Using Dshell during an investigation
Dshell is a Python-based network forensic analysis toolkit that is developed by the U.S. Army Research Laboratory and released as open source at the end of 2014. It can help in making the forensic investigations on the network layer a little easier. The toolkit comes with a large number of decoders that can be used out of the box and are very helpful. Some of these decoders are as follows:
dns: Extracts and summarizes DNS queries/responses
reservedips: Identifies the DNS resolutions that fall in the reserved IP space
large-flows: Displays the netflows that have at least transferred 1MB
rip-http: Extracts the files from the HTTP traffic
protocols: Identifies non-standard protocols
synrst: Detects failed attempts to connect (SYN followed by a RST/ACK)
Dshell can be installed in our lab environment by cloning the sources from GitHub at, https://github.com/USArmyResearchLab/Dshell and running install-ubuntu.py
. This script will automatically download the...