Difference between revisions of "Main Page"

From ForensicsWiki
Jump to: navigation, search
m
(Update of research section/archived previous research content to Past Selected Research page)
 
(16 intermediate revisions by 7 users not shown)
Line 7: Line 7:
  
 
==WIKI NEWS==
 
==WIKI NEWS==
 +
2016-03-30: '''Site Maintenance on 2016-04-01''' Attention Forensic Wiki community, site maintenance will be occurring on 1 April 2016 from 9AM EST to 1PM EST. During this time Forensic Wiki will not be available as it will be offline to perform environment upgrades.
 +
 +
2015-08-26: – A support email address (support AT forensicswiki.org) was created for all your forensicswiki needs.  This is a mailing list that goes to the appropriate staff that will assist with site maintenance, issues, etc.  If you have questions or issues with the site please send us an email.
 +
 +
'''2015-07-18''': Forensic Wiki has been acquired by Harris Corporation for the betterment of the community.  All licensing and data rights are staying the same, there’s just corporate funding behind the site now.  The wiki will remain as an international resource, with no editorial input from Harris whatsoever.  All of the existing editorial controls and checks and balances will remain in place.  All of the existing accounts carry forward.
 +
 
2013-05-15: You can now subscribe to Forensics Wiki Recent Changes with the [[ForensicsWiki FeedBurner Feed]]
 
2013-05-15: You can now subscribe to Forensics Wiki Recent Changes with the [[ForensicsWiki FeedBurner Feed]]
  
Line 14: Line 20:
 
<!-- Selected Forensics Research -->   
 
<!-- Selected Forensics Research -->   
 
<div style="margin-top:0.5em; border:2px solid #ff0000; padding:0.5em 0.5em 0.5em 0.5em; background-color:#ffff99; align:center; border:1px solid #ddccff;">
 
<div style="margin-top:0.5em; border:2px solid #ff0000; padding:0.5em 0.5em 0.5em 0.5em; background-color:#ffff99; align:center; border:1px solid #ddccff;">
<h2 style="margin:0; background-color:#ffff33; font-size:120%; font-weight:bold; border:1px solid #afa3bf; text-align:left; color:#000; padding-left:0.4em; padding-top:0.2em; padding-bottom:0.2em;"> Featured Forensic Research </h2>
+
<h2 style="margin:0; background-color:#ffff33; font-size:120%; font-weight:bold; border:1px solid #afa3bf; text-align:left; color:#000; padding-left:0.4em; padding-top:0.2em; padding-bottom:0.2em;"> Featured Forensic Challenge </h2>
  
<small>June 2013</small>
+
;[[Digital_Forensic_Research_Workshop|Digital Forensic Research Workshop]]
<bibtex>
+
@INPROCEEDINGS{6503202,
+
author={Gessiou, E. and Volanis, S. and Athanasopoulos, E. and Markatos, E.P. and Ioannidis, S.},
+
booktitle={Global Communications Conference (GLOBECOM), 2012 IEEE},
+
title={Digging up social structures from documents on the web},
+
year={2012},
+
pages={744-750},
+
abstract={We collected more than ten million Microsoft Office documents from public websites, analyzed the metadata stored in each document and extracted information related to social activities. Our analysis revealed the existence of exactly identified cliques of users that edit, revise and collaborate on industrial and military content. We also examined cliques in documents downloaded from Fortune-500 company websites. We constructed their graphs and measured their properties. The graphs contained many connected components and presented social properties. The a priori knowledge of a company's social graph may significantly assist an adversary to launch targeted attacks, such as targeted advertisements and phishing emails. Our study demonstrates the privacy risks associated with metadata by cross-correlating all members identified in a clique with users of Twitter. We show that it is possible to match authors collaborating in the creation of a document with Twitter accounts. To the best of our knowledge, this study is the first to identify individuals and create social cliques solely based on information derived from document metadata. Our study raises major concerns about the risks involved in privacy leakage due to document metadata.},
+
keywords={data privacy;document handling;graph theory;meta data;social networking (online);Fortune-500 company Websites;Microsoft Office documents;Twitter accounts;company social graph;document metadata;information extraction;metadata analysis;phishing emails;privacy leakage;privacy risks;public Websites;social activities;social cliques;social properties;social structures;targeted advertisements},
+
doi={10.1109/GLOCOM.2012.6503202},
+
ISSN={1930-529X},}
+
</bibtex>
+
We collected more than ten million Microsoft Office documents from public websites, analyzed the metadata stored in each document and extracted information related to social activities. Our analysis revealed the existence of exactly identified cliques of users that edit, revise and collaborate on industrial and military content. We also examined cliques in documents downloaded from Fortune-500 company websites. We constructed their graphs and measured their properties. The graphs contained many connected components and presented social properties. The a priori knowledge of a company's social graph may significantly assist an adversary to launch targeted attacks, such as targeted advertisements and phishing emails. Our study demonstrates the privacy risks associated with metadata by cross-correlating all members identified in a clique with users of Twitter. We show that it is possible to match authors collaborating in the creation of a document with Twitter accounts. To the best of our knowledge, this study is the first to identify individuals and create social cliques solely based on information derived from document metadata. Our study raises major concerns about the risks involved in privacy leakage due to document metadata.
+
http://cis.poly.edu/~gessiou/reports/metadata.pdf
+
  
