

The packets are reconstructed and classified according to their type and header.

The packets must be identified and adequately filtered according to time and date.ģ. We can also use a network terminal access point (TAP) with a dedicated hardware device to a different system that monitors the system to help the forensic team analyze the network.Ģ. We must capture packets in a random mode in switched port analyzer (SPAN), sending a copy of all network packets from one port to another port for the packets to be analyzed. The process, according to the CIA forensics triangle, consists of three parts.ġ.

Next, we evaluate the network performance to detect anomalies and misuse of resources, network protocols used, aggregating data from multiple sources, and incident responses. To perform proper Wireless forensics, we must first collect and analyze Wi-Fi traffic. With Wi-Fi forensics, we can perform benchmarking of the network, troubleshoot it, do a transactional and a security attack analysis, and following general principles applied to all computer forensics. It is inevitable, though those laptops using this facility are subject to can be subjected to a hacker’s criminal activity of gaining access to PDAs and laptop computers, stealing valuable data, bank accounts, and other personal information stored.Īttackers are trying to find vulnerabilities of the protocol in the Wi-Fi network, so it is the responsibility of the forensic team to monitor the Wi-Fi traffic and determine whether any abnormality is an attack. With today’s expansion of Wi-Fi hotspots, it is a common practice when someone wants to access the internet to use these facilities to cut down costs. Its scope is to provide the tools and methodology to collect data in a wireless traffic environment, analyze them, and create valid evidence that is admissible in a court of law. Wi-Fi forensics is a discipline of the general digital computer forensic science. In this paper, we take a closer look at the different methods of performing a forensic investigation and analysis within a Wi-Fi environment.) The procedures are analyzed using commonly available programs for capturing and analyzing data and will show the consequences as well as identification of an active DOS attack on a computer in a secure Wi-Fi environment I. This paper investigates the various methods to perform a forensic investigation and analysis in a Wi-Fi environment.
