4 research outputs found

    Forensics and war-driving on unsecured wireless network

    Get PDF
    This paper investigates the effect of common war-driving on wireless network. Different war-driving software tools are examined and their effects are compared. It also investigates how forensics tools can monitor war drivers. The experiments show that significant numbers of homes are deploying wireless access points without much regard to the security of these devices and it is anticipated that more digital crime cases in this field will be deployed. Such cases include connecting to an unsecured home Wi-Fi network and performing illegal activities, or stealing personal data with sensitive information and using it to threaten victims or perform identity theft. © 2011 ICITST

    Forensic artifacts of Facebook\u27s instant messaging service

    Get PDF
    This paper highlights the importance of Facebook\u27s instant messaging service (Facebook Chat) as a potential source of evidence in an investigation. The paper discusses the process of recovering and reconstructing artifacts left by the use of Facebook Chat on a computer\u27s hard disk. The paper describes experiments in which Facebook Chat conversations in Latin and Arabic character sets were conducted using three major web browsers, and then forensically retrieved. The results highlight how Facebook Chat artifacts of Arabic conversations can be difficult to locate with keyword search functions. The paper describes appropriate steps to overcome these difficulties. © 2011 ICITST

    Forensic analysis of private browsing artifacts

    Get PDF
    The paper investigates the effectiveness of the privacy mode feature in three widely used Web browsers, and outlines how to investigate when these browsers have been used to perform a criminal or illegal act. It performs an identical test on a privacy mode session for each of the three Web browsers and investigates whether traces are left behind. The analysis is done in three phases. First, common places where history and cache records are usually stored are examined. Then, other locations on the local machine are examined using special forensic tools. Also, the physical memory (RAM) is captured and examined for traces. © 2011 IEEE

    Factors influencing digital forensic investigations: empirical evaluation of 12 years of Dubai police cases

    Get PDF
    In Digital Forensics, the number of person-hours spent on investigation is a key factor which needs to be kept to a minimum whilst also paying close attention to the authenticity of the evidence. The literature describes challenges behind increasing person-hours and identifies several factors which contribute to this phenomenon. This paper reviews these factors and demonstrates that they do not wholly account for increases in investigation time. Using real case records from the Dubai Police, an extensive study explains the contribution of other factors to the increase in person-hours. We conclude this work by emphasizing on several factors affecting the person-hours in contrast to what most of the literature in this area proposes
    corecore