E-Detective Decoding Centre (EDDC) Offline Decoding & Reconstruction Solution Decision Group www.edecision4u.com.

Slides:



Advertisements
Similar presentations
Decision Group Forensics Investigation Toolkit (FIT) Layer 7 Content Reconstruction Tool.
Advertisements

Surrey Libraries Computer Learning Centres January 2012 Internet Searching Teaching Script Totally New to Computers Internet Searching.
Page 1 / 18 Internet Traffic Monitor IM Page 2 / 18 Outline Product Overview Product Features Product Application Web UI.
E-Detective Series of Products Presentation (2009) Decision Group
Lawful Interception & Packet Forensics Analysis System Casper Kan Chang Decision Group June 2010.
Wireless-Detective WLAN a/b/g/n Interception System Decision Group
DECISION-COMPUTER INTERNATIONAL CO., LTD E-Detective Series of Products Decision Computer Group of Company Website:
Network Forensics and Lawful Interception Total Solutions Provider
 Html is made up of tags. The majority of them will be in pairs.  Some of the most common tags are shown below. TagsWhat does this mean? Bold Italic.
DECISION GROUP The Pioneer of IT Forensics Taipei, Germany, Hong Kong, Singapore.
Internet…issues Managing the Internet
Nasca Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.
The Internet. What is the Internet? A community with about 100 million users Available in almost every country about 160,000 people are added each month.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Internet Basics مهندس / محمد العنزي
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
Business Computing 550 Lesson 4. Fundamentals of Information Systems, Fifth Edition Chapter 4 Telecommunications, the Internet, Intranets, and Extranets.
Internet.
Forensic and Investigative Accounting
? INTERNET WHAT, WHY, HOW. DEFINITION The Internet is a massive public spiderweb of computer connections. It connects personal computers, laptops, tablets,
The Internet Present By Tianyi Xiao ID : C  The Internet is a global system of interconnected computer networks that use the standard Internet.
The Internet, World Wide Web, and Computer Communication.
Cyber Crime & Investigation IT Security Consultant
Network Services 's DoD-ARPA creates an experimental network – ARPANET – as a test-bed for emerging networking technologies ARPANET originally.
Surveillance Equipment For Internet Activities It is a Internet activities surveillance equipment designed for sniffer package from networking, converter.
Syllabus outcomes Describes and applies problem-solving processes when creating solutions Designs, produces and evaluates appropriate solutions.
Exchanging information. Communication services Voice phones SMS (short messaging service) – more commonly known as texting Fax Instant messaging – real.
Lawful Interception & Packet Forensics Analysis System for Telecom and ISP Special promotion:- EDDC : Off-line Packet Reconstruction & Network Forensics.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
How did the internet develop?. What is Internet? The internet is a network of computers linking many different types of computers all over the world.
Network Services Networking for Home & Small Business.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
CS101 Introduction to Computing Lecture 7 Internet Services.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
1 and Internet Evidence Mark Pollitt Associate Professor, Engineering Technology.
Decision Group Inc. E-DETECTIVE Decision Group Inc.
E-Detective HTTPS/SSL Interception – MITM & Proxy Decision Group
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
Instrument for Business, Police, Military, Forensics and Information Investigation Wiretap Technology Revolution!!!
Kuliah Pengantar Teknologi Informasi Coky Fauzi Alfi cokyfauzialfi.wordpress.com Internet (2)
E-Detective Ethernet LAN Interception System (with Real-Time Content Reconstruction) Decision Group
Ethical Hacking: Hacking GMail. Teaching Hacking.
E-Detective Network Investigation Toolkit - NIT (2010) Decision Group
DECISION Group Inc.. Decision Group Monitoring Center Solution on Internet Access for LEA or Intelligence.
Application of the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
and Internet Explorer.  The transmission of messages and files via a computer network  Messages can consist of simple text or can contain attachments,
COM: 111 Introduction to Computer Applications Department of Information & Communication Technology Panayiotis Christodoulou.
E-Detective VoIP Detective – VoIP Interception (2010) Decision Group
Forensics Investigation Toolkit (FIT) Offline Raw Data Files Parsing and Reconstruction Tools (Windows) Decision Group
Basic Internet Skills. What is the internet? A large group of computers connected to one another Its purpose is to send information back and forth to.
Xplico: concept, features and demo.
McGraw-Hill Technology Education
Introduction to Computers
Networking for Home and Small Businesses – Chapter 6
Working at a Small-to-Medium Business or ISP – Chapter 7
CompTIA Server+ Certification (Exam SK0-004)
Networking for Home and Small Businesses – Chapter 6
Working at a Small-to-Medium Business or ISP – Chapter 7
Internet.
The Internet and the World Wide Web
Working at a Small-to-Medium Business or ISP – Chapter 7
E-Detective System Backup Server July 2010
Unit# 5: Internet and Worldwide Web
Networking for Home and Small Businesses – Chapter 6
Protocol Application TCP/IP Layer Model
Presentation transcript:

