COMP2555 Autumn 2014: Instructor
COMP2555 Autumn 2014: Instructor
! GTA
COMP 2555: Principles of Computer Forensics
Autumn 2014 ! Thomas Hamill
http://www.cs.du.edu/2555
! Office Hours: SEC center in Academic Commons :: MR 4 – 6
PM
L1: Introduction
2 You Are Expected To Know…
3 Website
L1: Introduction
4 You Will Learn In This Course…
5 Reading Bits and Bytes
L1: Introduction
L1: Introduction
96 11 1E 9E D6 25 EF C2 2E AD 8B ED 62 4C 5E 94
5D 2A B9 7A D5 29 BE B8 2E 6D 97 DA 58 BB EC 72
2E DB 6B EB 2E B7 B8 F6 6A 0D 3B 8B A9 79 15 77 56
B2 AF 5D D3 CE D6 E6 7B AC 79 57 2C 9A 57 B6 EB
6 What is this?
7 What is this?
14:49:54.713335 IP (tos 0x0, ttl 51, id 43889, offset 0, flags [none], proto TCP (6),
length 60)
74.125.127.19.80 > 130.253.190.122.56223: Flags [S.], cksum 0x363e (correct), seq
3167645671, ack 949075526, win 5672, options [mss 1380,sackOK,TS val 1190383227 ecr
553564903,nop,wscale 6], length 0
0x0000: 4500 003c ab71 0000 3306 d142 4a7d 7f13 E..<.q..3..BJ}..
0x0010: 82fd be7a 0050 db9f bcce 6fe7 3891 be46 ...z.P....o.8..F
0x0020: a012 1628 363e 0000 0204 0564 0402 080a ...(6>.....d....
0x0030: 46f3 ce7b 20fe bae7 0103 0306 F..{........
14:49:54.713699 IP (tos 0x0, ttl 64, id 32705, offset 0, flags [DF], proto TCP (6), length
52, bad cksum 0 (->affa)!)
130.253.190.122.56223 > 74.125.127.19.80: Flags [.], cksum 0x7ae1 (correct), seq
L10: Analysis and Validation
949075526, ack 3167645672, win 65535, options [nop,nop,TS val 553564903 ecr 1190383227],
L1: Introduction
L1: Introduction
! Search warrants are needed
! Computer forensics ! You must know more than one computing platform
! Task of recovering data that users have hidden or deleted and ! Such as DOS, Windows 9x, Linux, Macintosh, and current
using it as evidence Windows platforms
! Evidence can be inculpatory (“incriminating”) or exculpatory
! Disaster recovery ! Computer Technology Investigators Network (CTIN)
! Uses computer forensics techniques to retrieve information ! Meets monthly to discuss problems that law enforcement and
their clients have lost corporations face
! Investigators often work as a team to make computers
and networks secure in an organization ! High Technology Crime Investigation Association
(HTCIA)
! Exchanges information about techniques related to computer
investigations and security
L1: Introduction
L1: Introduction
16 Acquiring Certification and Training
17 Certification and Training (contd.)
L1: Introduction
L1: Introduction
18 Certification and Training (contd.)
19 References
! Other training and certifications ! Ch 1,2,3,5: B. Nelson, A. Phillips and C. Steuart, Guide to
! High Technology Crime Investigation Association (HTCIA) Computer Forensics and Investigations. ISBN:
! SysAdmin, Audit, Network, Security (SANS) Institute 978-1-435-49883-9
! Computer Technology Investigators Network (CTIN)
! NewTechnologies, Inc. (NTI)
! Southeast Cybercrime Institute at Kennesaw State University
! Federal Law Enforcement Training Center (FLETC)
! National White Collar Crime Center (NW3C)
L1: Introduction
L1: Introduction