(See also [[Past Selected Articles]])
+
The current Digital Forensic Research Workshop (DFRWS) is about the Internet of Things (IoT). Analysis of devices and network data including a Smart TV Raspberry Pi and Amazon Echo cloud data are part of the scenario.
 +
 
 +
See more about [[Digital_Forensic_Research_Workshop|DFRWS here...]]
 +
(See also [[Past Selected Articles|Past Selected Research]])
  
 
| width="40%" style="vertical-align:top" |
 
| width="40%" style="vertical-align:top" |
Line 38: Line 33:
 
<div style="margin-top:0.5em; border:2px solid #00ff00; padding:0.5em 0.5em 0.5em 0.5em; background-color:#ffeeff; align:center; border:1px solid #ffccff;">
 
<div style="margin-top:0.5em; border:2px solid #00ff00; padding:0.5em 0.5em 0.5em 0.5em; background-color:#ffeeff; align:center; border:1px solid #ffccff;">
 
<h2 style="margin:0; background-color:#ffff33; font-size:120%; font-weight:bold; border:1px solid #afa3bf; text-align:left; color:#000; padding-left:0.4em; padding-top:0.2em; padding-bottom:0.2em;">  Featured Article </h2>
 
<h2 style="margin:0; background-color:#ffff33; font-size:120%; font-weight:bold; border:1px solid #afa3bf; text-align:left; color:#000; padding-left:0.4em; padding-top:0.2em; padding-bottom:0.2em;">  Featured Article </h2>
;[[Forensic Linux Live CD issues]]
+
;[[Apple File System (APFS)]]
:Forensic Linux Live CD distributions are widely used during computer forensic investigations. Currently, many vendors of such Live CD distributions state that their Linux do not modify the contents of hard drives or employ "write protection." Testing indicates that this may not always be the case. [[Forensic Linux Live CD issues|Read More...]]
+
: APFS, or Apple File System, is the file system designed by Apple Computer to supersede HFS+ and take advantage of flash/SSD storage and native encryption support. APFS also introduced file system snapshots, support for sparse files, and greater time stamp granularity.
 +
[[Apple File System (APFS)|Read More...]]
  
 
|}
 
|}
 
  
 
<!-- This begins the two-column section -->
 
<!-- This begins the two-column section -->
Line 93: Line 88:
 
* '''[[Tools:Network_Forensics|Network Forensics]]''': [[Snort]],  [[Wireshark]], [[Kismet]],  [[NetworkMiner]]...
 
* '''[[Tools:Network_Forensics|Network Forensics]]''': [[Snort]],  [[Wireshark]], [[Kismet]],  [[NetworkMiner]]...
 
* '''[[:Category:Anti-forensics tools|Anti-Forensics]]''': [[Slacker]], [[Timestomp]], [[wipe]], [[shred]], ...
 
* '''[[:Category:Anti-forensics tools|Anti-Forensics]]''': [[Slacker]], [[Timestomp]], [[wipe]], [[shred]], ...
* '''[[Tools#Other_Tools|Other Tools]]''': [[biew]], [[hexdump]], ...
+
* '''[[Tools#Other_Tools|Other Tools]]''': [[biew]], [[hexdump]], [[MailXaminer]]...
 
</div>
 
</div>
  

Latest revision as of 19:06, 30 October 2017

This is the Forensics Wiki, a Creative Commons-licensed wiki devoted to information about digital forensics (also known as computer forensics). We currently list a total of 863 pages.

Much of computer forensics is focused on the tools and techniques used by investigators, but there are also a number of important papers, people, and organizations involved. Many of those organizations sponsor conferences throughout the year and around the world. You may also wish to examine the popular journals and some special reports.


WIKI NEWS

2016-03-30: Site Maintenance on 2016-04-01 Attention Forensic Wiki community, site maintenance will be occurring on 1 April 2016 from 9AM EST to 1PM EST. During this time Forensic Wiki will not be available as it will be offline to perform environment upgrades.

2015-08-26: – A support email address (support AT forensicswiki.org) was created for all your forensicswiki needs. This is a mailing list that goes to the appropriate staff that will assist with site maintenance, issues, etc. If you have questions or issues with the site please send us an email.

2015-07-18: Forensic Wiki has been acquired by Harris Corporation for the betterment of the community. All licensing and data rights are staying the same, there’s just corporate funding behind the site now. The wiki will remain as an international resource, with no editorial input from Harris whatsoever. All of the existing editorial controls and checks and balances will remain in place. All of the existing accounts carry forward.

2013-05-15: You can now subscribe to Forensics Wiki Recent Changes with the ForensicsWiki FeedBurner Feed

Featured Forensic Challenge

Digital Forensic Research Workshop

The current Digital Forensic Research Workshop (DFRWS) is about the Internet of Things (IoT). Analysis of devices and network data including a Smart TV Raspberry Pi and Amazon Echo cloud data are part of the scenario.

See more about DFRWS here... (See also Past Selected Research)

Featured Article

Apple File System (APFS)
APFS, or Apple File System, is the file system designed by Apple Computer to supersede HFS+ and take advantage of flash/SSD storage and native encryption support. APFS also introduced file system snapshots, support for sparse files, and greater time stamp granularity.
Read More...


Topics



You can help! We have a list of articles that need to be expanded. If you know anything about any of these topics, please feel free to chip in.