced 84
preferences 83
simple 83
tips 89
search view
description 24
secure socket shell (SSH) 2