The Network Archaeology class trains analysts and defenders to unearth and understand hidden data from network traffic and obfuscated files. The course covers foundational concepts such as:
- data representation (bytes, ascii, encodings),
- common network protocols, and
- packet structure; And progresses to more advanced concepts like:
- encryption and compression,
- cryptanalysis, and
- back/reverse engineering.
Those with a passion for theoretical CS, information theory, or mathematics will find it weaved throughout the course, but those without such passions need not flee in the other direction. These concepts are taught by hands-on incident response adventures where learning often occurs without even realizing it.
The class is presented as a series of technical challenges, each teaching a concept by allowing students to invent different approaches and try them out, seeing which work well and which do not. Challenges build on each other, until, by the final challenge, students are writing custom protocol decoder software from scratch.
Network Archaeology is a self-paced lab class, with intermittent instructor lectures. Some participants may find the first dozen or so labs easy: they are encouraged to proceed through as quickly as they like. The instructors lead occasional “how-to” lectures, starting with the first lab, eventually bringing the class to the same point. Between lectures, instructors traverse the room helping people with labs. Our friendly teaching assistants are available throughout and will happily sit with you and help you think through your approach.
This class is primarily taught using the Linux command line. The instructor will progressively apply command-line tools, iterating on a piece of data until it becomes something recognizable. The instructor will demonstrate multiple tools, encouraging students to prepare for “living off the land” and adapting their techniques to different tools they may encounter in the real world. Beyond the command line, some demonstrations will include the use of Wireshark and of web-based tools such as Cyber Chef - While some challenges will defy such tools, participants can make decent progress using them. Those with a coding background won’t be left out either, as some challenges will even demonstrate python scripting (with starter code often provided).
Each lab exercise either introduces new concepts or builds on previously presented concepts. Very few people make it through every exercise, and there is no expectation that anyone will “finish” in three days. Many Network Archaeology attendees come back to Cyber Fire to take this class a second or even third time.