Chapter 24 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. Digital Evidence on Physical and Data-Link Layers.

Slides:



Advertisements
Similar presentations
Chapter 20 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. Forensic Examination of Mobile Devices (online only)
Advertisements

Chapter 22 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. Applying Forensic Science to Networks.
Chapter 17 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. Forensic Examination of Windows Systems.
Chapter 2 OSI Model and TCP/IP
Chapter 13 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.. Investigating Computer Intrusions.
Chapter 16 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. Applying Forensic Science to Computers.
Chapter 21 Network Basics for Digital Investigators ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.
Chapter 18 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. Forensic Examination of UNIX Systems.
Chapter 19 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. Forensic Examination of Macintosh Systems.
Chapter 15 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. Computer Basics for Digital Investigators.
©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.
Chapter 25 Digital Evidence at the Network and Transport Layers
Modeling Constraints with Parametrics
©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.
Copyright © 2016 Elsevier Inc. All rights reserved.
Chapter 01 Foundations of Digital Forensics
©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.
Chapter 41 Work-Related Musculo-Skeletal Disorders
©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.
Chapter 65 - The Hormonal Regulation of Calcium Metabolism
Copyright © 2012, Elsevier Inc. All rights Reserved.
Chapter 11.
©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2012, Elsevier Inc. All rights Reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2012, Elsevier Inc. All rights Reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Chapter 10.
Chapter 28 - Renal Hyperplasia and Hypertrophy
Copyright © 2012, Elsevier Inc. All rights Reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Modeling Cross-Cutting Relationships with Allocations
Portable Biotechnology
© 2012 Elsevier, Inc. All rights reserved.
Modeling Text-Based Requirements and their Relationship to Design
Modeling Functionality with Use Cases
Customizing SysML for Specific Domains
Copyright © 2012, Elsevier Inc. All rights Reserved.
Copyright © 2016 Elsevier Inc. All rights reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Chapter 12.
Chapter 6.
Chapter 6.
Copyright © 2012, Elsevier Inc. All rights Reserved.
© 2012 Elsevier, Inc. All rights reserved.
Chapter 103 Long-Term Care: The Global Impact
Chapter 01.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Modeling Message-Based Behavior with Interactions
Chapter 08.
Copyright © 2013 Elsevier Inc. All rights reserved.
Chapter 64 - Renal Calcium Metabolism
Copyright © 2013 Elsevier Inc. All rights reserved.
Chapter 57 - Renal Ammonium Ion Production and Excretion
© 2015 Elsevier, Inc. All rights reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2012, Elsevier Inc. All rights Reserved.
Chapter 15 Contraception
Copyright © 2013 Elsevier Inc. All rights reserved.
Chapter 15.
Chapter 20 Assisted Reproductive Technologies
Chapter 3.
© 2015 Elsevier, Inc. All rights reserved.
Presentation transcript:

Chapter 24 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. Digital Evidence on Physical and Data-Link Layers

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 24.1 Old Ethernet configuration (modern configurations are conceptually the same).

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 24.2 Computers on a 10BaseT network plugged into a hub.

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 24.3 Computer A sending data to computer Z.

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 24.4 Ethereal classification of NIC addresses.

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FFIGURE 24.5 Summary diagram of TCP/IP separated by OSI layer.

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 24.6 Computers connected at the physical level are vulnerable to eavesdropping.

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 24.7 Ethereal showing packet in “hotmail dmp” file containing the keyword “POST,” corresponding to the act of sending the message through Hotmail.

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 24.8 (A) Using the NetIntercept forensic view to examine network traffic and locate important items such as an “HTTP POST.” (B) Using NetIntercept to view the same packet as in Figure 24.7 containing the “POST” keyword.

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 24.9 NetWitness summary view of network traffic.

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE Hotmail Inbox recovered using Ethereal.

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE Hotmail Inbox extracted from a tcpdump file and displayed using NetIntercept.

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE MIME-encoded attachments containing data in a ZIP file extracted from a tcpdump file and displayed using NetIntercept.