E-Detective Decoding Centre (EDDC) Offline Decoding & Reconstruction Solution Decision Group

2 EDDC Application Diagram (1)

EDDC Application Diagram (2) Offline Raw Data Decoding and Reconstruction system. Comes with User and Case Management functions. Investigator 1 Case 1 Investigator 2 Case 2 Case 1 Results Case 2 Results Collect, Import Raw Data For Case 1 Case 1 Case 2Collect, Import Raw Data For Case 2 Reconstruct various Internet Protocols

EDDC Home Page Dashboard Reports Top-Down View Report

IM/Chat (Yahoo, MSN, ICQ, QQ, IRC, Google Talk Etc.) Webmail HTTP (Link, Content, Reconstruct, Upload Download) File Transfer FTP, P2P Others Online Games Telnet etc. Internet Protocols Supported Support more than 140 protocols

Sample Reconstruction: (POP3)

Sample Reconstruction: (SMTP) Company Logo

Sample Reconstruction: Webmail (Read) Supports various Webmail Type such as Yahoo Mail, Gmail, Hotmail etc.

Sample Reconstruction: Webmail (Sent)

Sample Reconstruction: IM – MSN

Sample Reconstruction: IM - YAHOO

Sample Reconstruction: IM - QQ QQ messages are encrypted. QQ cracking tool is provided.

Sample Reconstruction: File Transfer (FTP)

Sample : File Transfer (P2P File Sharing Log) Bittorent, eMule/eDonkey, FastTrack, Gnutella

Sample : HTTP Web Link Content Reconstruct Company Logo

Sample : HTTP (Download/Upload)

Sample: HTTP Video Streaming (FLV) Youtube, Google Video, Metacafe etc.

Sample: Telnet (with play back)

Sample: VoIP Reconstruction (Playback) Codecs: G.711a-law G.711µ-law G.729 ILBC

Sample: HTTPS/SSL Decryption SSL Private Key must be known

EDDC User Management Admin create multiple users that can have access to authority to use this system.

EDDC Case Management User can create own case based on their authority assigned by Administrator.

Import Analysis (Manual Import Raw Data) User import raw data files to be parsed and analyzed (reconstructed)

Reconstructed Data Export/Backup

Sniffer Mode (Raw Data Retention) System can be connected to the network. Raw data can be captured and reserved through mirror mode. Only when administrator require to see the content of traffic at specific period (date-time), these raw data files can be imported, parsed and analyzed.

References – Implementation Sites and Customers  Criminal Investigation Bureau  The Bureau of Investigation Ministry of Justice  National Security Agency (Bureau) in various countries  Intelligence Agency in various countries  Ministry of Defense in various countries  Counter/Anti Terrorism Department  National Police, Royal Police in various countries  Government Ministries in various countries  Federal Investigation Bureau in various countries  Telco/Internet Service Provider in various countries  Banking and Finance organizations in various countries  Others Notes: Due to confidentiality of this information, the exact name and countries of the various organizations cannot be revealed.

Decision Group