Bones & Bytes Digital Forensics Group C Summer Bridge 2015 FTK Imager Cookies Steganography.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Scott Peterson Trial By: Kearston Troutman. Background Scott Peterson was charged with the murder of his pregnant wife which happened between the December.
JOHN EDWARD ROBINSON NATALIE CARGILL “The Internet’s First Serial Killer”
THE “INNOCENCE PROJECT” By: Shayne Cahalan & Katelyn Lewis & Kori Forrest.
Casey Anthony “Tot Mom” “Baby Killer”
Computer Forensics By: Stephanie DeRoche Benjamin K. Ertley.
Erick Lee Pd.3.  Born in Florence County, South Carolina  Spent most of his childhood in reform school  As an adult he was 5’4”, which gave him his.
“The Green River Killer”.  Born February 18, 1949 in Salt Lake City, Utah.  Troubled home life.  Mother and Father would have violent fights all the.
 Born on March 19, 1986 in Warren Ohio  Youngest child of George and Cindy Anthony  Had one older brother named Lee Anthony  She had stopped attending.
Teaching Computer Forensics Using Student Developed Evidence Files Anna Carlin Cal Poly Pomona.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Security Security is critical in the storage and transmission of information loss of information can not only cause problems to the organisation but can.
DNA, crime and law enforcement Personal Genetics Education Project (pgEd) Harvard Medical School - Wu Laboratory
“The BTK Killer” By: Morgan Lang
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
What is Encryption? - The translation of data into a secret code - To read an encrypted file, you must have access to a secret key or password that enables.
Passwords, Encryption Forensic Tools
Image Source: thecomputerforensics.info.  DAY ONE (Monday) › Lecture and TWO activities  Activity One : Who are you?  Activity Two : Digital Forensic.
SUMMER BRIDGE PROGRAM DR. HWAJUNG LEE DR. ASHLEY PODHRADSKY Computer Forensics.
Notorious Criminal Case
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
Input devices Output devices Wired Methods Ethernet ADSL Fibre Optic.
Digital Signatures, Message Digest and Authentication Week-9.
Done by: Group 16 Ong Jie Hao(20) Lim Jingkai(15) Dickson Lim(14) Thio Teng Kiat(26)
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
Internet Safety Internet Safety LPM
The Death of Caylee Marie Anthony Presented by: Keyonia Moss.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Hacking, Data Recovery, and Digital Evidence DIGITAL FORENSICS.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CS/COE 1501 Recitation Extended Euclidean Algorithm + Digital Signatures.
Dennis Rader By John Darwin. The BTK Killer BTK stands for “Bind, Torture, Kill” Name was given to him by his own request Actual name- Dennis Rader Alias-
Tennessee Body Farm. For more than four decades, Bill Bass has been one of the top death experts in the United States. He's best known for developing.
DNA, crime and law enforcement Personal Genetics Education Project (pgEd) Harvard Medical School
Forensics 352 – O’Dette. Q1 - Who first reported Caylee missing? a) Her mother b) Her grandfather c) Her grandmother d) Her neighbor.
 5.1 Zero-Knowledge Proofs  5.2 Zero-Knowledge Proofs of Identity  5.3 Identity-Based Public-Key Cryptography  5.4 Oblivious Transfer  5.5 Oblivious.
By: Jeremy Henry. Road Map  What is a cybercrime?  Statistics.  Tools used by an investigator.  Techniques and procedures used.  Specific case.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Animation The rapid display of a sequence of images of 2-D or 3-D artwork/model positions, in order to create an illusion of movement.
Digital Forensics Ryan Lord. Road Map - What is Digital Forensics? - Types of computer crimes - Tools - Procedures - Cases - Problems.
DNA, crime and law enforcement Personal Genetics Education Project (pgEd) Harvard Medical School
Digital Forensics Anthony Lawrence. Overview Digital forensics is a branch of forensics focusing on investigating electronic devises. Important in for.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
Protecting Your Privacy Online
Computer Forensics (Digital Forensic)
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
Yang xinhai “Killing people is very usual, nothing special”
Investigations [ 10 week ] Investigations 2015 second semester.
Alejandro Avila - Sometimes referred to as “Alex” or “Alexander”
High School Grade Level – Lesson Plan on Sex-ting
Landmark Supreme Court Cases
Encryption, Cryptography, and Steganography:
By: Amber Shah & Andrea Cardenas
Digital Forensics Ryan Lord.
Tuesday April 17, 2018 (Discussion – Dennis Rader; Input to Output – How Does the Computer Work?)
The wrong choices Taking and sending the photo Lowri Resource 3g.
Casey Anthony Trail The Tell-Tale Heart. Summary of Casey Anthony Trail  Casey Anthony was charged with the murder of her 2 year old daughter in 2002.
Thursday April 19, 2018 (Discussion – Storing and Retrieving Data, Processing the Electronic Crime Scene)
Introduction to Forensic Science
Computer Security Chapter Two
I am a student. We are students. You are a student. You are students. He is a student. She is a student. It is a student. They are students.
15-5 Automated Fingerprint Identification System
Presentation transcript:

Bones & Bytes Digital Forensics Group C Summer Bridge 2015 FTK Imager Cookies Steganography

Day 1- Digital Forensic Cases  BTK Killer(Dennis Radar)- was a guy who killed ten people between 1974 and  BTK stands for Bind, Torture, Kill  The case went unsolved for 30 years  He sent a floppy disk to the local police with a deleted file, which showed that he killed the people  The investigators were able to recover the deleted file and proved it was him  He later confessed to killing the ten people & is now at the Kansas’s El Dorado Correctional Facility. His earliest possible release date is February 26, 2180.

Day 1 Continued- Digital Forensic Cases  Casey Anthony, 25 year old mother of a two year old daughter named Caylee Anthony.  Casey is charged with seven counts in her daughter's death, including first-degree murder. If convicted, she could face the death penalty.  Digital Forensics was used to recover Casey Anthony’s search history after she had deleted it (showing she searched how to make chloroform). Chemical testing the trunk of Casey’s car, carpet samples showed alarming amounts of chloroform and smelled strongly of human decay.  Casey was found not Guilty.

Day 2: Recovering deleted files  We began with studying the Origins of Forensic science along with Microscopy, Edgeoscopy, and Poreoscopy, which is when you take a fingerprint and determine who it is from. Also, we learned to recover deleted files using FTK Imager which told us nothing is ever really deleted from a computer.  We learned how to distinguish private from public law. We also learned what crimes can be committed on a computer and how perform professionally in criminal situations.

Day 2: Continued

Day 3 - Encrypt and Decrypt Through the use of infoencrypt.com we used a simple password to decrypt a message sent to us. Plaintext –Original Message Algorithm –Transformation Procedure Key –Variable used to scramble message Cipher text–Resulting garbled output Source

Day 3 Continued- Steganography  We used this concept by encrypting a message into an image, by using a program called Steganography (Version 1.2).  The encrypted message was then decrypted by another person using the same program.  Below is an example of our work: Before After

Day 3 Continued- Using Wireshark to Grab Passwords  We used Wireshark to extract plain-text data  Cookies  Passwords and usernames This is Wireshark grabbing all the plain-text data before filtering to HTTP Because this website doesn’t use encryption, we can use it to grab the username and password information. This is after we filtered to HTTP and then got the user ID and password from that website.

Day 4 - MISSING PERSON: Dr. Hwajung Lee  Dr. Lee has called our class upset because she is lost on campus  We can use the location service on her IPhone to determine where she is  She sent us this picture to help

Enabling Location Services Location Services Regex.info/exif.cgi

Jeffry’s Exif Viewer  Uses location services on a Smartphone to pinpoint your location  Gives info about the phone on which the picture was taken and where the picture was taken

We found her!  Dr. Lee is in Davis Hall in her classroom! We don’t know why she felt lost

DAY 5 RELATIONSHIPS: Summer Bridge has helped us meet new people and has given us the opportunity to fuse strong relationships. We met women from all over the nation and even another country that shared a common interest. These bonds will stick with each and every one of us even after this camp is over.