NM User Guide
NM User Guide
NM User Guide
rev. D
NetworkMiner Professional
The NetworkMiner USB flash drive
NetworkMiner Professional is delivered on a customized USB flash drive. NetworkMiner
Professional is a portable application, which means that it doesn't require any installation
and can be run directly from the USB flash drive. Our recommendation is, however, that you
copy the NetworkMinerProfessional directory to your local hard drive and run it from there
for improved performance. It is up to you to decide if you will copy NetworkMiner to your
computer's desktop, put it in your Program Files directory or place it in the root of your
favorite HDD partition.
-1-
rev. D
Hosts Tab
The hosts tab contains a list of all IP address in the analyzed traffic. Each host in the list is
displayed as an icon specifying the fingerprinted operating system (OS), the IP address and
any potentially identified host name of the machine.
Host Icon Meaning
OS is FreeBSD
OS is Linux
OS is Mac
OS is NetBSD
OS is Solaris
OS is Unix
OS is Windows
Unknown OS
IP is multicast (RFC 3171)
IP is broadcast (RFC 919)
IP is reserved by IANA
Each host node can be expanded in order to reveal properties about the host, such as the
geographical location of the IP address and detected open ports.
Right-clicking a host brings up a context menu that enables host coloring. The host coloring
feature can be used to associate a color with a certain host (or IP address). Rows containing a
color coded host in other tabs in NetworkMiner are automatically colored according to the
users color selection. The color coding can be a very useful and time saving feature that
makes it easier to for example follow the actions of a particular user or identify files retrieved
from a particular server.
-2-
rev. D
Files Tab
The files tab contains a list of all files that have been reassembled and extracted by
NetworkMiner. Protocols from which files are extracted include common file transfer
protocols like HTTP, SMB, FTP and TFTP, but also extracted certificates from SSL and TLS
encrypted traffic (including the TOR protocol). An extracted file can be opened by right
clicking a row in the files tab, but we always recommend selecting open folder in the
context menu unless you are sure the extracted file does not contain malicious code. The list
of files can be sorted based on the contents of a particular column simply by clicking the
column's header.
Images Tab
The images tab shows thumbnail pictures of all images that have been extracted to a file by
NetworkMiner. Right-click an image to open it in an external viewer.
-3-
rev. D
Messages Tab
All messages extracted from e-mails1, IRC chats, IM chats and social media (Facebook,
Twitter etc.) are accessible from the messages tab. The leftmost pane contains a list of all
extracted messages. Contents and details of a particular message can be displayed by
selecting a message in the left pane.
Credentials Tab
The credentials tab contains user credentials, such as usernames and passwords, as well as
other details that might be useful in order to identify a particular user on the network. HTTP
Cookies are also displayed in the credentials tab.
Parameters Tab
The parameters tab displays all sorts of information extracted from network traffic where
there is a notion of a name-and-value combination. NetworkMiner extracts parameters such
as HTTP query string names and values, HTTP POST variables, HTTP cookie parameters and
FTP commands.
Keywords Tab
Any keywords that are of relevance for a particular case can be searched for by adding them
to the keywords tab. Every keyword match is displayed in together with the frame number
and source and destination of the packet. The keywords are case sensitive, so make sure to
enter them as both upper- and lowercase if needed. Arbitrary byte sequences can also be
queried for by entering them in hex format, i.e. for example 0x010203.
Remember that already loaded network traffic is not re-inspected when a new keyword is
added, so make sure to hit the Reload Case Files button after you have updated the
keyword list in order to re-crawl the traffic.
Acknowledgments
NetworkMiner Professional includes databases for operating system fingerprinting created by Micha
Zalewski and Eric Kollmann. Micha has developed the LGPL licensed software p0f2, from where the
TCP based fingerprinting databses p0f.fp and p0fa.fp originate. Eric has created databases for OS
fingerprinting though TCP handshakes as well as DHCP requests as part of his Satori3 program. Eric is
also continuously keeping his databases up to date with new OS fingerprints. NetworkMiner also
includes a Geo IP database from GeoLite data created by MaxMind4.
NetworkMiner can extract e-mails from numerous webmail solutions as well as from traditional SMTP traffic
-4-