E-Detective Network Investigation Toolkit - NIT (2010) Decision Group www.edecision4u.com.

Slides:



Advertisements
Similar presentations
Decision Group Forensics Investigation Toolkit (FIT) Layer 7 Content Reconstruction Tool.
Advertisements

Recording TV Shows from Network websites. Network TV Websites Many program episodes can be played in Streaming mode from TV Network websites Can watch.
Page 1 / 18 Internet Traffic Monitor IM Page 2 / 18 Outline Product Overview Product Features Product Application Web UI.
E-Detective Series of Products Presentation (2009) Decision Group
Network Forensic Investigations TRAINING. The Essential Need The knowledge of network packet analysis is important for Forensic Investigators and Lawful.
How the Internet Works Course Objectives Introduce the various web browsers Introduce some new terms Explain the basic Internet to PC hookup  ISP  Wired.
Lawful Interception & Packet Forensics Analysis System Casper Kan Chang Decision Group June 2010.
Wireless-Detective WLAN a/b/g/n Interception System Decision Group
DECISION-COMPUTER INTERNATIONAL CO., LTD E-Detective Series of Products Decision Computer Group of Company Website:
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Network Forensics and Lawful Interception Total Solutions Provider
Decision Group Inc Contents Introduction and Company Brief Corporate Milestones Globalized Company Solution and Technology Solution Position in.
DECISION GROUP The Pioneer of IT Forensics Taipei, Germany, Hong Kong, Singapore.
Internet…issues Managing the Internet
Chapter 2: Application layer  2.1 Web and HTTP  2.2 FTP 2-1 Lecture 5 Application Layer.
The Internet. What is the Internet? A community with about 100 million users Available in almost every country about 160,000 people are added each month.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Internet & Day 2. Web Address/ URL 1.Uniform Resource Locator or web address use to access the web site 2.When you connected to the internet you.
Introduction 1 Lecture 7 Application Layer (FTP, ) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
Introduction 1-1 Chapter 2 FTP & Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 IC322 Fall.
2: Application Layer1 Chapter 2 Application Layer These slides derived from Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross.
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
Internet.
Cyber Crime & Investigation IT Security Consultant
SMTP, POP3, IMAP.
Backup Local Online For secure offsite storage of your , and making it available from any computer or smart phone. Backup accessed with.
Network Services 's DoD-ARPA creates an experimental network – ARPANET – as a test-bed for emerging networking technologies ARPANET originally.
Surveillance Equipment For Internet Activities It is a Internet activities surveillance equipment designed for sniffer package from networking, converter.
Lawful Interception & Packet Forensics Analysis System for Telecom and ISP Special promotion:- EDDC : Off-line Packet Reconstruction & Network Forensics.
BY SAGAR SINHA SAPTARSHI BAKSHI SARTHAK JAIN SHAILZA CHAUDHARY
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Discovering Computers 2010 Chapter 2 The Internet and World Wide Web.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Cloud Computing Forensics Decision Group 2009 Nov.
How did the internet develop?. What is Internet? The internet is a network of computers linking many different types of computers all over the world.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
CS101 Introduction to Computing Lecture 7 Internet Services.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
1 and Internet Evidence Mark Pollitt Associate Professor, Engineering Technology.
Decision Group Inc. E-DETECTIVE Decision Group Inc.
Chapter 2 The Internet and the World Wide Web. 2 Objectives Brief history Internet Access Six Internet Services –Web – –Chat (instant messenger)
E-Detective HTTPS/SSL Interception – MITM & Proxy Decision Group
The SAIC Operation 54 Network and the Internet. Overview The purpose of this brown bag training session is to provide you with an introduction to the.
E-Detective Decoding Centre (EDDC) Offline Decoding & Reconstruction Solution Decision Group
Instrument for Business, Police, Military, Forensics and Information Investigation Wiretap Technology Revolution!!!
Kuliah Pengantar Teknologi Informasi Coky Fauzi Alfi cokyfauzialfi.wordpress.com Internet (2)
E-Detective Ethernet LAN Interception System (with Real-Time Content Reconstruction) Decision Group
LO1 Know types of Network Systems and Protocols. Application Layer Protocols.
DECISION Group Inc.. Decision Group Monitoring Center Solution on Internet Access for LEA or Intelligence.
and Internet Explorer.  The transmission of messages and files via a computer network  Messages can consist of simple text or can contain attachments,
COM: 111 Introduction to Computer Applications Department of Information & Communication Technology Panayiotis Christodoulou.
INTERNET AND . WHAT IS INTERNET The Internet can be defined as the wired or wireless mode of communication through which one can receive, transmit.
E-Detective VoIP Detective – VoIP Interception (2010) Decision Group
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Forensics Investigation Toolkit (FIT) Offline Raw Data Files Parsing and Reconstruction Tools (Windows) Decision Group
Xplico: concept, features and demo.
Networking for Home and Small Businesses – Chapter 6
Working at a Small-to-Medium Business or ISP – Chapter 7
الوحدة 5 مقدمة في شبكة الانترنت.
Direct Internet 3 Iridium Proprietary and Confidential 9/18/2018.
Networking for Home and Small Businesses – Chapter 6
Working at a Small-to-Medium Business or ISP – Chapter 7
Internet.
The Internet and the World Wide Web
Working at a Small-to-Medium Business or ISP – Chapter 7
E-Detective System Backup Server July 2010
Federal Law Enforcement
Network Forensic Investigations
Protocols 2 Key Revision Points.
Networking for Home and Small Businesses – Chapter 6
Presentation transcript:

E-Detective Network Investigation Toolkit - NIT (2010) Decision Group

Introduction to Network Investigation Toolkit What are the capabilities of NIT?  Interception of Ethernet LAN traffic through mirror port (or by network tap).  Interception of WLAN traffic (up to 4 different WLAN channels).  Intercept ion of Ethernet LAN HTTPS/SSL traffic by MITM attack.  Intercept ion of WLAN HTTPS/SSL traffic by MITM attack.  Real-time raw data decoding and reconstruction.  Offline raw data decoding and reconstruction.  Forensics analysis and investigation. Solution for: Lawful Enforcement Agencies (Police Intelligence, Military Intelligence, National Security, Counter Terrorism, Cyber Security, Defense Ministry etc.

NIT Implementation Mode (1)

NIT Implementation Mode (2)

NIT Implementation Mode (3)

NIT Implementation Mode (4)

NIT – Homepage – Status of Operation Display the current operation mode and status of implementation

IM/Chat (Yahoo, MSN, ICQ, QQ, IRC, Google Talk Etc.) Webmail HTTP (Link, Content, Reconstruct, Upload Download) File Transfer FTP, P2P Others Online Games Telnet etc. NIT Internet Protocols Supported

NIT – Homepage – Status of Operation Top-Down view on Case Results GUI.

Sample: (POP3, SMTP, IMAP)

Sample: Webmail (Read and Sent) Webmail Type: Yahoo Mail, Gmail, Windows Live Hotmail, Giga Mail and others

Sample: IM (Yahoo, MSN, ICQ etc.) Yahoo: Includes file transfer, webcam, voice call (GIPS Decoder Required) MSN: Includes file transfer, webcam

Sample: HTTP Link and HTTP Content

Sample: HTTP Video Streaming

Sample: Incomplete Connections Incomplete connection sessions can be viewed by binary-text viewer

Search – Free Text (Key Words) and Advanced Free Text (Key Words Search) Advanced Search (Conditional Search)

NIT – System Specifications (1)

NIT – System Specifications (2)

NIT – System Specifications (3)

NIT – System Specifications (4)

References – Implementation Sites and Customers  Criminal Investigation Bureau  The Bureau of Investigation Ministry of Justice  National Security Agency (Bureau) in various countries  Intelligence Agency in various countries  Ministry of Defense in various countries  Counter/Anti Terrorism Department  National Police, Royal Police in various countries  Government Ministries in various countries  Federal Investigation Bureau in various countries  Telco/Internet Service Provider in various countries  Banking and Finance organizations in various countries  Others Notes: Due to confidentiality of this information, the exact name and countries of the various organizations cannot be revealed.

Decision Group