Forensics Investigation Toolkit (FIT) Offline Raw Data Files Parsing and Reconstruction Tools (Windows) - 2010 Decision Group www.edecision4u.comwww.edecision4u.com.

Slides:



Advertisements
Similar presentations
Decision Group Forensics Investigation Toolkit (FIT) Layer 7 Content Reconstruction Tool.
Advertisements

Page 1 / 18 Internet Traffic Monitor IM Page 2 / 18 Outline Product Overview Product Features Product Application Web UI.
E-Detective Series of Products Presentation (2009) Decision Group
Network Forensic Investigations TRAINING. The Essential Need The knowledge of network packet analysis is important for Forensic Investigators and Lawful.
Lawful Interception & Packet Forensics Analysis System Casper Kan Chang Decision Group June 2010.
Wireless-Detective WLAN a/b/g/n Interception System Decision Group
DECISION-COMPUTER INTERNATIONAL CO., LTD E-Detective Series of Products Decision Computer Group of Company Website:
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Network Forensics and Lawful Interception Total Solutions Provider
DECISION GROUP The Pioneer of IT Forensics Taipei, Germany, Hong Kong, Singapore.
Origins of the Internet The Internet was started as a research project sponsored by the Advanced Research Projects Agency (ARPA) within the U.S. Dept.
Internet…issues Managing the Internet
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Application Layer. This graphic is taken from The Abdus Salam International Centre for Theoretical Physics.
Internet & Day 2. Web Address/ URL 1.Uniform Resource Locator or web address use to access the web site 2.When you connected to the internet you.
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
Internet.
Forensic and Investigative Accounting
Computer Concepts 2014 Chapter 7 The Web and .
The Internet, World Wide Web, and Computer Communication.
Cyber Crime & Investigation IT Security Consultant
Surveillance Equipment For Internet Activities It is a Internet activities surveillance equipment designed for sniffer package from networking, converter.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Lawful Interception & Packet Forensics Analysis System for Telecom and ISP Special promotion:- EDDC : Off-line Packet Reconstruction & Network Forensics.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Discovering Computers 2010 Chapter 2 The Internet and World Wide Web.
Introduction to Computers Section 8A. home How the Internet Works Anyone with access to the Internet can exchange text, data files, and programs with.
Instant Messaging Alan Parker Robert Callow Brian Kearney Fortunato Macari Daniel Harrington Chang Gong Wang.
How did the internet develop?. What is Internet? The internet is a network of computers linking many different types of computers all over the world.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
CS101 Introduction to Computing Lecture 7 Internet Services.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
1 and Internet Evidence Mark Pollitt Associate Professor, Engineering Technology.
An Overview of the Internet: The Internet: Then and Now How the Internet Works Major Features of the Internet.
Decision Group Inc. E-DETECTIVE Decision Group Inc.
E-Detective HTTPS/SSL Interception – MITM & Proxy Decision Group
The SAIC Operation 54 Network and the Internet. Overview The purpose of this brown bag training session is to provide you with an introduction to the.
E-Detective Decoding Centre (EDDC) Offline Decoding & Reconstruction Solution Decision Group
Instrument for Business, Police, Military, Forensics and Information Investigation Wiretap Technology Revolution!!!
Kuliah Pengantar Teknologi Informasi Coky Fauzi Alfi cokyfauzialfi.wordpress.com Internet (2)
E-Detective Ethernet LAN Interception System (with Real-Time Content Reconstruction) Decision Group
LO1 Know types of Network Systems and Protocols. Application Layer Protocols.
E-Detective Network Investigation Toolkit - NIT (2010) Decision Group
DECISION Group Inc.. Decision Group Monitoring Center Solution on Internet Access for LEA or Intelligence.
and Internet Explorer.  The transmission of messages and files via a computer network  Messages can consist of simple text or can contain attachments,
Chapter 9 Sending and Attachments. Sending and Attachments FAQs: – How does work? – How do I use local ? – How do I use Web-based.
COM: 111 Introduction to Computer Applications Department of Information & Communication Technology Panayiotis Christodoulou.
E-Detective VoIP Detective – VoIP Interception (2010) Decision Group
Basic Internet Skills. What is the internet? A large group of computers connected to one another Its purpose is to send information back and forth to.
Xplico: concept, features and demo.
BASIC CONCEPTS ON INTERNET &
Methods to overcome corporate firewall restrictions
Introduction to Computers
Some bits on how it works
Networking for Home and Small Businesses – Chapter 6
Working at a Small-to-Medium Business or ISP – Chapter 7
الوحدة 5 مقدمة في شبكة الانترنت.
Direct Internet 3 Iridium Proprietary and Confidential 9/18/2018.
CompTIA Server+ Certification (Exam SK0-004)
Networking for Home and Small Businesses – Chapter 6
Working at a Small-to-Medium Business or ISP – Chapter 7
Internet.
Created by Kęstutis Stankevičius II-06/3 2006/10/24
Working at a Small-to-Medium Business or ISP – Chapter 7
E-Detective System Backup Server July 2010
Unit# 5: Internet and Worldwide Web
Network Forensic Investigations
Protocols 2 Key Revision Points.
Networking for Home and Small Businesses – Chapter 6
The Internet and Electronic mail
Presentation transcript:

Forensics Investigation Toolkit (FIT) Offline Raw Data Files Parsing and Reconstruction Tools (Windows) Decision Group and

Introduction to Forensics Investigation Toolkit Offline Raw Data Files (PCAP) Decoding and Reconstruction Tool Solution for:  Internet or Network Traffic Content Analysis (Network Administrator)  Auditing of Internet or Network Traffics (Network Administrator)  Network Forensics Analysis and Investigation (Government and LEA) Forensics Investigation Toolkit (FIT) is a Windows based Application Software suitable for all group of users to analyze and forensically investigate on the content of Internet/network raw data files captured. Internet Content Analysis and Reconstruction Compatible with: Academic Version also Available

Forensics Investigation Toolkit Application

IM/Chat (Yahoo, MSN, ICQ, QQ, IRC, Google Talk Etc.) Webmail HTTP (Link, Content, Upload Download, Video FLV) File Transfer FTP, P2P Others Online Games Telnet, VoIP etc. FIT Internet Protocols Supported

Sample: (POP3, SMTP and IMAP)

Sample: Webmail – Yahoo Mail, Gmail, Hotmail etc…

Sample: IM -Yahoo, MSN, ICQ, IRC, QQ, GTalk etc…

Sample: File Transfer – FTP Upload/Download

Sample: File Transfer – P2P File Sharing

Sample: HTTP (Content)

Sample: HTTP Upload/Download

Sample: HTTP Video Streaming (FLV Format)

Sample: HTTP Request

Free Text Search – Content Search Free Text Search – Search by Key Words

References – Implementation Sites and Customers  Criminal Investigation Bureau  The Bureau of Investigation Ministry of Justice  National Security Agency (Bureau) in various countries  Intelligence Agency in various countries  Ministry of Defense in various countries  Counter/Anti Terrorism Department  National Police, Royal Police in various countries  Government Ministries in various countries  Federal Investigation Bureau in various countries  Telco/Internet Service Provider in various countries  Banking and Finance organizations in various countries  Others Notes: Due to confidentiality of this information, the exact name and countries of the various organizations cannot be revealed.

Presented by Frankie Chan Decision Group &