background preloader

D0CS_Forensic_Computing

Facebook Twitter

IT & Computer forensics beginner’s guide. Introduction Computer forensics is the practice of collecting, analysing and reporting on digital data in a way that is legally admissible.

IT & Computer forensics beginner’s guide

It can be used in the detection and prevention of crime and in any dispute where evidence is stored digitally. Computer forensics follows a similar process to other forensic disciplines, and faces similar issues. Contents. Evidencia Digital - Fiscalia Colombia. CO: Legalidad y Constutucionalidad de la Extracción y Fijación de la Evidencia Digital. ¿Quieres trabajar en informática forense?. Estos son los principales dominios de conocimiento. La informática forense es una de las disciplinas de la seguridad informática más en auge, más si cabe por el incremento de los delitos informáticos y el cibercrimen.

¿Quieres trabajar en informática forense?. Estos son los principales dominios de conocimiento.

Y como en casi todas las áreas de la seguridad informática, implica el tener conocimiento de una gran cantidad de dominios. Esta tarea es más complicada si cabe porque, en muchos casos, la informática forense se sale de lo puramente técnico y entra de lleno en temas legales, procedimentales y hasta de pura investigación criminal Lo que vamos a ver a continuación es una revisión somera lo que tendría que saber un buen experto en informática forense. Técnicas Anti-Forense. Forensics Wiki. CC2014 ACIS: Informática Forense en Colombia. Informática Forense Via @dragonjar Colombia #TICs. Andrés Velazquez - Crimenes Digitales. CPCO5 - Andres Velázquez - Computo Forense. Derecho InformAtico @alediaganet. MaTTica. The International Association of Computer Investigative Specialists. The Scientific Working Group on Digital Evidence (SWGDE) Canadian Society of Forensic Science - Home. Aafs.org. British Academy of Forensic Sciences - Welcome to the Frontpage!

The Society. Social Nerwork Forensics: Tapping the Data Pool of Social Networks. Forensic analysis of social networking applications on mobile devices. Social Networking Applications on Mobile Devices. Social Snapshots: Digital Forensics for Online Social Networks. Social Network Forensic Tools. Lessons learned writing digital forensics tools.

Facebook Forensics Paper Published - VXRL. #Facebook #Forensics. Forensics and Facebook: How Cernam Plans to Collect Social Network Evidence. There's been a bit of a firestorm lately over employers seeking Facebook passwords.

Forensics and Facebook: How Cernam Plans to Collect Social Network Evidence

Despite the outrage, employers occasionally have a legitimate need for access to documents in their employees' social network and online service accounts. Cernam, a company that specializes in digital investigations, is looking to help employers dive into employees accounts without abusing the privacy of employees. As I mentioned recently, I had a feeling there'd be a business in providing this sort of access to employee accounts. But I wasn't thinking along the lines of forensic searches. Karen Reilly, operations lead at Cernam, got in touch shortly after the story to say that the company is working on something similar to what I'd described, and what they call "Consent Based Capture.

" It's not enough, she says, to provide just screenshots and printouts of Web pages. How it Works The current offering they provide is called Capture & Preserve. Key Twitter and Facebook Metadata Fields Forensic Investigators Need to be Aware of. Authentication of social media evidence can present significant challenges when you collect by screen shots, printouts or raw html feeds from an archive tool.

Key Twitter and Facebook Metadata Fields Forensic Investigators Need to be Aware of

This is just one reason why social media data must be properly collected, preserved, searched and produced in a manner consistent with best practices. When social media is collected with a proper chain of custody and all associated metadata is preserved, authenticity can be much easier to establish. As an example, the following are key metadata fields for individual Twitter items that provide important information to establish authenticity of the tweet, if properly collected and preserved: Any one or combination of these fields can be key circumstantial data to authenticate a single or group of social media items. Facebook and Linkedin items have their own unique, but generally comparable. As mentioned earlier, you will not get all this key metadata from a printout, screen capture, or even most compliance archive tools. Computer Forensics - Intellectual Property - Cloud Computing.

Borrado Seguro. Devices being remotely wiped in police custody. 9 October 2014Last updated at 08:30 ET By Jane Wakefield Technology reporter The details about how mobiles were wiped are not clear All the data on some of the tablets and phones seized as evidence is being wiped out, remotely, while they are in police custody, the BBC has learned.

