1 Email and Internet Evidence Mark Pollitt Associate Professor, Engineering Technology.

Slides:



Advertisements
Similar presentations
Decision Group Forensics Investigation Toolkit (FIT) Layer 7 Content Reconstruction Tool.
Advertisements

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 4: Web Browsing.
Lesson 4: Web Browsing.
The Internet Useful Definitions and Concepts About the Internet.
Internet…issues Managing the Internet
Chapter 2: Application layer  2.1 Web and HTTP  2.2 FTP 2-1 Lecture 5 Application Layer.
COS/PSA 413 Day 17. Agenda Lab 8 write-up grades –3 B’s, 1 C and 1 F –Answer the Questions!!! Capstone progress report 2 overdue Today we will be discussing.
WWW and Internet The Internet Creation of the Web Languages for document description Active web pages.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall Networked Applications Chapter 11 Updated January 2009 Raymond Panko’s Business Data Networks.
Web Design Terms and Concepts Ms. Scales. Q. What is a Server? A. A server is a computer that stores information many people can access. It runs special.
Practical PC, 7 th Edition Chapter 9: Sending and Attachments.
A Presentation by Derek Southern May 20, 2010 To SIR Area 2 CAT group.
E – Mail History of s What is an ? What happens when we sent an ? messages Folders Address Attachments Types of.
Computer Concepts 2014 Chapter 7 The Web and .
PC Maintenance: Preparing for A+ Certification Chapter 25: The Internet.
Backup Local Online For secure offsite storage of your , and making it available from any computer or smart phone. Backup accessed with.
8. Internet and . Topics Internet Web browsers and evidence they create function and forensics Chat and social networking evidence.
1 Computer Communication & Networks Lecture 27 Application Layer: Electronic mail and FTP Waleed.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
IS 247 Introduction to Web Application Development Tim Wu.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Webmail. Agenda Why use webmail? Why use webmail? What is webmail What is webmail – basic » system MDA MDA MTA MTA MUA MUA »Protocol SMTP SMTP.
Computer Networks26-1 Chapter 26. Remote Logging, Electronic Mail and File Transfer.
Tutorial 1 Getting Started with Adobe Dreamweaver CS3
Module 6 Using the Internet for Working & Learning.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
An and Collaboration Suite LI 815 XR Kristen Gripp.
Strategies and Google Voice Lake County Area Computer Enthusiasts Characteristics of the 2 types: Webmail Local Client Basic etiquette Google.
How to choose an solution August 2008 Maxine Miller Robert Petrilak.
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
OmnėMail Nicholas Allen Effie Goenawan Annie Liu.
HTML Frames 1) Introduction to Frames 2) Simple Frame Example 3) Frame Layout 4) Excercise.
Thornbury U3A Computer Club – Mike Farquhar July 2014.
The Web and Web Services Jim Graham NR 621 Spring 2009.
RUBRIC IP1 Ruben Botero Web Design III. The different approaches to accessing data in a database through client-side scripting languages. – On the client.
World Wide Web “WWW”, "Web" or "W3". World Wide Web “WWW”, "Web" or "W3"
Kuliah Pengantar Teknologi Informasi Coky Fauzi Alfi cokyfauzialfi.wordpress.com Internet (2)
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
SMARTMAIL 3.0. OVERVIEW ● CLIENT ● WORKS WITH IMAP AND SMTP MAIL SERVER ● OFFERS SECURE , WORK FLOW MESSAGES, TRANSLATION ● PLUG-IN ARCHITECTURE.
  is a system of electronic communication that allows the user to exchange messages over the internet  Everyone’s address is unique  Two.
INTERNET AND PROTOCOLS For more notes and topics visit: eITnotes.com.
and Internet Explorer.  The transmission of messages and files via a computer network  Messages can consist of simple text or can contain attachments,
COM: 111 Introduction to Computer Applications Department of Information & Communication Technology Panayiotis Christodoulou.
POPAnything A Universal POP3 and SMTP Service to retrieve any web bases into pop3 supporting client like outlook.
Uniform Resource Locator URL protocol URL host Path to file Every single website on the Internet has its own unique.
1 Outlook web app مریم جعفری. Preface 2 Webmail (or web-based ) is any client implemented as a web application running on a web server. Examples.
– Protocols 21 – Protocols 21. – Protocols 21 Now we’ll move on to more technical aspects of This means protocols Remember.
By: Derek Ton & Alex Pappas.  Most frequently used internet service that you will manage as network administrator.  You need to understand how they.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
Forensics Investigation Toolkit (FIT) Offline Raw Data Files Parsing and Reconstruction Tools (Windows) Decision Group
Mail Server Mail is just a message in any form sends from sender to receiver. Mail Server is a computerized system that is equivalent to virtual post office.
Instructor Materials Chapter 5 Providing Network Services
HTML, XHTML, and the World Wide Web
Development of Web Applications - Introduction
Lesson 4: Web Browsing.
Introduction to Computers
Some bits on how it works
Sarang Nazari California State University, Los Angeles
Protocols and networks in the TCP/IP model initially.
Web page a hypertext document connected to the World Wide Web.
Direct Internet 3 Iridium Proprietary and Confidential 9/18/2018.
© NTT Communications 2018 All Rights Reserved
What is a CMS. CMS is content management system CMS is a software that stores content.
Lesson 4: Web Browsing.
CET4860 Mark Pollitt Associate Professor
Client/Server and Peer to Peer
Digital Forensics Dr. Bhavani Thuraisingham
Presentation transcript:

1 and Internet Evidence Mark Pollitt Associate Professor, Engineering Technology

Web 1.0 Technologies Technologies – – Web – Skype – IM Web 1.0 because: – Static content – Application standards – Client based

Forensics on Web 1.0 Technologies Focus on two elements: – The application – The data Looking for: – The content – The connections

Applications Developers need to build three things into communications applications: – User interface – Data processing/storage – Communications protocols Multiple Applications can share a common protocol – Outlook, Thunderbird, Zimbra – Hotmail, Yahoo, Gmail

Web Browsers All share HTML Some support other technologies: – Active X, Flash, XML, etc. All store a cache of recent files and a history – Most store those differently – Usually, it takes a specific tool to look at browser histories Documenting both Internet history and reconstructing web pages is important evidence

Doing Browser Forensics Know how the browser stores data Know the location of the data Have a tool that can read that data Great resources: browser-forensics-part-1 browser-forensics-part-2

Very simple in concept: – Client/Server – SMTP protocol Two basic interfaces: – Web mail (Hotmail, Yahoo, Gmail) – Client based (POP, IMAP, SMTP) – Some support both Features vary by client

Clients Like Browsers, they share some features: – Communications protocols (POP, IMAP, SMTP, etc.) – User Interface – Storage – usually some form of database

Internet History Browsers Nirsoft – IEHistory View/Mozilla Cache View Security Exploded – Browser History Spy* Sqlite Viewer - Firefox

Investigations Client Software – Outlook – Thunderbird – Zimbra Forensic Suites – EnCase – FTK Webmail – Use browser forensics

Thank You for your Attention!