Online Library TheLib.net » Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis
cover of the book Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis

Ebook: Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis

00
06.02.2024
1
0
Front Cover -- Hiding Behind the Keyboard -- Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis -- Copyright -- Contents -- Foreword -- INTRODUCTION -- Introduction -- WHAT THIS BOOK IS AND IS NOT -- THE INTENDED AUDIENCE -- Duration of Relevance for This Guide -- SUMMARY -- About the Authors -- BRETT SHAVERS -- JOHN BAIR -- Acknowledgments -- 1 -- Laying the Foundation of Covert Communications -- INTRODUCTION -- A BRIEF HISTORY OF COVERT COMMUNICATION -- COVERT COMMUNICATION OVERLOAD -- Investigative Goals -- COVERT COMMUNICATION GOALS -- SUMMARY -- REFERENCES -- 2 -- The Tor Browser -- INTRODUCTION -- HISTORY AND INTENDED USE OF THE ONION ROUTER -- Two Ways of Looking at The Onion Router -- HOW THE ONION ROUTER WORKS -- A Few Important Points About Tor -- From a Tor User's Perspective -- So What's the Big Deal? -- From Your Perspective -- FORENSIC ANALYSIS OF THE ONION ROUTER -- TRACKING CRIMINALS USING TOR -- USED IN COMBINATION OF OTHER TOOLS AND METHODS -- TAILS -- RELATED TOR TOOLS AND APPLICATIONS -- Hidden Services -- SUMMARY -- REFERENCES -- 3 -- Triaging Mobile Evidence -- LOGICAL DATA -- PHYSICAL DATA -- EXAMPLES OF LOGICAL AND PHYSICAL DATA -- WIRELESS CARRIERS -- MOBILE NETWORK OPERATORS -- MOBILE VIRTUAL NETWORK OPERATOR -- DETERMINING TARGET NUMBER -- FONEFINDER.NET -- NUMBER PORTABILITY ADMINISTRATION CENTER -- SEARCH.ORG -- SUBSCRIBER IDENTITY MODULE -- INTERNAL HARDWARE OF A SIM -- THE SIM FILE SYSTEM -- SIM SIZES AND EVOLUTION -- TYPICAL EVIDENCE -- SIM SECURITY-PIN AND PUK -- TRIAGING DEVICES -- DEVICES POWERED "ON" -- DEVICES LOCATED "OFF" -- MANUAL EXAMS -- TOOLS AVAILABLE -- Cellebrite USB Camera -- Fernico ZRT -- Project-A-Phone -- Eclipse Kit 3 -- SOFTWARE SOLUTIONS -- ScreenHunter -- Snagit -- Other Options -- CHAPTER SUMMARY POINTS -- REFERENCES FOR MANUAL TOOLS.
Download the book Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis for free or read online
Read Download

Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen