Network Activity Forensics - SOC Analyst Cheatsheet
Practical Guide for Network Connection & Usage Investigation
Quick Reference: Network Artifacts Matrix
Artifact
What Reveals
Time Range
Key Data
Live/Dead
Volatility
Investigation Priority Matrix
Priority
Artifact
Best For
OS Support
Key Value
Core Investigation Questions
Primary Questions:
Secondary Questions:
SOC Investigation Workflows
Workflow 1: Data Exfiltration Investigation (CRITICAL)
PowerShell Script: Complete Network Activity Investigation
Workflow 2: VPN & Anonymisation Detection
Investigation Steps:
Workflow 3: Baseline vs. Anomaly Detection
Analysis Technique:
Detection Patterns & Red Flags
Data Exfiltration Indicators
VPN/Anonymisation Usage
Lateral Movement Detection
Common Investigation Scenarios
Scenario 1: Cloud Storage Exfiltration
Scenario 2: VPN-Based Data Theft
Scenario 3: Insider Threat Baseline Deviation
SRUM Analysis Deep Dive
Understanding SRUM Data
SRUM CSV Output Columns Reference
Tools & Commands Reference
SrumECmd (Eric Zimmerman)
Registry Queries
Live Network Commands
Investigation Checklists
Data Exfiltration Investigation
VPN Detection Investigation
Network Baseline Investigation
Best Practices
SRUM Collection
Analysis Methodology
Limitations & Caveats
SRUM Limitations
Network List Limitations
TCP/IP Limitations
Summary: Critical Takeaways
Artifact Strengths
Investigation Strategy
Key Principle
PreviousFile & Folder Knowledge Forensics - SOC Analyst CheatsheetNextWindows Event Log Forensics - SOC Analyst Cheatsheet
Last updated