The first step in using network evidence to solve cyber crimes is to collect it from the relevant sources. Depending on the type and scope of the attack, you may need to collect network evidence from different layers of the network stack, such as physical, data link, network, transport, or application layer. Additionally, evidence can be gathered from various devices, including routers, switches, firewalls, servers, or clients. Common types of network evidence include network packets which contain source and destination addresses, protocols, ports and payload. Wireshark, tcpdump or nmap are tools used to capture and analyze these packets. Network logs are records of events that occur on the network or devices with information such as date and time, source and destination, action and outcome, user and process. Syslog, Splunk or ELK are tools used to collect and analyze these logs. Network files are stored on the network or devices with content, name size type and hash. FTK Imager, EnCase or Autopsy are tools used to collect and analyze these files. Network metadata is data that describes characteristics or context of other data such as IP address MAC address DNS name or geolocation. Whois nslookup or traceroute are tools used to collect and analyze this type of evidence. Collecting this network evidence is essential for communicating the status findings and actions of the incident response team to relevant stakeholders.