Difference between pages "Cellebrite UFED" and "VPN"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(Added infobox)
 
m (caterogies)
 
Line 1: Line 1:
{{Infobox_Software |
+
{{expand}}
  name = Cellebrite UFED |
+
  maintainer = [[Cellebrite]] |
+
  os = n/a |
+
  genre = [[Category:Cell Phone Tools|Cell Phone]] |
+
  license = {{Commercial}} |
+
  website = [http://www.cellebrite.com/UFED-Standard-Kit.html http://www.cellebrite.com/] |
+
}}
+
  
The '''Cellebrite 'Universal Forensic Extraction Device' (UFED)''' is a tool for mobile phone, smartphone, and PDA forensics. As of February 2009 the UFED was compatible with approximately 2,000 mobile phones (including GSM, TDMS, CDMA, iDEN). The standard package containing several dozen phone cables. The UFED had an intergrated SIM reader, with Wireless connection options also being integrated, such as IR and Bluetooth. 
+
'''VPN''' (Virtual Private Network) is a computer network in which some of the links between nodes are carried by connections in another network (with optional [[encryption]]).
  
The UFED also supports native Apple iPOD Touch, and Apple iPHONE extraction on both 2G and 3G versions. This is clientless, and via a physical cable, and works on jailbroken and non-jailbroken devices.
+
== Overview ==
  
Subject data can be retrieved via logical extraction or via physical extraction (ie: hex dump). Moreover, all cable connectors from subject (source) side act as a write-blocker, being read only via the onboard hardware chipset. Extracted data includes basic handset data, the phonebook, SMS and MMS messages, SIM data, multimedia (e.g. images and videos stored on the phone), and time and date stamps.
+
Virtual Private Networks are widely used by organizations and individuals for different purposes:
  
== External Links ==
+
* Protecting confidential information in organizations;
* [http://www.cellebrite.com/UFED-Standard-Kit.html Official web site]
+
* Providing employees with secure remote access to the network;
 +
* Securing Internet traffic in insecure networks (e.g. open wireless networks).
 +
 
 +
Some VPN services are focused on providing solutions to promote fraud. In this case, VPN service is used for anonymity.
 +
 
 +
== VPN and anonymity ==
 +
 
 +
* Log files: VPN services may maintain usage logs;
 +
* Protocol stack: [[TCP timestamps]] and IP ID values may be used in correlating incoming (encrypted) and outgoing (unencrypted) network streams.
 +
 
 +
[[Category:Anti-Forensics]]
 +
[[Category:Network Forensics]]
 +
[[Category:Encryption]]

Revision as of 14:06, 15 October 2008

Information icon.png

Please help to improve this article by expanding it.
Further information might be found on the discussion page.

VPN (Virtual Private Network) is a computer network in which some of the links between nodes are carried by connections in another network (with optional encryption).

Overview

Virtual Private Networks are widely used by organizations and individuals for different purposes:

  • Protecting confidential information in organizations;
  • Providing employees with secure remote access to the network;
  • Securing Internet traffic in insecure networks (e.g. open wireless networks).

Some VPN services are focused on providing solutions to promote fraud. In this case, VPN service is used for anonymity.

VPN and anonymity

  • Log files: VPN services may maintain usage logs;
  • Protocol stack: TCP timestamps and IP ID values may be used in correlating incoming (encrypted) and outgoing (unencrypted) network streams.