Grover Kearns, PhD, CPA, CFE Class 11 1. Videos 2 How works Spoofing

Slides:



Advertisements
Similar presentations
Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
Advertisements

Guide to Computer Forensics and Investigations Fourth Edition
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Welcome to the Award Winning Easiest to Use & Most Advanced View, Manage, and Control Security, Access Control, Video, Energy & Lighting Systems, & Critical.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 13 Cell Phone and Mobile Devices Forensics.
ACN / TELUS Wireless Your Canadian Wireless Headquarters
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
MNO Cloud Use Case 3 Source: Rogers Wireless Contact: Ed O’Leary George Babut 3GPP/SA3-LI#43Tdoc SA3LI11_116.
COMPUTER CONCEPTS Computer Information Systems. COURSE COMPETENCIES Explain the functions of computer system components. Describe the information processing.
COS 413 Day 21. Agenda Assignment 6 is Due Lab 6 Corrected –1 A, 4 B’s, 1 C, 2 D’s and 1 non submit LAB 7 write-up not corrected –Missing two Assignment.
Senior Design Project 2004/2005 Web Enabled Calling Number Delivery Daniel St. Clair Barron Shurn Professor Soules 10/28/2004.
A smartphone from Apple that integrates cellphone, iPod, camera, text messaging, and Web browsing. Data and applications can be sent to the phone.
Onetouch Cloud Backup.
Chapter 30 Electronic Mail Representation & Transfer
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Advanced Techniques in Forensic Examination of Smartphones 2012 (C) Oxygen Software,
Backing up data By Alicia stewart.
4 Network Hardware & Software Network Operating systems: software controlling traffic on the network 2 types of s.ware: server software &client software.
Cell Phone Terminal. Setting up your cell phone How to do a transaction.
Unit 3: Hardware Components & Software Concepts
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Tracing Examples Computer Forensics Tracing Examples.
11:15:01 Storage device. Computer memory Primary storage 11:15:01.
Succeeding with Technology Overview of Digital Communications.
Guide to Computer Forensics and Investigations Fifth Edition
1 Outlook Lesson 1 Outlook Basics and Microsoft Office 2010 Introductory Pasewark & Pasewark.
Cyber Crimes.
Confidential - © 2012 StreamWIDE © StreamWIDE
Intro to Computer Networks Bob Bradley The University of Tennessee at Martin.
Review: –How do we address “a network end-point”? –What services are provided by the Internet? –What is the network logical topology observed by a network.
 Global System for Mobile Communications (GSM) is a second generation (2G) cellular standard developed to cater voice services and data delivery using.
1999 Asian Women's Network Training Workshop 1 Technical Terms We Can’t Avoid.
Technology Hardware Internet & WWW. Outline  Hardware  System Unit  CPU  Memory  Ports  Internet  Internet services  WWW  Types of Sites  E-Commerce.
Intro to Digital Technology HARDWARE CONCEPTS. IT-IDT-4 Identify, describe, evaluate, select, and use appropriate technology. IT-IDT-5 Understand, communicate,
LOGO Server. Contents Introduction 1 Problem Definition 2 Proposed Solution 3 Architecture Diagram 4 Server Technology 5 Hardware and Software.
INTRODUCTION TO OFFICE 365 How To Share and Organize All In One Secure Place Panagiota “Penny” Damianeas Assessment & Testing Specialist.
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
Guide to Computer Forensics and Investigations Third Edition Chapter 13 Cell Phone and Mobile Devices Forensics.
1 Electronic mail security Ola Flygt Växjö University, Sweden
Bring Your Own Cell Phone: Collaborative activities for the classroom Lin Muilenburg, Ph.D. St. Mary’s College of Maryland.
1 Chinese . 2 Introduction  Support SMTP/POP3/IMAP4  On Unix platform  Provide Webmail –Functions: On line registration On line sending and receiving.
Topic: MediaSMS Contact Backup File APPS About Speaker Name: Sorn Work: Buddhist Library Cambodia Project Org Web:
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
MODULE 3 Internet Basics © Paradigm Publishing, Inc.1.
SMARTPHONE FORENSICS 101 General Overview of Smartphone Investigations.
Technical Awareness on Analysis of Headers.
Guide to Computer Forensics and Investigations Fifth Edition
COMP 431 Internet Services & Protocols
Network Management of Wireless Network Gerald Methé Bell Mobility.
Mobile Phone Forensics Michael Jones. Overview Mobile phones in crime The mobile phone system Components of a mobile phone The challenge of forensics.
Mobile Device Collection More Than Just a Phone. More than just a phone… Cell phone Address book Planner & Organizer Messenger Photo & Video camera GPS.
Cell Phone Forensics Investigator - ICFECI
LOGO iPhone to Galaxy Note Transfer Transfer iPhone Data to Galaxy Note 3/Note 4/Note 5/Note Edge.
Start up: 1. Power off and insert a GSM card, power on and check the GSM signal on the LCD. 2. Use the LCD and keys on the module to check and set the.
10. Mobile Device Forensics Part 2. Topics Collecting and Handling Cell Phones as Evidence Cell Phone Forensic Tools GPS (Global Positioning System)
Guide to Computer Forensics and Investigations Fifth Edition
Facebook privacy policy
Computer Information Systems
Guide to Computer Forensics and Investigations Fourth Edition
Hardware Components & Software Concepts
Wireless Wide Area Networks 3G/4G - mobile phones.
Mobile Phone Technology
Wireless Wide Area Networks
Computing Essentials Module 1.
Security in mobile technologies
Computing Essentials Module 1.
Guide to Computer Forensics and Investigations Fourth Edition
Employee Self-Service (ESS) Portal
Current State of Security and Privacy
Computer Owners’ Forum
Presentation transcript:

Grover Kearns, PhD, CPA, CFE Class 11 1

Videos 2 How works Spoofing spoofing-101/science-technology/ SMTP Spoofing =related Tracing an

Reading Headers From > Sat Aug 17 16:00: Return-Path: > Received: from exanpcn4.arinc.com ([ ]) by mta009.verizon.net (InterMail vM ) with ESMTP id for >; Sat, 17 Aug :00: Received: from exanpcn2.arinc.com (unverified) by exanpcn4.arinc.com (Content Technologies SMTPRS 4.1.5) with ESMTP id for >; Sat, 17 Aug :02: Received: by exanpcn2.arinc.com with Internet Mail Service ( ) \tid ; Sat, 17 Aug :00: Message-ID: From: "Conner, Richard C. \\(RCONNER\\)" > To: "my-home-address" > Subject: Hello Date: Sat, 17 Aug :00: MIME-Version: 1.0 X-Mailer: Internet Mail Service ( ) Content-Type: text/plain 3

Not required by SMTP

From > Sat Aug 17 16:00: Return-Path: > Received: from exanpcn4.arinc.com ([ ]) by mta009.verizon.net (InterMail vM ) with ESMTP id for >; Sat, 17 Aug :00: Received: from exanpcn2.arinc.com (unverified) by exanpcn4.arinc.com (Content Technologies SMTPRS 4.1.5) with ESMTP id for >; Sat, 17 Aug :02: Received: by exanpcn2.arinc.com with Internet Mail Service ( ) \tid ; Sat, 17 Aug :00: Message-ID: From: "Conner, Richard C. \\(RCONNER\\)" > To: "my-home-address" > Subject: Hello Date: Sat, 17 Aug :00: MIME-Version: 1.0 X-Mailer: Internet Mail Service ( ) Content-Type: text/plain unique message ID

From > Sat Aug 17 16:00: Return-Path: > Received: from exanpcn4.arinc.com ([ ]) by mta009.verizon.net (InterMail vM ) with ESMTP id for >; Sat, 17 Aug :00: Received: from exanpcn2.arinc.com (unverified) by exanpcn4.arinc.com (Content Technologies SMTPRS 4.1.5) with ESMTP id for >; Sat, 17 Aug :02: Received: by exanpcn2.arinc.com with Internet Mail Service ( ) \tid ; Sat, 17 Aug :00: Message-ID: From: "Conner, Richard C. \\(RCONNER\\)" > To: "my-home-address" > Subject: Hello Date: Sat, 17 Aug :00: MIME-Version: 1.0 X-Mailer: Internet Mail Service ( ) Content-Type: text/plain

7

8 From > Sat Aug 17 16:00: Return-Path: > Received: from exanpcn4.arinc.com ([ ]) by mta009.verizon.net (InterMail vM ) with ESMTP id < CWZT20372.mta009. for >; Sat, 17 Aug :00: Received: from exanpcn2.arinc.com (unverified) by exanpcn4.arinc.com (Content Technologies SMTPRS 4.1.5) with ESMTP id for >; Sat, 17 Aug :02: Received: by exanpcn2.arinc.com with Internet Mail Service ( ) \tid ; Sat, 17 Aug :00: Message-ID: From: "Conner, Richard C. \\(RCONNER\\)" > To: "my-home-address" > Subject: Hello Date: Sat, 17 Aug :00: MIME-Version: 1.0 X-Mailer: Internet Mail Service ( ) Content-Type: text/plain

From > Sat Aug 17 16:00: Return-Path: > Received: from exanpcn4.arinc.com ([ ]) by mta009.verizon.net (InterMail vM ) with ESMTP id for >; Sat, 17 Aug :00: Received: from exanpcn2.arinc.com (unverified) by exanpcn4.arinc.com (Content Technologies SMTPRS 4.1.5) with ESMTP id for >; Sat, 17 Aug :02: Received: by exanpcn2.arinc.com with Internet Mail Service ( ) \tid ; Sat, 17 Aug :00: Message-ID: From: "Conner, Richard C. \\(RCONNER\\)" > To: "my-home-address" > Subject: Hello Date: Sat, 17 Aug :00: MIME-Version: 1.0 X-Mailer: Internet Mail Service ( ) Content-Type: text/plain 9

Another Example – Partial Header Delivered-To: Received: by with SMTP id n7cs40710pbq; … Return-Path: … Received: from [ ] by omp1017.mail.bf1.yahoo.com with NNFMP; 20 Jun … Received: (qmail invoked by uid 60001); 20 Jun :58: Message-ID: Received: from [ ] by web mail.bf1.yahoo.com via HTTP; Mon, 20 Jun :58:58 PDT X-Mailer: YahooMailClassic/ YahooMailWebService/ Date: Mon, 20 Jun :58: (PDT) From: Grover Kearns Subject: Be Alert To: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Now get to work!

Mobile Phone Forensics Unauthorized photos, videos, audio recording Digital fraud and data duplication Industrial espionage Acceptable use policy 12

Mobile Phone Forensics SIM Cards- Subscriber Identity Module SD Cards- Secure Digital 13

Mobile Phone Forensics International Mobile Subscriber Identity Integrated Circuit Card Identifier (ICC-ID) Authentication Key (K i ) Location Area Identity SMS Message / Contact s Stored Data on SIM Cards 14

Mobile Phone Forensics Stored Data on SD Cards Call logs Text Messages Electronic documents Phonebooks Videos Music Photos Calendar 15

Smart Phone Videos How to Save Data to a Phone's Micro SD Memory Card sd-memory-card.html SIM Card Reader spy.html?gclid=CIfqu8zqwqkCFYgW2god9AZacwhttp:// spy.html?gclid=CIfqu8zqwqkCFYgW2god9AZacw Hacking the iPhone 16

Problems with Mobile Forensics Lack of single standards How cell phones store messages Multitude of models Generations: analog, PCS, 3G, 4G, ???

Remote Phone Wipes 18 All smart phones can be “wiped” remotely. Check the web for instructions for each phone.

Securing Mobile Phones Securing the mobile phone is the first action Turning it off will lose RAM If on it can be wiped remotely Wrap multiple times in foil or Place in empty paint bucket

21

SIMCon Reads SIM files Analyzes file content Recovers deleted text messages Manages PIN codes Exports data to spreadsheet files 22

Comparing 3G to 4G 3G Average download speed is 1 to 100 Mbps Allowed and Internet access Allows apps with music downloads and video calling Applies to all smartphones 4G A set of standards that hasn't really been clearly defined Average download speeds are about twice as fast as 3G at 4-6 Mbps More apps, More secure

Digital Networks CDMA – Uses full radio frequency spectrum. Sprint and Verizon use this. GSM – Used by AT&T and T-Mobile and standard in Europe and Asia. You can switch your SIM card with GSM! OFDM – Probably will be the chosen technology for 4G.

Smart Phones Contain: RAM, ROM, microprocessor, radio module, hardware interfaces. Many have memory cards (SIM). Store system data in EEPROM. OS is stored in ROM.

26

28

29

30

31

Jailbreaking & Unlocking Unlocking allows owner to switch SIM cards Could void warranty Jailbreaking allows owner to add apps that are not supported by vendor Not illegal 32

Recovering Deleted Files QnZY&feature=related 33

Web Sites - Spoofing 101/science-technology/ Tracing an How to find IP address and shutdown network computer uE&feature=related Restoring deleted files elated

Web Sites – Mobile Phones SIM Card Reader spy.html?gclid=CIfqu8zqwqkCFYgW2god9AZacw Hacking iPhone How to Save Data to a Phone's Micro SD Memory Card micro-sd-memory-card.html