eForensics_Open_02_2013(1).pdf
(
13095 KB
)
Pobierz
OPEN
VOl. 1 NO. 2
A Practical Approach
To Malware Memory Forensics
DIGITAL FORENSICS 101: CASE STuDy uSING FTK IMAGER
FORENSICS ANALySIS WITH FTK: A CASE STuDy SCENARIO
MEMORy ANALySIS uSING DuMPIT AND VOLATILITy
STEP By STEP ANALySIS OF FACEBOOK
AND TWITTER DATA ON ANDROID DEVICES
POTENTIAL IDENTITy THEFT OVER APPLE’S IOS DEVICES
TALKING ABOuT TECHNO LAW
– INTERVIEW WITH BENJAMIN WRIGHT
LET’S TALK ABOuT SECuRITy
Issue 2/2013 (2) May
www.InfoSecSkills.com
LEAD
PRACTITIONER
Allow
us to
guide
your
CAREER
SENIOR
PRACTITIONER
2013 PUBLIC COURSE SCHEDULE
CISMP
Mar 18-22, Apr 22-26, May 13-17, Jun 10-14,
Jul 8-12, Sep 30 - Oct 4, Oct 14-18, Nov 18-22
PRACTITIONER
PCiBCM
Mar 18-22, Apr 8-12, Apr 22-26, Jun 10-14, Jul 8-12,
Aug 5-9, Sep 16 -20, Oct 14-18, N
Aug 5-9, Sep 16 -20, Oct 14-18, Nov 11-15, Dec 9-13
PCiIRM
Apr 22-26, May 6-10, May 20-24, Jun 3-7, Jun 17-21,
Jul 8-12, Jul 22-26, Aug 5-9, Oct 7-11, Oct 21-25, Nov 4-8,
Nov 18-22, Dec 2-6, Dec 16-20
If you are interested in learning more, get in touch:
contact@infosecskills.com.
Dear Readers!
W
e would like to present the latest issue of eForensics Open,featuring
articles written by digital forensics specialists and enthusiasts, experts
in Mobile, Computer, Network and Database Forensics covering all aspects of
electronic forensics, from theory to practice.
For those who already know us it’s the best practical pill consisted of great
articles from our last three issues, for new readers – we hope, a valuable in-
vitation to join our experts community. Taking advantage of this publication,
we would like to present the subjects we were covering in our last few issue,
to give you a chance to see who we are not only through the teasers. We also
would like inform you that we are on the right track and, starting this month,
you can expect 3 issues monthly from eForensics Magazine. We’re giving you
the best, checked, professional, exciting content endorsed by market-leading
companies! No mediocre, half-baked articles! At least not here!
We would also like to thank you for all your feedback and support and invite
you to follow us on Twitter and Facebook, where you can find the latest news
about our magazine and great contests. Do you like our magazine? Like it,
share it! We appreciate your every comment as for us eForensics means you
and your needs, and we are here for our readers. We would be more than
pleased if you could let us know what your expectations towards the maga-
zine are? Which topics are you most interested in? I repeat it everytime but it
is You who shape eForensics!
TEAM
Editors:
Joanna Kretowicz
jaonna.kretowicz@eforensicsmag.com
Betatesters/Proofreaders:
Roxana Grubbs, Kishore P.V, Vaman Amarjeet, Mada R
Perdhana, Olivier Calef, Jef Weaver, Massa Danilo,
Craig Mayer, Andrew J Levandoski, Richard Leitz, Lee
Vigue, Elba Stevenson, Shirish Deshpande, Jan-Tilo
Kirchhof, Owain Williams, Dan Dieterle, Sailaja Aduri,
Jonathan Ringler, Shayan Eskandari, Craig Mayer, Larry
Smith
Senior Consultant/Publisher:
Paweł Marciniak
Enjoy!
CEO:
Ewa Dudzic
ewa.dudzic@software.com.pl
Joanna Kretowicz
& eForensics Magazine team
Art Director:
Ireneusz Pogroszewski
ireneusz.pogroszewski@software.com.pl
DTP:
Ireneusz Pogroszewski
Production Director:
Andrzej Kuca
andrzej.kuca@software.com.pl
Marketing Director:
Joanna Kretowicz
jaonna.kretowicz@eforensicsmag.com
Publisher:
Hakin9 Media Sp. z o.o. SK
02-682 Warszawa, ul. Bokserska 1
Phone: 1 917 338 3631
www.eforensicsmag.com
DISClAIMER!
The techniques described in our articles may only be
used in private, local networks. The editors hold no
responsibility for misuse of the presented techniques or
consequent data loss.
4
contents
06
DIGITAl FORENSICS 101: CASE STuDy uSING FTK IMAGER
by Dauda Sule
14
FORENSICS ANAlySIS WITH FTK: A CASE STuDy
SCENARIO
by Omar Al Ibrahim and Majid Malaika
24
INTERVIEW OF CyBER lAWyER FERNANDO M.
PINGuEllO
by Joanna Kretowicz
28
MEMORy ANAlySIS uSING DuMPIT AND VOlATIlITy
by Daniel Dieterle
34
A PRACTICAl APPROACH TO MAlWARE MEMORy
FORENSICS
by Monnappa K A
38
STEP By STEP ANAlySIS OF FACEBOOK AND TWITTER
DATA ON ANDROID DEVICES
by Massimo Barone
42
POTENTIAl IDENTITy THEFT OVER APPlE’S IOS
DEVICES
by Shaikh Javed Hasan Nisar Ahmed
50
TAlKING ABOuT TECHNO lAW – INTERVIEW WITH
BENJAMIN WRIGHT
by Vaman Amarjeet
54
SuCCESSFul PRACTICES FOR BRING yOuR OWN
DEVICE (ByOD), DATA PROTECTION AND yOuR
ORGANIzATION. INTERVIEW: ElIzABETH ROGERS
Marcus Evans
56
lET’S TAlK ABOuT SECuRITy – INTERVIEWS WITH
NETWORK SECuRITy SPEAKERS
www.eForensicsMag.com
5
Plik z chomika:
TirNaNog
Inne pliki z tego folderu:
eForensics_Open_02_2013(1).pdf
(13095 KB)
eForensics_Open_02_2013.pdf
(13095 KB)
eForOpen_2013-01.pdf
(8381 KB)
Inne foldery tego chomika:
Zgłoś jeśli
naruszono regulamin