Devices being remotely wiped in police custody.

Cambridgeshire, Derbyshire, Nottingham and Durham police all told BBC News handsets had been remotely "wiped". And Dorset police said this had happened to six of the seized devices it had in custody, within one year. Evidencia Digital. Electronic Evidence and Computer Forensics. Validez y seguridad jurídica electrónica. Computer Forensic super timelines under Linux. Metodología para el Análisis Forense en Linux. Windows 8: Important Considerations for Computer Forensics and Electronic Discovery. Introduction Documents identified by computer forensic investigations in civil litigation typically require review and analysis by attorneys to determine if the uncovered evidence could support causes of action such as breach of contract, breach of fiduciary duty, misappropriation of trade secrets, tortious interference, or unfair competition.

Windows 8: Important Considerations for Computer Forensics and Electronic Discovery

In addition, bit-for-bit forensic imaging of workstations is also commonly used as an efficient method to quickly gather evidence for further disposition in general commercial litigation matters. For example, instead of relying upon individual custodians to self-select and copy their own files, forensic images of workstations can be accurately filtered down to exclude system files, which only a computer can understand, and identify files which humans do use such as Microsoft Word, Excel, PowerPoint, Adobe PDF files and email.

Testing 1. 2. 3. I created a single user account called “User” with a password of “password”. A. 4. A. 1. 2. Introducción a la informática forense en entornos Windows 1ª parte. Automatizando la extracción de evidencia forense en Windows via @dragonjar Colombia. Cuando se realiza un analisis forense, automatizar procesos es muy importante, ya que muchas veces nos encontramos en situaciones donde el tiempo es vital para una investigacion y tenemos una ventana muy pequeña para extraer toda la informacion necesaria para realizar nuestro analisis, si no tenemos nuestras herramientas “afiladas” posiblemente no alcancemos a pasar por esa pequeña ventana que nos han dado como plazo y nuestra investigacion no pueda ser levada a cabo o se realice con datos incompletos.

Automatizando la extracción de evidencia forense en Windows via @dragonjar Colombia.

Guía de toma de evidencias en entornos Windows. Práctico! #Windows #Forense. Retrieving Digital Evidence: Methods, Techniques and Issues. Especial seguridad - Computerworld Colombia. Blog @sansforensics. It's been a while since I've written about this topic, and in that time, there have been some useful security updates provided by Microsoft, as well as some troubling developments with Microsoft's Kerberos implementation.

Blog @sansforensics

In order to fully cover these topics, I'm going to split the discussion into two articles. This article will cover specific updates Microsoft has provided to help protect user credentials. I'll follow up next week to discuss the Kerberos issues in depth. As a quick reminder, the major takeaway from my previous articles on this subject are that we can successfully protect our privileged domain accounts by taking these 3 steps: Jornadas Nacionales de Seguridad Informática. Asobancaria Prevención Fraude V Congreso 2011 .pdf. En "Ciberseguridad" nada es seguro @cibercrimen. Forensics Computing-Technology to Combat Cybercrime. Framework para la Computacion Forense en Colombia. Análisis Forense Digital - Miguel López Delgado oas.org. Forensics vs. Anti-Forensics.

Best Practices forComputer Forensics - SWGDE. Introduction to Digital Forensics. Introduction to Digital Forensics A "short and sweet" introduction to the topic of Digital Forensics This book is a "short and sweet" introduction to the topic of Digital Forensics, covering theoretical, practical and legal aspects.

Introduction to Digital Forensics

The first part of the book focuses on the history of digital forensics as a discipline and discusses the traits and requirements needed to become an forensic analyst. The middle portion of the book constitutes a general guide to a digital forensic investigation, mostly focusing on computers. It finishes with a discussion of the legal aspects of digital forensics as well as some other observations for managers or other interested parties. Computer Forensics. Computer forensics analysis is not limited only to computer media Computer forensics (sometimes known as computer forensic science[1]) is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media.

Computer Forensics

The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information. Computer Forensics. Definition. Pdf. Digital Forensics. Aerial photo of FLETC, where US digital forensics standards were developed in the 1980s and '90s. Anti-forensic techniques - ForensicsWiki. Anti-forensic techniques try to frustrate forensic investigators and their techniques. This can include refusing to run when debugging mode is enabled, refusing to run when running inside of a virtual machine, or deliberately overwriting data.

