Wednesday, February 25, 2026

Network Security Phase–2: Active Reconnaissance

 

Tech Guardians – Cyber Range Based Course

Network Security Phase–2: Active Reconnaissance

Passive reconnaissance builds awareness without touching the target. The next stage — active reconnaissance — involves direct interaction with systems to identify network paths, open services, technologies, and system behavior.

Inside the Tech Guardians Cyber Range, students practice these techniques in a controlled environment where learning happens safely, legally, and practically.


🔎 What is Active Reconnaissance?

Active reconnaissance requires making a connection to the target system. This interaction may be:

  • Visiting a website

  • Checking open ports

  • Sending network packets

  • Connecting to services such as SSH, HTTP, or SMTP

Because direct contact is made, logs can record:

  • Client IP

  • Connection time

  • Duration

  • Requested resources

Therefore, active reconnaissance must only be performed with proper authorization.


🌐 Web Browser as a Reconnaissance Tool

Image

Image

Image

Image

A web browser is one of the most powerful reconnaissance tools available on every system.

Key Capabilities

  • Inspect page source and JavaScript

  • View cookies and session data

  • Discover site structure

  • Identify backend technologies

Useful Extensions

  • FoxyProxy → quick proxy switching (Burp Suite workflows)

  • User-Agent Switcher → simulate different devices and browsers

  • Wappalyzer → detect frameworks, servers, CMS, analytics

Default Transport Ports

  • HTTP → TCP 80

  • HTTPS → TCP 443

Custom ports can be accessed using:

https://IP:PORT

📡 Ping — Checking System Availability

Image

Image

Image

Ping verifies whether a system is online by sending an ICMP Echo Request and waiting for an Echo Reply.

Uses

  • Confirm host availability

  • Measure latency

  • Check network path reliability

Example

Linux:

ping -c 5 MACHINE_IP

Important Concepts

  • Uses ICMP protocol

  • ICMP header size → 8 bytes

  • Windows Firewall blocks ping by default

Possible reasons for no response:

  • System offline

  • Network issue

  • Firewall blocking ICMP


🛰 Traceroute — Mapping Network Path

Image

Image

Image


Traceroute reveals the routers (hops) between your system and the target.

It works by manipulating TTL (Time To Live) values to force routers to respond with ICMP messages.

What It Shows

  • Number of routers

  • Network latency per hop

  • Route changes over time

Commands

Linux/macOS:

traceroute MACHINE_IP

Windows:

tracert MACHINE_IP

Key Insight: Internet routes are dynamic, so results may vary.


💻 Telnet — Banner Grabbing and Service Testing

Image

Image

Image

Image

Telnet is an old remote administration protocol (port 23) that transmits data in plaintext. Although insecure for login, it is valuable for reconnaissance.

Uses

  • Connect to any TCP port

  • Grab service banners

  • Identify server type and version

Example:

telnet MACHINE_IP 80
GET / HTTP/1.1
host: test

This may reveal:

Server: Apache / Nginx

⚡ Netcat (nc) — The Swiss Army Knife

Image

Image



Netcat supports TCP and UDP and can act as both client and server.

Capabilities

  • Banner grabbing

  • Port connectivity testing

  • File transfer

  • Reverse shells

  • Simple chat channels

Example — Client

nc MACHINE_IP 80

Example — Server

nc -lvnp 1234

Common Options:

OptionMeaning
-lListen mode
-pSpecify port
-nNo DNS lookup
-vVerbose
-kKeep listening

🧠 Combining Tools for Recon Workflow

Basic scanning workflow:

  1. Ping → Check if host is alive

  2. Traceroute → Map network path

  3. Telnet / Netcat → Identify open ports and services

  4. Browser DevTools → Detect web technologies

Professional scanners like Nmap automate this process — covered in later course modules.


🎯 Learning Outcome in Tech Guardians Cyber Range

Students learn:

  • Real-world recon methodology

  • Safe testing inside isolated labs

  • Tool chaining and automation basics

  • How attackers gather intelligence

  • How defenders detect recon activity

Tuesday, February 24, 2026

Digital Forensics in Kali Linux – Tools and Investigation Overview

 

Digital Forensics in Kali Linux – Tools and Investigation Overview

What is Digital Forensics?

Digital Forensics is the process of identifying, collecting, preserving, analyzing, and presenting digital evidence from computers, storage devices, and networks.

