Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Internet Forensics
SPECIAL OFFER: Upgrade this ebook with O’Reilly Preface
Who This Book Is For Contents of This Book Conventions Used in This Book Safari Enabled Using Code Examples How to Contact Us Acknowledgments
1. Introduction
What Is Internet Forensics? The Seamy Underbelly of the Internet
The Scams The Numbers Why Is It Getting Worse?
Pulling Back the Curtain Taking Back Our Internet Protecting Your Privacy Before You Begin
Viruses, Worms, and Other Threats Ethics Innocent Until Proven Guilty
A Network Neighborhood Watch
2. Names and Numbers
Addresses on the Internet
IP Addresses
Databases of IP address blocks
Domain Names
Internet Address Tools
dig
Hostname lookups Reverse lookups Back and forth
whois
Dissecting a whois report Privacy blocks on domain information Diversity in whois output Bogus information from whois Using whois to query IP address blocks whois on the Web
traceroute
DNS Record Manipulation An Example—Dissecting a Spam Network
3. Email
Message Headers Forged Headers Forging Your Own Headers Tracking the Spammer Viruses, Worms, and Spam Message Attachments Message Content Is It Really Spam?
4. Obfuscation
Anatomy of a URL
Encoding Characters in URLs International Domain Names
IP Addresses in URLs
Encoding the IP Address
Usernames in URLs Encoding the Entire Message Similar Domain Names Making a Form Look Like a URL Bait and Switch—URL Redirection
Page-Based Redirection Server-Based Redirection Determining the Mechanism Redirection via eBay
JavaScript Browsers and Obfuscation
5. Web Sites
Capturing Web Pages Viewing HTML Source
Extracting Links Within a Page Page Creation Software Other Information
Comparing Pages Non-Interactive Downloads Using wget
Downloading a Single Page Copying an Entire Web Site The Wayback Machine
Mapping Out the Entire Web Site
Directory Listings
Hidden Directories
Guessing Directory Names Ethical Question
In-Depth Example—Directory Listings Dynamic Web Pages
The Black Box Problem Why PHP?
Filling Out Forms
Genuine Fake Credit Card Numbers What Happens if I Try This?
In-Depth Example—Server-Side Database Opening the Black Box
Hitting the Jackpot Looking at the Source Phishing Tackle The Honeynet Project
6. Web Servers
Viewing HTTP Headers What Can Headers Tell Us? Cookies Redirection Web Server Statistics Controlling HTTP Headers A Little Bit of Everything
7. Web Browsers
What Your Browser Reveals Apache Web Server Logging Server Log Analysis
Googlebot Visits Bad Robots Google Queries
Protecting Your Privacy
Disguising Your Browser Proxies Privoxy External Proxy Servers Proxy Networks
8. File Contents
Word Document Metadata
SCO Lawsuit Documents Other Examples
U.K. Government Dossier on Iraq
Extracting Word Revision Logs Discovering Plagiarism The Right Way to Distribute Documents
Document Forgery Redaction of Sensitive Information
The D.C. Sniper Letter The CIA in Iran in 1953 U.S. Army Report on the Death of Nicola Calipari Intelligence on Al Qaeda The Right Way to Redact
9. People and Places
Geographic Location Time Zone Language Expertise Criminal or Victim? Hardware and Software
10. Patterns of Activity
Signatures Searching with Signatures Problems with Simple Signatures Full Text Comparison Using Internet Search Engines for Patterns
11. Case Studies
Case Study 1: Tidball
The Initial Emails The Initial URLs Redirection The Web Sites Directories The Phishing Kit Page Tracking Information The PHP Scripts What Else Has Tidball Been Involved In? Timeline Who Is Tidball?
Case Study 2: Spam Networks
Subsets of Spam Digging Deeper
12. Taking Action
What Is Being Done to Tackle Internet Fraud?
Legislation Enforcement Industry and Community Organizations
The Spamhaus Project Anti-Phishing Working Group Digital PhishNet
What You Can Do to Help
Documenting an Investigation Who Should You Call?
Law enforcement Financial institutions Internet service providers Site owners The scammers
Getting in Over Your Head
Child Pornography Sites Extremist Web Sites and Vigilantes
Vision of a Community Response
A. About the Author Index About the Author Colophon SPECIAL OFFER: Upgrade this ebook with O’Reilly
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion