Hiding behind the keyboard : uncovering covert communication methods with forensic analysis /
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis�i�A�exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how t...
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Cambridge, MA :
Syngress,
[2016]
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Front Cover; Hiding Behind the Keyboard; Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis; Copyright; Contents; Foreword; INTRODUCTION; Introduction; WHAT THIS BOOK IS AND IS NOT; THE INTENDED AUDIENCE; Duration of Relevance for This Guide; SUMMARY; About the Authors; BRETT SHAVERS; JOHN BAIR; Acknowledgments; 1
- Laying the Foundation of Covert Communications; INTRODUCTION; A BRIEF HISTORY OF COVERT COMMUNICATION; COVERT COMMUNICATION OVERLOAD; Investigative Goals; COVERT COMMUNICATION GOALS; SUMMARY; REFERENCES; 2
- The Tor Browser; INTRODUCTION.
- HISTORY AND INTENDED USE OF THE ONION ROUTERTwo Ways of Looking at The Onion Router; HOW THE ONION ROUTER WORKS; A Few Important Points About Tor; From a Tor User's Perspective; So What's the Big Deal?; From Your Perspective; FORENSIC ANALYSIS OF THE ONION ROUTER; TRACKING CRIMINALS USING TOR; USED IN COMBINATION OF OTHER TOOLS AND METHODS; TAILS; RELATED TOR TOOLS AND APPLICATIONS; Hidden Services; SUMMARY; REFERENCES; 3
- Triaging Mobile Evidence; LOGICAL DATA; PHYSICAL DATA; EXAMPLES OF LOGICAL AND PHYSICAL DATA; WIRELESS CARRIERS; MOBILE NETWORK OPERATORS; MOBILE VIRTUAL NETWORK OPERATOR.
- DETERMINING TARGET NUMBERFONEFINDER.NET; NUMBER PORTABILITY ADMINISTRATION CENTER; SEARCH.ORG; SUBSCRIBER IDENTITY MODULE; INTERNAL HARDWARE OF A SIM; THE SIM FILE SYSTEM; SIM SIZES AND EVOLUTION; TYPICAL EVIDENCE; SIM SECURITY-PIN AND PUK; TRIAGING DEVICES; DEVICES POWERED "ON"; DEVICES LOCATED "OFF"; MANUAL EXAMS; TOOLS AVAILABLE; Cellebrite USB Camera; Fernico ZRT; Project-A-Phone; Eclipse Kit 3; SOFTWARE SOLUTIONS; ScreenHunter; Snagit; Other Options; CHAPTER SUMMARY POINTS; REFERENCES FOR MANUAL TOOLS; 4
- Mobile Extraction Issues; FLASH MEMORY.
- EMBEDDED MULTIMEDIA CARD, EMBEDDED MULTICHIP PACKAGE, AND MULTICHIP PACKAGETHE FUNCTION OF NAND; NAND Operation Rules; Wear Leveling and Garbage Collection; SQLite Databases; How Does All This Present Problems?; ENCODING; Binary; Binary to Decimal; Hexadecimal; American Standard Code for Information Exchange; Unicode; Big and Little Endian; Nibble Reversed; Seven-Bit Short Message Service Protocol Description Unit; EPOCHS; UNIX; Unix 48 bit; UNIX Decimal 10Byte; GPS; AOL; GSM; Decimal Format; 64bit; File Time Formatted; HTML; JAVA; MSDOS; Binary-Coded Decimal; ISO 8601; Bit Date; MAC Absolute.
- CELLEBRITE PHYSICAL ANALYZERProject Tree Example; Multimedia Message Service; USER-INSTALLED APPLICATIONS; USER-ENABLED SECURITY; BST; IP-Box and MFC Dongle; Advanced Nondestructive Exams-Joint Test Action Group; Destructive Exams; ADVANCED VALIDATION; Ultra Compare Professional; Chapter Summary; REFERENCES FOR LISTED TOOLS; 5
- Data Hiding; INTRODUCTION; WHAT IS STEGANOGRAPHY; HIDING DATA BEHIND DATA; STEGANALYSIS; Intercepted Steganography Files; Steganalysis Applications; How Much Information Can Be Hidden; STEGANOGRAPHY METHODS; Investigative Steps; RELEVANT CASES; SUMMARY; REFERENCES.
- 6
- Cryptography and Encryption.