Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2007

[RSTDPub]

Australian Digital Forensics Conference

Articles 1 - 9 of 9

Full-Text Articles in Physical Sciences and Mathematics

An Approach In Identifying And Tracing Back Spoofed Ip Packets To Their Sources, Krishnun Sansurooah Mar 2007

An Approach In Identifying And Tracing Back Spoofed Ip Packets To Their Sources, Krishnun Sansurooah

Australian Digital Forensics Conference

With internet expanding in every aspect of businesses infrastructure, it becomes more and more important to make these businesses infrastructures safe and secure to the numerous attacks perpetrated on them conspicuously when it comes to denial of service (DoS) attacks. A Dos attack can be summarized as an effort carried out by either a person or a group of individual to suppress a particular outline service. This can hence be achieved by using and manipulating packets which are sent out using the IP protocol included into the IP address of the sending party. However, one of the major drawbacks is …


Mood 300 Iptv Decoder Forensics, An Hilven Mar 2007

Mood 300 Iptv Decoder Forensics, An Hilven

Australian Digital Forensics Conference

Since June 2005, viewers in Belgium can get access digital TV or IPTV available via ADSL through Belgacom, the largest telecommunications provider in the country. The decoders used to enjoy these services are the Mood 300 series from Tilgin (formerly i3 Micro Technology). As of the Mood 337, the decoders contain a hard disk to enable the viewer to record and pause TV programs. Although it is publicly known that the Mood’s hard disk is used to save recorded and paused TV programs, it was still unknown if it contains any data that could be of interest during a forensic …


Tracing Usb Device Artefacts On Windows Xp Operating System For Forensic Purpose, Victor Chileshe Luo Mar 2007

Tracing Usb Device Artefacts On Windows Xp Operating System For Forensic Purpose, Victor Chileshe Luo

Australian Digital Forensics Conference

On Windows systems several identifiers are created when a USB device is plugged into a universal serial bus. Some of these artefacts or identifiers are unique to the device and consistent across different Windows platforms as well as other operating systems such as Linux. Another key factor that makes these identifiers forensically important is the fact that they are traceable even after the system has been shut down. Hence they can be used in forensic investigations to identify specific devices that have been connected to the system in question


Introduction To Mobile Phone Flasher Devices And Considerations For Their Use In Mobile Phone Forensics, Marwan Al-Zarouni Mar 2007

Introduction To Mobile Phone Flasher Devices And Considerations For Their Use In Mobile Phone Forensics, Marwan Al-Zarouni

Australian Digital Forensics Conference

The paper gives an overview of mobile phone flasher devices and their use for servicing mobile phones, their illegitimate uses and their use in mobile phone forensics. It discusses the different varieties of flasher devices and the differences between them. It also discusses the shortcomings of conventional mobile forensics software and highlights the need for the use of flasher devices in mobile forensics to compensate for the shortcomings. The paper then discusses the issues with the use of flasher devices in mobile forensics and precautions and considerations of their use. The paper goes further to suggest means of testing the …


The Effectiveness Of Investigative Tools For Secure Digital (Sd) Memory Card Forensics, Haitham Al-Hajri, Patricia Williams Mar 2007

The Effectiveness Of Investigative Tools For Secure Digital (Sd) Memory Card Forensics, Haitham Al-Hajri, Patricia Williams

Australian Digital Forensics Conference

There are many freeware based tools that can be downloaded from the World Wide Web. This paper reports the retrieval results of using these tools on digital images which have been deleted from Secure Digital (SD) cards. Since SD cards and USB flash drives are considered solid state technology, the tools selected are specifically for solid state drives. This research helps classify the selection of the most effective freeware tools that could be used to recover lost or deleted images. Further, it includes some of the issues that would face forensic examiners undertaking such investigations. The tools were tested using …


An Overview And Examination Of Digital Pda Devices Under Forensics Toolkits, Krishnun Sansurooah Mar 2007

An Overview And Examination Of Digital Pda Devices Under Forensics Toolkits, Krishnun Sansurooah

Australian Digital Forensics Conference

Personal Digital Assistants most commonly known as PDAs are becoming more and more fashionable and affordable in the working environment. With the advent and rapidly increasing technology these handled devices are now targeted by a lot of person with criminal intentions. But unfortunately crime does not choose its technology and nowadays those ultra light handhelds are getting more and more involved in crimes. This therefore become an onerous task for the forensics examiners who needs the proper forensics tools to investigate the information held on these devices. The purpose of this report will browse the current forensics toolkits available and …


Forensic Analysis Avoidance Techniques Of Malware, Murray Brand Mar 2007

Forensic Analysis Avoidance Techniques Of Malware, Murray Brand

Australian Digital Forensics Conference

Anti-forensic techniques are increasingly being used by malware writers to avoid detection and analysis of their malicious code. Penalties for writing malware could include termination of employment, fines or even, imprisonment. Malware writers are motivated not to get caught and are actively using subversive techniques to avoid forensic analysis. Techniques employed include obfuscation, anti-disassembly, encrypted and compressed data, data destruction and anti-debugging. Automated detection and classification work is progressing in this field. This includes analysing statistical structures such as assembly instructions, system calls, system dependence graphs and classification through machine learning.


A Proof-Of-Concept Project For Utilizing U3 Technology In Incident Response, Marwan Al-Zarouni, Haitham Al-Hajri Mar 2007

A Proof-Of-Concept Project For Utilizing U3 Technology In Incident Response, Marwan Al-Zarouni, Haitham Al-Hajri

Australian Digital Forensics Conference

This paper discusses the importance of live forensics and the use of an automated USB based smart data gathering technology to be used in incident response. The paper introduces the technology and its application in incidence response as well as highlight how it works. It also explains the tools that it uses to gather the live data from target systems. The paper also highlights some of the advantages and disadvantages of the technology as will as its limitations. The paper concludes with mentioning the importance of testing the tool and ways it can be developed and taken further.


A Forensically Tested Tool For Identification Of Notebook Computers To Aid Recovery: Liars Phase I Proof Of Concept, Peter Hannay, Andrew Woodward, Nic Cope Mar 2007

A Forensically Tested Tool For Identification Of Notebook Computers To Aid Recovery: Liars Phase I Proof Of Concept, Peter Hannay, Andrew Woodward, Nic Cope

Australian Digital Forensics Conference

The LIARS tool was designed to enable identification, and potentially the return, to the rightful owner of stolen laptop or notebook computers. Many laptops are discovered by Police, but time constraints prevent recovered devices from being identified. This project has produced a proof of concept tool which can be used by virtually any police officer, or other investigator, which does not alter the hard drive in any fashion. The tool uses a modified version of the chntpw software, and is based on a forensically tested live Linux CD. The tool examines registry hives for known location of keys which may …