Computer and Cyber Forensics Resources

 

NOTE: This resource page currently under construction 12-Aug-2018

 

These Web-based resources are provided as value-added for my students.  The resources have been compiled by Dr. Gerry Santoro, often with student assistance.  The resources are optional.  You are welcome to share this page.

 

These resources have been organized into the topics associated with CAP2140 at State College of Florida.

 

An excellent source of information is the SANS Information Security Reading Room.  Some of the papers are listed in the topics below.

 

 

US Government Resources

 

NOTE: Some of these, such as NIST documents, may be listed below in topical areas.

 

·        NSA Information Assurance advice and resources - http://www.nsa.gov/ia/mitigation_guidance/index.shtml

·        US Computer Emergency Readiness Team -- http://www.us-cert.gov/

·        Complete list of NIST Information Security Publications -- http://csrc.nist.gov/publications/PubsTC.html

·        NICCS – National Initiative for Cybersecurity Careers and Studies - http://niccs.us-cert.gov/

 

Hacking Educational Resources

 

Security professionals must understand how systems are attacked and compromised in order to effectively protect those systems.  Following is a list of Web sites that provide learning resources for ethical hacking.

 

·        Hack This Site - https://www.hackthissite.org/

·        Hack This! - https://www.hackthis.co.uk/

·        Hack in the Box - http://www.hitb.org/

·        Hack a Day - http://hackaday.com/

·        Evil Zone - https://evilzone.org/

 

 

Blogs and Newsletters

 

·       Bruce Schneier Crypt-O-Gram -- http://www.schneier.com/crypto-gram.html

·       Secure State Blog -- http://blog.securestate.com/

·       Krebs on Security -- http://krebsonsecurity.com/

Misc Software

·        USB Safeguard – software to encrypt a USB flash (pen) drive (proprietary)

·        Ophcrack – open source password cracking software

·        AccessData Forensics Toolkit 5 – proprietary, multi-function forensics toolkit

·        NirSoft – collection of proprietary and free system tools

·        SpyHunter – program for detection of steganographic content

·        Hiderman – program for creating steganographic content

·        WinHex – proprietary Hex editor with many features

·        Autopsy – open-source graphical interface to SleuthKit forensics toolkit

·        Puppy Linux – free, small version of Linux

 

Topic 1 - Computer Forensics and Investigation Processes

 

 

·        *** Carrie Morgan Whitcomb, “An Historical Perspective of Digital Evidence: A Forensic Scientist’s ViewInternational Journal of Digital Evidence, Vol. 1, No. 1, 2002.

·        *** Gary Palmer, “A Road Map for Digital Forensic ResearchReport of the First Digital Forensic Research Workshop (DFRWS), November 6, 2001.

·        Adventures in Computer Forensics  (SANS InfoSec Reading Room)

·        Fourth Amendment to the United States Constitution:

http://en.wikipedia.org/wiki/Fourth_Amendment_to_the_United_States_Constitution

·        Disaster Recovery:

http://en.wikipedia.org/wiki/Disaster_recovery

·        Macintosh SE:

http://en.wikipedia.org/wiki/Macintosh_SE

·        General Affidavits:

www.ilrg.com/forms/affidavt.html

·        *** Brian Carrier and Eugene H. Spafford, “Getting Physical with Digital Investigation ProcessInternational Journal of Digital Evidence, Vol. 2, No. 2, 2003.

·        *** Hamour and Al qarout, “A Ten Step Process for Forensic ReadinessNYIT.

·        Corporate Incident Handling Guidelines (SANS InfoSec Reading Room)

·        Creating and Maintaining Policies for Working with Law Enforcement  (SANS InfoSec Reading Room)

www.csoonline.com/read/120105/ht_custody.html

·        What is attorney client privilege?:

http://co.essortment.com/attorneyclient_ritc.htm

 

 

 

 

Topic 2 – Investigator’s office and laboratory

 

 

·        *** U.S. Department of Justice, “Electronic Crime Scene Investigation: A Guide for First Responders,” Office of Justice Programs, U.S. Department of Justice, National Institute of Justice, July 2001. http://www.ojp.usdoj.gov/nij

·        *** SANS Institute “Building a Low Cost Forensics Workstation”

·        Developing a Computer Forensics Team  (SANS InfoSec Reading Room)

·        Implementing a Computer Incident Response Team in a Smaller, Limited Resource Organizational Setting  (SANS InfoSec Reading Room)

·        Creating and Managing an Incident Response Team for a Large Company  (SANS InfoSec Reading Room)

·        Video: PALADIN – IT Forensic Mobile Lab on Wheels (YOUTUBE)

 

Topic 3 - Data Acquisition

 

 

·        *** NIST CFTT, “Testing Disk Imaging Tools ,” International Journal of Digital Evidence, V1, Issue 4, Winter 2003

