Text this: Critical phases in network forensics - a review