Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Tracking an Offender. 2 Communication Between Layers in Different Hosts sender receiver data AH data PH data SH data TH data NH data DH DT data BITS.

Similar presentations


Presentation on theme: "1 Tracking an Offender. 2 Communication Between Layers in Different Hosts sender receiver data AH data PH data SH data TH data NH data DH DT data BITS."— Presentation transcript:

1 1 Tracking an Offender

2 2 Communication Between Layers in Different Hosts sender receiver data AH data PH data SH data TH data NH data DH DT data BITS Physical Presentation Session Transport Network Data link Application Physical Presentation Session Transport Network Data link Application

3 3 TCP/IP Family

4 4 Network Class

5 5 IP Address

6 6 Subnetting Add another level to address/routing hierarchy: subnet Subnet masks define variable partition of host part Subnets visible only within site

7 7 Basic Concepts and Tools Media Access Control ARP TCP/IP, UDP DHCP DNS ping, traceroute, dig, nslookup, ipconfig/ifconfig whois

8 8 Investigating Emails Increasing volume of fraudulent email Virus propagation Spam in the workplace Increased successful prosecution of spammers Deleting email

9 9 Email System One example open source email system: –http://www.qmailrocks.com/

10 10 Analyzing Message Headers Envelope header information –Added by sender –Often forged Message header –Added by receiver –Use these for analysis Sample message header –http://www.stopspam.org/: Email Abuse -> Email headerhttp://www.stopspam.org/

11 11 Spam Tools Robomail: mass mailer –http://www.inter7.com/http://www.inter7.com/ Email harvester –http://www.lencom.com/http://www.lencom.com/ http://www.paulgraham.com/ CAN-SPAM Act: Requirements for Commercial Emailers

12 12 Email Phishing http://en.wikipedia.org/wiki/Phishing Serious threat of financial loss Newest, most damaging type of spam Rely on “Social Engineering” http://www.antiphishing.org/

13 13 URL Obfuscation With @ What is the format of a URL? [protocol]://[user@]system[:portnum]/file If we are accessing a web site… –Protocol is http –User is blank and port number is blank (defaults to 80) Therefore, we get something like: –http://www.microsoft.com Hide real destination inside the URL: –http://www.microsoft.com&item=q122134@www.phrack.o rghttp://www.microsoft.com&item=q122134@www.phrack.o rg

14 14 Fighting Spam Spam Filter http://www.spamhaus.org/ http://www.spamconference.org/

15 15 CAN-SPAM Do’s Accurate Header –From –Subject –Origin, routing, destination Include Opt-Out Method Include real business address Clearly note that the email is advertisement


Download ppt "1 Tracking an Offender. 2 Communication Between Layers in Different Hosts sender receiver data AH data PH data SH data TH data NH data DH DT data BITS."

Similar presentations


Ads by Google