·        Pros and Cons of using Linux and Windows Live CDs in Incident Handling and Forensics  (SANS InfoSec Reading Room)

·        Open Source Digital Forensics Tools – The Legal Argument  by Brian Carrier

·        Video – Live Remote Device Acquisition with AccessData FTK 3

·        *** Solid State Drives: The Beginning of the End for Current Practice in Digital Forensic Recovery?  By Graeme R. Bell and Richard Boddington

 

 

Topic 4 - Processing Crime and Incident Scenes

 

 

·        *** U.S. Department of Justice, “Forensic Examination of Digital Evidence: A Guide for Law Enforcement,” Office of Justice Programs, U.S. Department of Justice, National Institute of Justice. Special Report NCJ 199408, April 2004. http://www.ojp.usdoj.gov/nij

·        Crypto attack puts digital sig hash on collision course – article from The Register

 

Topic 5 - Working with Windows and DOS Systems

 

 

·        *** H. Carvey, “The Dark Side of NTFS (Microsoft’s Scarlet Letter), NTFS Alternate Data Streams, September 2003. http://patriot.net/~carvdawg/docs/dark_side.html.

·        Winquisitor: Windows Information Gathering Tool (SANS Reading Room)

·        What you Don’t See on your Hard Drive (SANS InfoSec Reading Room)

·        Windows Responders Guide  (SANS InfoSec Reading Room)

·        Introduction to the Registry – from Annoyances.com

·        PC Guide – NTFS Directories and Files

·        PC Guide – Master File Table

·        MFT Wiki

·        Search Windows Server - MFT

·        Windows Server Troubleshooting – MFT Metadata

·        How to break into a Windows PC (and prevent it from happening to you) – from LifeHacker

 

 

Topic 6 - Current Computer Forensics Tools

 

 

·        *** NHTCU, “Good Practice Guide for Computer Based Electronic Evidence,” Association of Chief Police Officers

·        *** Computer Forensic Timeline Analysis with Tapestry    By: Derek Edwards (SANS InfoSec Reading Room).

·        Bless Hex Editor – home page and documentation - http://home.gna.org/bless/docs.html

·        Open Source Digital Forensics - http://www2.opensourceforensics.org/tools/application

·        Santoku Mobile Forensics - https://santoku-linux.com/

·        Digital Forensics Framework - http://www.digital-forensic.org/

·        Open Source Android forensics toolkit - http://sourceforge.net/projects/osaftoolkit/

·        Digital Forensics Association Open Source Tools - http://www.digitalforensicsassociation.org/opensource-tools/

·        Practical Computer Forensics using Open Source Tools (Slides) - http://www.digitalforensics.ch/nikkel08.pdf

·        Revealertoolkit - http://code.google.com/p/revealertoolkit/

·        Deft Linux - http://www.deftlinux.net/

·        AccessData Mobile Phone Examiner Plus Users Guide –

http://ad-pdf.s3.amazonaws.com/MPE_UG.pdf

·        AFLogical - Open Source Edition pulls MMS, SMS, Contacts, and Call Logs from Android device -  https://viaforensics.com/resources/tools/android-forensics-tool/

·        iPhone Analyzer - Explore the internal file structure of your iphone (or of a seized phone in the case of forensic teams) using either the iphone's own backup files or (for jail broken iphones) ssh. Viewing of plist, sqlite, and hex are supported. IOS 5 is now supported

 

 

Topic 7 – Macintosh and Linux Boot Processes and File Systems

 

Macintosh:

Videos:

Some resources:

Linux:

 

Topic 8 -- Recovering Graphics Files

 

http://en.wikipedia.org/wiki/Vector_graphics

http://en.wikipedia.org/wiki/Computer_Graphics_Metafile

http://en.wikipedia.org/wiki/Exif

www.securityfocus.com/infocus/1684

 

 

 

Topic 8a – Steganography

 

·        *** “Hide and Seek: An Introduction to Steganography.” Niels Provos and Peter Honeyman – Univ of Michigan, IEEE Security and Privacy, 2003

·        *** Gary C. Kessler, “An Overview of Steganography for the Computer Forensics ExaminerForensic Science Communications, July 2004

·       *** Niels Provos and Peter Honeyman, “Detecting Steganographic Content on the Internet,” CITI Technical Report 01-11, 2001

·       R. Chandramouli, “A Mathematical Approach to Steganalysis”

Video:

 

 

 

Topic 9 -- Computer Forensics Analysis and Validation

 

 

 

·        Top 10 Password Crackers  from Security Tools 

·        John the Ripper  password cracker -- versions for unix, Linux, Mac,  windows, DOS and others

·        Video tutorial on Rainbow Tables (4:46) from Live Security

·        Rainbow tables and RainbowCrack Tutorial from Ethical Hacker Network.