Cargando…

Hiding behind the keyboard : uncovering covert communication methods with forensic analysis /

Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis�i�A�exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how t...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Shavers, Brett (Autor), Bair, John (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cambridge, MA : Syngress, [2016]
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Front Cover; Hiding Behind the Keyboard; Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis; Copyright; Contents; Foreword; INTRODUCTION; Introduction; WHAT THIS BOOK IS AND IS NOT; THE INTENDED AUDIENCE; Duration of Relevance for This Guide; SUMMARY; About the Authors; BRETT SHAVERS; JOHN BAIR; Acknowledgments; 1
  • Laying the Foundation of Covert Communications; INTRODUCTION; A BRIEF HISTORY OF COVERT COMMUNICATION; COVERT COMMUNICATION OVERLOAD; Investigative Goals; COVERT COMMUNICATION GOALS; SUMMARY; REFERENCES; 2
  • The Tor Browser; INTRODUCTION.
  • HISTORY AND INTENDED USE OF THE ONION ROUTERTwo Ways of Looking at The Onion Router; HOW THE ONION ROUTER WORKS; A Few Important Points About Tor; From a Tor User's Perspective; So What's the Big Deal?; From Your Perspective; FORENSIC ANALYSIS OF THE ONION ROUTER; TRACKING CRIMINALS USING TOR; USED IN COMBINATION OF OTHER TOOLS AND METHODS; TAILS; RELATED TOR TOOLS AND APPLICATIONS; Hidden Services; SUMMARY; REFERENCES; 3
  • Triaging Mobile Evidence; LOGICAL DATA; PHYSICAL DATA; EXAMPLES OF LOGICAL AND PHYSICAL DATA; WIRELESS CARRIERS; MOBILE NETWORK OPERATORS; MOBILE VIRTUAL NETWORK OPERATOR.
  • DETERMINING TARGET NUMBERFONEFINDER.NET; NUMBER PORTABILITY ADMINISTRATION CENTER; SEARCH.ORG; SUBSCRIBER IDENTITY MODULE; INTERNAL HARDWARE OF A SIM; THE SIM FILE SYSTEM; SIM SIZES AND EVOLUTION; TYPICAL EVIDENCE; SIM SECURITY-PIN AND PUK; TRIAGING DEVICES; DEVICES POWERED "ON"; DEVICES LOCATED "OFF"; MANUAL EXAMS; TOOLS AVAILABLE; Cellebrite USB Camera; Fernico ZRT; Project-A-Phone; Eclipse Kit 3; SOFTWARE SOLUTIONS; ScreenHunter; Snagit; Other Options; CHAPTER SUMMARY POINTS; REFERENCES FOR MANUAL TOOLS; 4
  • Mobile Extraction Issues; FLASH MEMORY.
  • EMBEDDED MULTIMEDIA CARD, EMBEDDED MULTICHIP PACKAGE, AND MULTICHIP PACKAGETHE FUNCTION OF NAND; NAND Operation Rules; Wear Leveling and Garbage Collection; SQLite Databases; How Does All This Present Problems?; ENCODING; Binary; Binary to Decimal; Hexadecimal; American Standard Code for Information Exchange; Unicode; Big and Little Endian; Nibble Reversed; Seven-Bit Short Message Service Protocol Description Unit; EPOCHS; UNIX; Unix 48 bit; UNIX Decimal 10Byte; GPS; AOL; GSM; Decimal Format; 64bit; File Time Formatted; HTML; JAVA; MSDOS; Binary-Coded Decimal; ISO 8601; Bit Date; MAC Absolute.
  • CELLEBRITE PHYSICAL ANALYZERProject Tree Example; Multimedia Message Service; USER-INSTALLED APPLICATIONS; USER-ENABLED SECURITY; BST; IP-Box and MFC Dongle; Advanced Nondestructive Exams-Joint Test Action Group; Destructive Exams; ADVANCED VALIDATION; Ultra Compare Professional; Chapter Summary; REFERENCES FOR LISTED TOOLS; 5
  • Data Hiding; INTRODUCTION; WHAT IS STEGANOGRAPHY; HIDING DATA BEHIND DATA; STEGANALYSIS; Intercepted Steganography Files; Steganalysis Applications; How Much Information Can Be Hidden; STEGANOGRAPHY METHODS; Investigative Steps; RELEVANT CASES; SUMMARY; REFERENCES.
  • 6
  • Cryptography and Encryption.