Although some anti-forensic tools have legitimate purposes, such as overwriting sensitive data that shouldn't fall into the wrong hands, like any tool they can be abused. Overwriting Data and Metadata Secure Data Deletion Securely deleting data, so that it cannot be restored with forensic methods. Aplicación de un Sistema de Gestion de Vulnerabilidades. Recovering Digital Evidence in a Cloud Computing Paradigm.

Forensic Investigation in Cloud Computing Environment. Cloud Computing Reference Architecture and its Forensic Implications. Digital Forensics for IaaS Cloud Computing. Acquiring Forensic Evidence from Infrastructure-as-a-Service Cloud Computing. Metadata Based Forensic Analysis of Digital Information in the Web. Análisis Forense de metadatos: Ejemplos ejemplares. Uno de los capítulos del libro de Análisis Forense en Windows se centra en la evaluación y análisis de cada uno de los tipos de archivos que aparezcan en la franja temporal de interés en el caso.

Para ello, tras generar el Time-Line de documentos modificados, creados, borrados, impresos, etcétera, es necesario pararse a evaluar qué información puede extraerse de cada uno de ellos. Esa fue la motivación principal que nos llevó a crear MetaShield Forensics y generar un time-line dinámico generado sólo con los metadatos descubiertos en un fichero.

Ejemplo 1: Word bytes Tony Blair in the butt: Tony Blair presentó un documento y afirmó que no lo habían editado. La información de los metadatos demostró como personal de su equipo lo había copiado, editado, etcétera. Forensic Analysis of Packet Losses in Wireless Networks. Computer Forensic Analysis in Virtual Environment. The TCP/IP Guide. The TCP/IP Guide Welcome to the free online version of The TCP/IP Guide! My name is Charles and I am the author and publisher. I hope you will find the material here useful to you in your studies of computing, networking, and programming. Here are a few tips, links and reminders to help you out: Introduction: Newcomers to The TCP/IP Guide may wish to read the Introduction and Guide to the Guide, which will explain what the Guide is about and provide you with useful information about how to use it.

Last but definitely not least: this site is provided as an online reference resource for casual use. If you like The TCP/IP Guide enough to want your own copy in convenient PDF format, please license the full Guide. LEARN “HOW TO” – 101 BEST FORENSIC TUTORIALS. Dear Readers, Proudly and finally, we announce the release of the newest issue of eForensics Magazine Learn „How to” – 101 Best Forensics Tutorials so the best practical pill for everyone who’d like to become an expert in digital forensics field.

LEARN HOW TO DO IT! In front of you is more than 700 pages of practical tips and tutorials for everyone who’d like to dive into digital Forensics and learn the practical side of the field. How Law Enforcement Uses Social Media for Forensic Investigation. Todd Piett is the chief product officer at Rave Mobile Safety / Smart911.com. He writes about technology trends in public safety and enhanced 9-1-1. Todd is a board member of the NG9-1-1 Institute and is a member of APCO’s Emerging Technology Committee, in addition to holding numerous technology patents. We post eight years of video to YouTube every day. We send 200 million tweets per day.

And on average, 250 million photos are uploaded each day to Facebook. As social has moved into the mainstream, public safety has at times embraced it and at other times rejected it as a means of communication with citizens. Tools: Security - Forensics - Pentesting - Ethical Hacking. CybeerSecurlty. The Wild West of Social Media Evidence Collection.

Due to inconsistencies in format, data collection from social networking sites and Webmail requires careful attention and adaptability to ensure evidence integrity. When it comes to social media and Webmail in forensic collection, these two are a lawless bunch. Everyone—from kids to great-grandparents—seems to be using social media and Webmail on a daily basis. Take a look at these statistics: • 1 in 5 minutes online is spent on social networks1 • 6.6 hours a month are spent per user on Facebook2 • 400 million tweets are sent everyday3 • 72 hours of video are uploaded to YouTube every minute4 • 3 million blogs are started every month5 • 4.5 million photos are uploaded to Flickr every minute6 • There are: 3.1 billion e-mail accounts72.4 billion social networking accounts worldwide7901 million active users on Facebook8140 million active users on Twitter9161 million members on LinkedIn1064 million blogs on Tumblr1154 million WordPress sites12 What do we have the right to collect?