Presentation is loading. Please wait.

Presentation is loading. Please wait.

Social Networking Forensics Team 6 Janet Cheng Jennifer Hoffman Therese LaMarche Ahmet Tavil Amit Yadav Client: Steve Kim Professor Tappert.

Similar presentations


Presentation on theme: "Social Networking Forensics Team 6 Janet Cheng Jennifer Hoffman Therese LaMarche Ahmet Tavil Amit Yadav Client: Steve Kim Professor Tappert."— Presentation transcript:

1 Social Networking Forensics Team 6 Janet Cheng Jennifer Hoffman Therese LaMarche Ahmet Tavil Amit Yadav Client: Steve Kim Professor Tappert

2 ▫ Page 1 Overview Background information about Social Network Forensics Forensic tools Top ten social networking sites and their privacy configurations Social Networking Tracker Website Find IP address in Gmail, Yahoo, and Hotmail Demonstrations on C# Program and PHP website Future recommendations

3 ▫ Page 2 Background Information Numerous murders, kidnaps, robbers, and etc. involve social networking sites led to security issues Security has not been a high priority in the popular social networking sites Cases “A 22-year-old Arizona woman was arrested for plotting a murder on another woman after seeing photos from her boyfriend’s MySpace website.” “A mother falsified her identity using MySpace to hoax a 13-year-old neighbor who later committed suicide. “ “Three suspects have been charged in connection with a kidnap and attempted murder of a man, after meeting with a woman through a social networking website called mocospace.com.”

4 ▫ Page 3 Commonly Used Forensic Applications Product Name UNIX/Linux Platform Windows Platform Analyses (Windows/Unix) Product Description Encase Forensics NoYesW, UComplex GUI, managing large volume of data including deleted files, and customized reports Forensic Toolkit NoYesW, UFull Unicode support, search engines for indexed search, broad file system support i2Analyst’s Notebook NoYes--Visualize large volume data seeing big picture, reveal patterns ProDiscover Incident Response NoYesW, UExamine live system anywhere in the network, search entire disk, creates and record MD5, SHA1, or SHA256 hashes of evidence Slueth Kit/Autopsy Browser YesNoW, UGUI, HTML-based and connect with the Autopsy server using HTML browser, “File Manager”

5 ▫ Page 4 Social Networking Sites Security Configurations Evaluated on all different social networking sites focusing on their privacy configurations Social Network Supports HTML Visitor Tracker Customizable Privacy Settings BeboNo Yes FacebookNo Yes FriendsterNoYes Hi5Yes MySpaceYesNoYes NetlogNo Yes OrkutNoYes PerfSpotYes Yahoo!360YesNoYes ZorpiaNo Yes

6 ▫ Page 5 Social Networking Sites Security ConfigurationsExtended Tracker Program Created a website called “Social Networking Visitor Tracker”. Developed and tested modules for major Social Networking Sites. Social Networking Website Supports Visitor Tracker Program AOL Instant Messenger Yes BeboNo DeviantArt.comNo eBayYes FacebookNo FriendsterYes Hi5Yes NetLogNo MySpaceYes OrkutNo PerfSpotNo Yahoo!360Yes ZorpiaNo

7 ▫ Page 6 Tracing sender‘s IP address from an E-mail account Access your inbox Click on the message Click on the upside down triangle located on the right Select “Show Original” Gmail

8 ▫ Page 7 Tracing sender‘s IP address from an E-mail account Make sure you are in classic mode Right click on message Click on the message Select “View Message Source” Hotmail

9 ▫ Page 8 Tracing sender‘s IP address from an E-mail account Select the message Scroll down and click “Full Headers” Yahoo! Mail

10 ▫ Page 9 Demo Demonstration: C# Application Security Configurations

11 ▫ Page 10 Demo Demonstration: PHP Website Security Configurations

12 ▫ Page 11 Future Recommendations Retrieving more information about the visitor of a monitored Social Networking page Develop additional modules for the PHP tool to support Facebook, Second Life and other websites. Craigslist presents the need to be monitored due to the increasing cases in scams. Craigslist users could benefit from knowing more about the people contacting them.


Download ppt "Social Networking Forensics Team 6 Janet Cheng Jennifer Hoffman Therese LaMarche Ahmet Tavil Amit Yadav Client: Steve Kim Professor Tappert."

Similar presentations


Ads by Google