It is used in:

  • Cybercrime investigations

  • Incident response

  • Data recovery

  • Malware analysis

  • Legal proceedings

In Kali Linux, forensic tools are available under:

Applications → Forensics

These tools help forensic specialists recover and analyze data in a legally sound manner.


Goals of Digital Forensics

  1. Preserve original evidence

  2. Maintain chain of custody

  3. Recover deleted data

  4. Analyze memory and disk artifacts

  5. Generate legally admissible reports


Common Digital Forensics Tools in Kali Linux


1️⃣ Autopsy

About

Autopsy is one of the most widely used digital forensic tools.

It is a graphical interface for The Sleuth Kit and is used by:

  • Law enforcement agencies

  • Judicial investigators

  • Incident response teams


Key Features:

  • Disk image analysis

  • Deleted file recovery

  • Timeline analysis

  • Keyword searching

  • Email extraction

  • Web history recovery


Autopsy Interface

Image

Image

Image

Image


How It Works (Basic Steps)

  1. Create New Case

  2. Add Data Source (Disk Image / Drive)

  3. Select analysis modules

  4. Review extracted artifacts

  5. Generate report

Autopsy is often the first tool used in disk-based forensic investigations.


2️⃣ Binwalk

About

Binwalk is used for analyzing firmware images.

It helps in:

  • Extracting embedded files

  • Reverse engineering firmware

  • Identifying hidden data


Example Usage:

binwalk firmware.bin

To extract contents:

binwalk -e firmware.bin

Commonly used in IoT device investigations.


3️⃣ Galleta

About

Galleta is used to analyze Internet Explorer cookie files.

It helps investigators:

  • Identify browsing behavior

  • Extract timestamps

  • Recover user activity

Used in browser-based forensic investigations.


4️⃣ Hashdeep

About

Hashdeep is used for computing and verifying file hashes.

Hashing ensures:

  • Evidence integrity

  • No tampering

  • Authenticity verification


Example Usage:

hashdeep -r /evidence_folder > hashes.txt

It generates hash values for files recursively.

This is critical in maintaining legal credibility of evidence.


5️⃣ Volafox

About

Volafox is used for analyzing memory dumps from macOS systems.

It helps in:

  • Extracting running processes

  • Identifying malware

  • Analyzing memory artifacts

Primarily used for macOS forensic investigations.


6️⃣ Volatility

About

Volatility is one of the most powerful memory forensic tools.

It analyzes RAM dumps to detect:

  • Running processes

  • Hidden malware

  • Network connections

  • Injected code

  • Rootkits


Example Usage:

volatility -f memory.dmp imageinfo

List processes:

volatility -f memory.dmp --profile=Win7SP1x64 pslist

Memory forensics is crucial because attackers often leave traces in RAM.


Types of Digital Evidence

Digital forensic tools can analyze:

  • Hard disks

  • USB drives

  • SSDs

  • Mobile devices

  • Memory dumps

  • Log files

  • Email archives


Digital Forensics Investigation Workflow

  1. Identify and secure device

  2. Create forensic image (bit-by-bit copy)

  3. Calculate hash value

  4. Analyze using forensic tools

  5. Recover deleted artifacts

  6. Document findings

  7. Prepare forensic report


Real-World Example

In a cybercrime case:

  • A suspect's laptop is seized

  • Forensic image is created

  • Hash value is calculated

  • Autopsy analyzes disk image

  • Volatility analyzes RAM dump

  • Deleted emails and browser history are recovered

  • Evidence is presented in court


Comparison of Forensic Tools

ToolPurposeType
AutopsyDisk analysisGUI
BinwalkFirmware analysisCLI
GalletaCookie analysisCLI
HashdeepHash verificationCLI
VolafoxmacOS memory analysisCLI
VolatilityRAM forensic analysisCLI

Importance of Forensics in Cybersecurity

Digital forensics helps in:

  • Incident response

  • Insider threat investigation

  • Malware analysis

  • Legal compliance

  • Cybercrime prosecution

It bridges cybersecurity and law enforcement.


Legal & Ethical Considerations

Forensic analysis must:

  • Follow proper legal procedures

  • Maintain chain of custody

  • Preserve evidence integrity

  • Avoid evidence contamination

Improper handling can invalidate evidence in court.