Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Internet Forensics
SPECIAL OFFER: Upgrade this ebook with O’Reilly
Preface
Who This Book Is For
Contents of This Book
Conventions Used in This Book
Safari Enabled
Using Code Examples
How to Contact Us
Acknowledgments
1. Introduction
What Is Internet Forensics?
The Seamy Underbelly of the Internet
The Scams
The Numbers
Why Is It Getting Worse?
Pulling Back the Curtain
Taking Back Our Internet
Protecting Your Privacy
Before You Begin
Viruses, Worms, and Other Threats
Ethics
Innocent Until Proven Guilty
A Network Neighborhood Watch
2. Names and Numbers
Addresses on the Internet
IP Addresses
Databases of IP address blocks
Domain Names
Internet Address Tools
dig
Hostname lookups
Reverse lookups
Back and forth
whois
Dissecting a whois report
Privacy blocks on domain information
Diversity in whois output
Bogus information from whois
Using whois to query IP address blocks
whois on the Web
traceroute
DNS Record Manipulation
An Example—Dissecting a Spam Network
3. Email
Message Headers
Forged Headers
Forging Your Own Headers
Tracking the Spammer
Viruses, Worms, and Spam
Message Attachments
Message Content
Is It Really Spam?
4. Obfuscation
Anatomy of a URL
Encoding Characters in URLs
International Domain Names
IP Addresses in URLs
Encoding the IP Address
Usernames in URLs
Encoding the Entire Message
Similar Domain Names
Making a Form Look Like a URL
Bait and Switch—URL Redirection
Page-Based Redirection
Server-Based Redirection
Determining the Mechanism
Redirection via eBay
JavaScript
Browsers and Obfuscation
5. Web Sites
Capturing Web Pages
Viewing HTML Source
Extracting Links Within a Page
Page Creation Software
Other Information
Comparing Pages
Non-Interactive Downloads Using wget
Downloading a Single Page
Copying an Entire Web Site
The Wayback Machine
Mapping Out the Entire Web Site
Directory Listings
Hidden Directories
Guessing Directory Names
Ethical Question
In-Depth Example—Directory Listings
Dynamic Web Pages
The Black Box Problem
Why PHP?
Filling Out Forms
Genuine Fake Credit Card Numbers
What Happens if I Try This?
In-Depth Example—Server-Side Database
Opening the Black Box
Hitting the Jackpot
Looking at the Source
Phishing Tackle
The Honeynet Project
6. Web Servers
Viewing HTTP Headers
What Can Headers Tell Us?
Cookies
Redirection
Web Server Statistics
Controlling HTTP Headers
A Little Bit of Everything
7. Web Browsers
What Your Browser Reveals
Apache Web Server Logging
Server Log Analysis
Googlebot Visits
Bad Robots
Google Queries
Protecting Your Privacy
Disguising Your Browser
Proxies
Privoxy
External Proxy Servers
Proxy Networks
8. File Contents
Word Document Metadata
SCO Lawsuit Documents
Other Examples
U.K. Government Dossier on Iraq
Extracting Word Revision Logs
Discovering Plagiarism
The Right Way to Distribute Documents
Document Forgery
Redaction of Sensitive Information
The D.C. Sniper Letter
The CIA in Iran in 1953
U.S. Army Report on the Death of Nicola Calipari
Intelligence on Al Qaeda
The Right Way to Redact
9. People and Places
Geographic Location
Time Zone
Language
Expertise
Criminal or Victim?
Hardware and Software
10. Patterns of Activity
Signatures
Searching with Signatures
Problems with Simple Signatures
Full Text Comparison
Using Internet Search Engines for Patterns
11. Case Studies
Case Study 1: Tidball
The Initial Emails
The Initial URLs
Redirection
The Web Sites
Directories
The Phishing Kit
Page Tracking Information
The PHP Scripts
What Else Has Tidball Been Involved In?
Timeline
Who Is Tidball?
Case Study 2: Spam Networks
Subsets of Spam
Digging Deeper
12. Taking Action
What Is Being Done to Tackle Internet Fraud?
Legislation
Enforcement
Industry and Community Organizations
The Spamhaus Project
Anti-Phishing Working Group
Digital PhishNet
What You Can Do to Help
Documenting an Investigation
Who Should You Call?
Law enforcement
Financial institutions
Internet service providers
Site owners
The scammers
Getting in Over Your Head
Child Pornography Sites
Extremist Web Sites and Vigilantes
Vision of a Community Response
A. About the Author
Index
About the Author
Colophon
SPECIAL OFFER: Upgrade this ebook with O’Reilly
← Prev
Back
Next →
← Prev
Back
Next →