Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:58 PM

Tech Insight: Free Network Tool Shows The Bigger Picture

A hands-on look at the new NetWitness Investigator network analysis tool and how it can team with Wireshark

A Special Analysis for Dark Reading

It can take hours or days to truly understand what took place during a security incident. Security analysts and forensics investigators try to put IDS alerts, system logs, and user reports into context to determine if an attack was successful, if sensitive data really did leave the network, and other tough questions. Tools like Wireshark, tcpdump, ngrep, and snort are the bread-and-butter during these times of intense analysis. But things are about to change -- for the better.

Earlier this week, NetWitness released a free version of its Investigator network analysis tool. Investigator gives you contextual analysis of raw network data and allows analysts to step back and view it all at the session-level as opposed to the packet level, like Wireshark.

I recently used Investigator for the better part of a day, analyzing packets captured directly from a production network, as well as previously captured packets from the DefCon Capture the Flag contest. Investigator does a great job of breaking out the individual sessions and providing metadata about sessions that lets you dive deeper simply by clicking on the different items, such as TCP, HTTP, MAC, Source IP, and even Location.

Does this mean you should toss aside Wireshark and your other tools? Absolutely not. NetWitness Investigator is a complementary tool, not a replacement. Investigator lets you look at billions of packets and flows and analyze them more quickly and easily, says Tim Belcher, NetWitness' CTO. It turns the billions of packets into thousands of sessions, he says, and then you can use Wireshark to drill down even more deeply.

The best way to differentiate Wireshark and Investigator is how security expert Richard Bejtlich explained in his "Network Forensics with NetWitness" blog entry. Wireshark is already known as one of the best network protocol analyzers around, but Richard notes that it's a packet-centric tool, and that Investigator is data-centric.

For example, separating sessions in Wireshark can be tedious and slow. Once an item of interest has been identified, clicking on "Follow TCP Session" provides that single session, but stops there. The session content cannot be viewed natively within Wireshark as a Web page if it is a Web browsing session, nor as an image if it were a picture viewed on Flickr. It has to be exported first and then opened with the relevant application.

Investigator, meanwhile, does all of the session reconstruction and presentation natively for you. When you click on an HTTP session in Investigator, it presents a thumbnail view that can be zoomed in to see the full Web page and any embedded graphics. The same goes for e-mail. And I found that its speed is impressive, too: Clicking around the interface and drilling down into the different sessions was incredibly fast compared with searching and filtering the same data in Wireshark. NetWitness' demonstration video (on YouTube or HD) shows examples of this, as the presenter navigates through the interface.

What's the catch? NetWitness obviously wants to get its name out there and show off what it can do to entice you to look at its enterprise network forensic products. Of course, this isn't the first time a vendor has taken this approach to get some instant exposure. And you'll find NetWitness has some other solutions that may fit well within your organization.

So the company must have crippled Investigator before releasing it for free, right? Not so. The only limitation is that capturing live data and reading previously captured network data is restricted to a size of 1 GB. And it can only open up to 25 previously captured files at a time. So to recap, Investigator can read up to 25 GB of network traffic spread across 25 1-GB files; that's no handicap, nor is it something that Wireshark can do.

NetWitness Investigator is a tool that's going to stick around and probably become one of the more popular tools for better understanding the bigger picture and placing an event of interest into context. Wireshark will still have a home in every security professional's toolkit, too. Only now, it has a big brother to look up to.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-17
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivile...
PUBLISHED: 2021-04-17
Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (ker...
PUBLISHED: 2021-04-17
A command injection vulnerability has been reported to affect QTS and QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application. We have already fixed this vulnerability in the following versions: QTS Build 20210202 and later Q...
PUBLISHED: 2021-04-17
An SQL injection vulnerability has been reported to affect QNAP NAS running Multimedia Console or the Media Streaming add-on. If exploited, the vulnerability allows remote attackers to obtain application information. QNAP has already fixed this vulnerability in the following versions of Multimedia C...
PUBLISHED: 2021-04-16
jose-node-esm-runtime is an npm package which provides a number of cryptographic functions. In versions prior to 3.11.4 the AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDe...