GCK's Cybercrime and Cyberforensics-related URLs
3 July 2017
Please direct any questions, comments, suggestions, etc. about this URL list to Gary Kessler.
[ General Information & Education Resources | Journals, Conferences, Papers | Computer Crime, Cybercrime, & Legal Issues ]
[ Online Safety | Computer Forensics | Computer Forensics Tools | Mobile Device Forensics ]
[ Network Forensics | Electronic Discovery | Terrorism-Related Issues/Investigations ]
General Information & Education Resources
Journals, Conferences, Papers
- Digital Forensic Research Workshop (DFRWS)
- Digital Investigation (print, but some articles online)
- International Journal of Digital Crime and Forensics
- International Journal of Digital Evidence (IJDE), an online quarterly journal
- International Journal of Electronic Security and Digital Forensics
- Journal of Digital Forensic Practice
- Journal of Digital Forensics, Security and Law
- Small Scale Digital Device Forensics Journal (SSDDFJ) (online)
- Digital Forensics Magazine
- Digital Forensic Investigator News (online)
- FBI Law Enforcement Bulletin
- Data2Know.com: Internet & Online Intelligence Newsletter (Hetherington Information Services)
- Checkmate, an Incident Response and Digital Forensics e-zine (NII Consulting)
- Law Technology News
- Digital Discovery & e-Evidence (Pike & Fischer)
- Forensic Science Communications, a quarterly forensic science journal published by the FBI Laboratory
- Law Enforcement Technology Magazine
- NIJ DOCUMENTS: Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition (NCJ 219941) [ first edition (NCJ 187736)] | Forensic Examination of Digital Evidence: A Guide for Law Enforcement (NCJ 199408) | Investigations Involving the Internet and Computer Networks (NCJ 210798) | Digital Evidence in the Courtroom: A Guide for Law Enforcement and Prosecutors (NCJ 211314)
- "Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations" (DOJ) ( PDF (2009) | PDF (2002))
- "Good Practice Guide for Computer based Electronic Evidence" (Association of Chief Police Officers, U.K.)
- CERT First Responder Guides: First Responders Guide to Computer Forensics | First Responders Guide to Computer Forensics: Advanced Topics
- FBI "Handbook of Forensic Services", Computer Evidence Examinations
- "Best Practices For Seizing Electronic Evidence", V3 (U.S. Secret Service) [V2: HTML | PDF)
- SWGDE documents
- The Internet Engineering Task Force's "Guidelines for Evidence Collection and Archiving" (RFC 3227)
- "Law Enforcement Tools and Technologies for Investigating Cyber Attacks: A National Research and Development Agenda" (ISTS)
- "Know Your Enemy: A Forensic Analysis" and other papers
- "What is electronic evidence?" (Center for Computer Forensics)
- "An Introduction to the Field Guide for Investigating Computer Crime" (T.E. Wright)
- "How the FBI investigates computer crimes"
- "Tracking a Computer Hacker" (D.A. Morris) | "Criminal Profiling, Computers, and the Internet" (E. Casey)
- SECURE DISK WIPING: "Secure Deletion of Data from Magnetic and Solid-State Memory" [alt.] (P. Gutmann) | "The Difficulty of Data Annihilation from Disk Drives: or Exnihilation Made Easy" (D. Devera) | "Can Intelligence Agencies Read Overwritten Data? A repsonse to Gutmann" (D. Feenburg) | Guidelines for Media Sanitization (NIST Special Publication 800-88)
- "Recovering Unrecoverable Data: The Need for Drive-Independent Recovery" (C.H. Sobey)
- "Evaluating Commercial Counter-Forensic Tools" (M. Geiger)
- General forensics: Crime & Clues: The Art and Science of Criminal Investigation | Crime Scene Investigation
- Subscribe to DCCI Dispatch
- Future Crimes: Anticipating Tomorrow's Crimes Today
- BLOGS: ComputerForensicsDigest.com (Fred Lane) | A Fistful of Dongles (Eric Huber) | ForensicDev (Martin Siefert) | BitSec Forensics Blog (Mike Webber) | Lance Mueller's Forensics Blog (includes EnScript tutorials!) | Forensic 4cast | exforensics (Larry Daniel/Guardian Digital Forensics) | int for(ensik){blog;} (Andreas Schuster & Mathieu Suiche) | Windows Incident Response (Harlan Carvey) | Volatile memory analysis research (Volatility) | A Geek Raised by Wolves (Jesse Kornblum) | Marc Rogers (Purdue University) | CyberSpeak's Podcast | SANS Computer Forensics Blog | Forensic Computing blog | Forensic Incident Response | PC-Eye (Digital Forensics) | Forensic Focus Blog | Solid Forensics Blog
- TWEETS (ok, I don't twitter but other people do... here are some ones possibly worth following...):
- Digital Forensics: @keydet89 (Harlan Carvey & Windows Forensics) | @Forensically (FS Labs - ForensicallySpeaking) | @AccessDataGroup (AccessData) | @sansforensics (SANS Forensics) | @EnCase (EnCase) | @Techpathways (Technology Pathways) | @forensickb (ForensicKB.com) | @DigitalDetectiv (Digital Detective.co.uk) | @sandersonforens (Paul Sanderson) | @forensikblog (Andreas Schuster) | @ericrobi (Eric Robi) | @CyberCrime101 (Joe Garcia) | @DFMag (Digital Forensics Magazine)
- Pen-testing, ethical hacking, and other info security: @schneierblog (Schneier Blog) | @briankrebs (Brian Krebs) | @taosecurity (Richard Bejtlich) | @DCITA (US Defense Cyber Investigations Training Academy) | @opexxx (Alexander Knorr) | @wimremes (Wim Remes) | @danchodanchev (Dancho Danchev) | @jeremiahg (Jeremiah Grossman) | @InternetLaw (InternetLaw) | @edskoudis (Ed Skoudis) | @drericcole (Eric Cole) | @DaveMarcus (Dave Marcus) | @hdmoore (HD Moore (Rapid 7, Metasploit)) | @mikkohypponen (Mikko H. Hypponen) | @OComputing (Offensive Computing)
Computer Crime, Cybercrime, & Legal Issues
Online Safety
Computer Forensics
Computer Forensics Tools
- Python Forensics: Innovative solutions for digital investigation (Chet Hosmer)
- FREE TOOLS: Free computer forensic tools; a list by Forensic Control of 125+ free tools for Disk tools and data capture, Email analysis, File and data analysis, Mac OS, Mobile devices, File viewers, Internet analysis, Registry analysis, and more | Sleuth Kit and Autopsy | MiTeC, a slew of nice utility tools (Windows Registry Recovery, Windows File Analyzer, Internet History Browser, E-mail History Browser, Instant Messaging History Browser, and more...) || Free tools from Mandiant, including memory forensics, malware analysis, and Web history file analysis | Many utilities from WoanWare, including prefetch, lnk file analysis, USB analysis, browser (FF, Opera, Chrome) extraction, and more | Tools from EviGator, including ClockSmith, GPS tag viewer, and plist viewer | Brian Carrier's Open Source Digital Forensics page (Bootable Environments, Data Acquisition, Media Management, File System, and Application tools)
- LINUX FORENSICS BOOT DISKS: SANS Investigative Forensic Toolkit (SIFT) Workstation Version 3.0 Paladin (Sumuri) | SMART Linux | Digital Evidence Forensic Toolkit (DEFT) Linux (Computer Forensics live cd) | Helix | CAINE (Computer Aided INvestigative Environment) | Kali Linux (formerly BackTrack) |
Knoppix STD (Security Tools Distribution) [old] | Penguin Sleuth [old]
- COMPUTER FORENSICS TOOLS: dtSearch text finding tool | EnCase (Guidance Software) | AccessData (Forensic Toolkit (FTK), SecureClean, WipeDrive, and password recovery) | Maresware Suite (Mares & Co.) | ProDiscover (Technology Pathways) | Digital Intelligence, Inc. | Paraben Forensic Tools| ILook Investigator (Law Enforcement only) | Forensic Acquisition Utilities (G.M. Garner) [Alt. link] | 10-23 On-Scene Investigator || Network Intrusion's list of forensics tools and forensics toolkits | Windows Forensic Toolchest (WFT) | fbi (E-mail and data forensics software) | KnTTools | Machor Software (Win Forensic Analysis, Firefox Forensics, Google Chrome Forensics)
- VIRTUAL VIEW OF COMPUTER IMAGE: Live View (CERT) | raw2vmdk
- National Software Reference Library (NSRL) Project (NIST)
- TUCOFS - The Ultimate Collection of Forensic Software
- FILE CARVING: Simple Carver Suite (Tim Coakley) [Tim's free tools] | DataLifter | Scalpel: A Frugal, High Performance File Carver | Photorec, digital picture recovery | Recover My Files | "Measuring and Improving the Quality of File Carving Methods (Kloet, 2007)
- Online conversion utilities (Number base converter, date/time conversion, integer/IPv4 address conversion, string hash, XOR/ADD stream encryption)
- Hiren's BootCD (partition, disk clone, recovery, testing, hard disk, system info, MBR, BIOS/CMOS, password, file system, and other tools)
- CERT Forensics tools (including LE-only tools)
- COMPUTER FORENSICS HARDWARE: Intelligent Computer Solutions | Digital Intelligence, Inc. | wiebeTECH | Data Forensics Engineering | Forensic Computers || iFixit manuals for Macs and iPods
- KEYSTROKE LOGGERS: Keylogger.org | KEYKatcher | KeyGhost | Blazing Tools Software Perfect Keylogger || Anti-Keylogger
- GCK'S PAPERS: List of File Signatures (includes pointers to magic numbers, file extension pages, and graphics file formats)
| The BASE64 and BASE32 Alphabets | ASCII Decimal and Hexadecimal Conversion Table
HASH SETS: HashKeeper (DOJ) | National Software Reference Library | Mares Hash Set CD
PARSING TOOLS: GCK's boot sector, MBR, MFT, FAT directory, INFO2, and other parsers | Many parsing tools from Red Wolf (include Gmail, folder, Skype logs, Recycle bin, and more...)
"List of Known Spyware" (unconfirmed list) | SpyArsenal.com
Sysinternals Windows and Linux internals software
File and data recovery software
Karen's Power Tools
BROWSER TOOLS: firefoxforensics | Karen's Cookie Viewer | Computer History Viewer (Elongsoft) | IE History View (NirSoft) | Web Cache Illuminator (Northstar Solutions) | Protected Storage PassView (NirSoft) | FireFox Forensics (Machor) | FoxAnalysis | ChromeAnalysis
RAM ANALYSIS: "The Acquisition and Analysis of Random Access Memory" (Vidas, JDFP, 1(4), Dec. 2006) || Windows 2000 memory parser (Carvey) | The Volatility Framework | Intel(R) Regimented Potential Incident Examination Report (RPIER) | memparser (DFRWS 2005) | Memory DD (MDD, ManTech) | Memoryze (Mandiant) | DumpIt (DumpIt download) | HBGary Responder and Fast Dump and more | F-Response | BinText | KnTTools | PyFlag | Interrogate: POC to identify crypto keys in RAM || Key Extraction (Brian Kaplan)
REGISTRY: Registry Ripper (Carvey) | Regshot (before and after registry comparison) | ERUNT (The Emergency Recovery Utility NT)
Dan Mares' Forensic Software Sources plus another list: A-C, D-F, G-K, L-O, P-S, T-Z
ANTI-FORENSICS: Network Intrusion's list of antiforensic tools | Metasploit Anti-forensics site (including Metasploit Anti-Forensic Investigation Arsenal (MAFIA)) | Plausible Deniability ToolKit | Detect and Eliminate Computer Assisted Forensics (DECAF) || "How Online Criminals Make Themselves Tough to Find, Near Impossible to Nab" (S. Berinato) | "'Dementia' Wipes Out Attacker Footprints In Memory"
WEB SITE DOWNLOAD: Web Page Saver (WPS) | HTTrack || See also Sam Spade software!
UNIX/LINUX: THE FARMER'S BOOT CD (FBCD) (see also manual) | BackTrack | Linux-Forensics.com (Penguin Sleuth) | The Coroner's Toolkit (TCT), from Dan Farmer and Wietse Venema, a toolkit for incident response/forensic analysis of Unix systems | "Freeware Forensics Tools for Unix" (D. Cheng) | "Basic Steps in Forensic Analysis of Unix Systems" (D. Dittrich) | Bill Stearns' CD of statically linked forensics tools | Forensics Incident Response Environment - F.I.R.E. (Melior, Inc. & DMZS FIRE CD) | Open Source UNIX Forensics Tools
WHOLE-DISK ENCRYPTION DETECTION: ZeroView | Encrypted Disk Detector (EDD)
MALICIOUS DOCUMENTS: "Analyzing Malicious Documents Cheat Sheet" (L. Zeltser) | "Dissecting a Malicious Word Document" (Kahu Security)
NOVELL: Captain Nemo - Multi Platform File Manager
MAC OS: The Apple Examiner | Ultimate Guide to Mac OS Forensics | Mac Forensics | BlackBag Macintosh Forensic Software | SubRosaSoft MacForensicsLab | HackMac.org || "FireWire Target Disk Mode Guidelines" (BlackBag Technologies) || Lion (MacOS X 10.7) artifacts
Tech Assist Forensics & Secruity Tools | "File Vault Imaging: Apple's Dirty Little Secrets" (Zdziarski)
MAC TIME ALTERATION (WINDOWS): PropertiesPlus | FileTime (VB) | AttributeMagic Pro | febooti fileTweak | ShellToys Change Date & Time | FAQ about PC clocks
TIMESTAMPS: "A brief history of timestamps" (Sanderson Forensics) | DCode and additional timestamp information
Removing/accessing the hard drive from a variety of devices (Sanderson Foresnics)
Wotsit's Format (file format information on hundreds of different file types)
Forensic Acquisition Utilities (Windows versions of dd, md5sum, netcat, and more!)
RDA - Remote Data Acquisition utility
Protected Storage Explorer
Default Password List
Forensic and Log Analysis GUI (FLAG) | PyFlag (FLAG ported to Python
md5deep (cross-platform program to compute MD5 digests on an arbitrary number of files)
Silent Runners (VBS script to identify programs that start up with Windows)
Steganography detection: WetStone Technologies | OutGuess | SpyHunter stego page
EXIF data extraction: ExifTool by Phil Harvey (Allows reading, writing, and editing of metadata in many file types; Windows and Mac versions) | exiftags utility | EXIF-O-Matic | Exifer for Windows | jhead | metadata extractor (Java) [D. Noakes] | "Exchangeable Image file Format (ExIF)" (C. Brown) | (While on the topic of JPEG, see JPG Degradation over Successive Saves)
REGISTRY: "Forensic Analysis of the Windows Registry"
METADATA: Metadata Assistant for Word, Excel and PowerPoint (Payne) | Open Office Metadata Extractor | FOCA | Digital photos as evidence (Hodges)
IMAGES: TinEye, reverse image search engine
"Evidentiary Value of Link Files" (Weilbacher)
Windows Forensics and Incident Recovery site and Forensic Server Project (Carvey)
CASE TIMELINE/VISUALIZATION TOOLS: i2 Analyst's Notebook, visual investigative analysis software | CaseAnalysis (CaseMap, TimeMap)
COMPUTER FORENSICS & VISUALIZATION: "Visual Computer Forensic Analysis" (K. Jones) | rumint
HARDWARE INFORMATION: pc-hardware-faq/enhanced-IDE | Hard Disk Drives (from The PC Guide) | DEW Associates Corporation Knowledge Center (articles on ACPI-compliant BIOS, CMOS, firmware, virtual memory, motherboards, and hard drives) | SCSI Storage Interfaces (T10 Technical Comm.) | ATA drives (T13 Technical Comm.)
FILE SYSTEMS: "FAT (File Allocation Table) File System Tutorial (Seamons) | "FAT: General Overview of On-Disk Format (Microsoft) | "Microsoft Extensible Firmware Initiative, FAT32 File System Specification, FAT: General Overview of On-Disk Format" (Microsoft) | "NTFS file system" (Mikhailov) | "NTFS Documentation" (Russon & Fledel) | "The EXT2 File System" (The Linux Tutorial site) | Apple Computer Technical Note TN1150, "HFS Plus Volume Format" || File system (Wikipedia) | Comparison of file systems (Wikipedia)
Video Previewer (Tim Coakley)
MAGNETIC FORCE MICROSCOPY (MFM): MFM overview | "Magnetic Force Microscopy (MFM)" (Alexeev & Popkov) | Magnetic Resonance Force Microscopy (IBM Almaden Research Center), w/ MPEG animation | Scanning Probe Microscopy | "Scanning Probe Microscopy (SPM)" (J.W. Cross)
SOLID-STATE/USB DEVICES: "Solid State Drives and Data Recovery" | "USB Key Analysis vs. USB Drive Enclosure Analysis" (Rob Lee) | "Updated: Computer Forensic Guide To Profiling USB Thumbdrives on Win7, Vista, and XP"
DISK WIPING SOFTWARE: Wipe Free Space | Darik's Boot and Nuke (DBAN) | BCWipe | Eraser
CD Emulator (open source)
See also GCK's pointers to crypto/stego tools and passwords crackers/hacker tools.
Mobile Device Forensics
- P3: Purdue Phone Phorensics Knowledge Base
- Mobile Forensics World Conference site (Videos from 2008, including GCK's video)
- The Computer Forensic Reference Data Sets (CFReDS) Project (NIST) -- Mobile phone data
- e-evidence info: Cellular/Mobile Phone Forensics papers and pointers
- AntennaSearch.com
- CELL PHONE TECHNOLOGY: GSM World | CDMA World Forum
- MOBILE PHONE ANALYSIS: "Cell Phone Forensic Tools: An Overview and Analysis" (NIST IR 7250) | "Cell Phone Forensic Tools: An Overview and Analysis Update" (NIST IR 7387) | "Mobile Forensic Reference Materials: A Methodology and Reification" (NIST IR 7617) | "Guidelines on Cell Phone Forensics" (NIST SP 800-101) | "Forensic Examination of a RIM (BlackBerry) Wireless Device" (M.W. Burnette) | Creating a Cell Phone Investigation Toolkit: Basic Hardware and Software Specifications (SEARCH) | SEARCHinvestigative toolbar | phone scoop | Carrier info from NANPA | FCC Antenna Structure Registration site | FoneFinder | Mobile Forensics Central ( TEELtechnologies) | e-evidence.info pointers... | PhoneNews.com | Forensics Telecommunications Services (FTS) | Phone-Forensics portal
- MOBILE PHONE EXAMINATION PRODUCTS: Santuko-Linux (A bootable Linux environment to make life easier) | BitPim (CDMA) | CelleBrite (Cellebrite UFED YouTube Channel) | Micro Systemation .XRY/.XACT | Oxygen Forensic Suite | Paraben | MOBILedit! | SIMCon | Susteen DataPilot | Cell Phone Analyzer | SmartMoto/Smart-Clip | BKFORENSICS | Fernico ZRT (camera/software) | CDMA Software | ESN Converter tool
- Cell Phone Erasure instructions
- GSM 11.11 specification (SIM card)
- PDA ANALYSIS: NIST IR 7100: "PDA Forensic Tools: An Overview and Analysis" (August 2004) | NIST SP 800-72: "Guidelines on PDA Forensics" | "iPod Forensics" (Marsico & Rogers) | "iPod Forensics Update" (Kiley, Shinbara, & Rogers) | DVD Forum || pilot-link (Linux<->PalmOS) | Palm OS Emulator (POSE) | Palm dd (pdd) | ABC Amber BlackBerry Converter
- SMS: "SMS and the PDU Format" | "Understanding SMS" (Harrington) || SMS tools (for GSM Phones)
- Nokia secret codes
- MOTOROLA-RELATED: OpenEZX: Motorola EZX GSM phone wiki | Motorola-Tools.com
- iPHONE: iPHONE INSECURITY (J. Zdziarski) [See also Waterboard: Advanced Forensic Logical Acquisition for iOS Devices] | The Apple Examiner | iphone-dataprotection | iPhones | iPhone Forensics Centre | Mobilyze (Black Bag) | iPhone Analyzer (SourceForge) | Katana Forensics | SpyCalc, hide videos, programs, and more on an iPhone or iPod || theiphonewiki
- Canon Hacker's Development Kit
- ANDROID OS: Android Forensics (viaForensics) [open source forensics application | viaForensics' Wiki] | "Five Great Reasons to Root Your Android Phone" | Open Source Android Forensics Toolkit
- Eoghan Casey on physical analysis of cell phones
- GPS: GPSForensics.org | Forensics Wiki | TomTom devices (Forensic Focus) | Paraben | GPSBabel (Free software for GPS data conversion and transfer)
- GPS TOOLS: GPS Coordinate Converter, Maps and Info | Degrees, Minutes, Seconds and Decimal Degrees Latitude/Longitude Conversions (FCC) | Opanda IExif viewer (excellent GPS conversion)
- CrashCube Project, extracting carsh data from automobiles (EU)
- MOBILE PHONE SPOOFING (see CALLER ID SPOOFING, below)
- BLOGS: Mobile Device Forensics (Michael Harrington)
- IMEI DATABASES: IMEI Number Lookup | IMEI.info | Jeevan's IMEI analyser v1.6 | nobbi.com Database of Manufacturer, Model and TAC
- CELL SITE ANALYSIS: Pinging Cell Phone Location and Understanding Cell Tower Information (Willingham, B.) | Litigators Guide to Simplified Cellular Carrier Cell Site Working Range Estimation Issues (John Minor) | "The Limitations and Admissibility of Using Historical Cellular Site Data to Track the Location of a Cellular Phone" [Blank, A., Richmond Journal of Law & Technology, 18(1)] | "Cell Tower Victories" [Cherry M., et al., 2011]
Network Forensics
| NEMX || "Understanding E-mail" (NDAA) | "The ECPA, ISPs & Obtaining E-mail (NDAA) | "How to View Email Headers" (SEARCH) | "CSI: Lost e-mails" (S. Ulfelder, Network World, 9/2003) | Yahoo! Messenger Archive Decoder | "Tracking E-mail" (G.E. Boyd)
INSTANT MESSAGING AND CHATTING: "A study of Internet instant messaging and chat protocols" (IEEE Network) || Yahoo! Messenger Protocol (Wiki) | Yahho Messenger Protocol (Venky's World) | Yahoo Protocol Tutorial | Yahoo Messenger Protocol v9 | YMSG Packet Types | AIM/OSCAR Protocol (Wiki) | GAIM protocols | MSN Messenger Protocol page | Msn Messenger Protocol (Venky's World)
Geobytes IP Address Locator Tool (pretty good, usually)
Infobin Information Services ISP Contact List
SOCIAL NETWORKS: Facebook JPG Finder (FJF) | Fchat | Facebook Chat Forensics
CALLER ID SPOOFING: Telespoof | SpoofCard | Star38.com (stealth telecom) | trapcall (Unmask blocked CallerID) || "CID/ANI spoofing on VoIP using Asterisk" | "VoIP hacks gut Caller I.D." (K. Poulsen, July 2004)
TELEPHONE SEARCH SITES: AnyWho | Switchboard Internet Yellow Pages and White Pages (and maps!) | Phonebooks.com (International) | Canada411 | fonefind.com | FoneFinder
Family Watchdog (National Sex Offender Registry)
ONLINE CHAT TERMS AND VERNACULAR: English internet slang (Wiktionary) | Sharpened Glossary | NetLingo List of Internet Acronyms & Text Message Jargon | Chat, E-Mail, Web, and chat room slang and acronyms | Slang list from NCMEC (PDF) | "A Parents Guide to Internet Lingo" (SpectorSoft) (PDF)
Chat site, text messaging, etc. lingo | Chat Abbreviations
PEOPLE SEARCHES: Pipl | freeality.com Internet Search Engines | skipease The People Search Network (skiptracing) | Veromi: The Trusted Information Source | DOCUSEARCH | NetDetective | NETR Real Estate Information and Public Records Research | ZabaSearch | Spock People Search | spokeo | MyLife people search | SearchBug (includes people search by address | WhitePages.com (includes reverse lookups) | Directory Assistance plus | zoominfo | SearchSystems.net public records directory | l.e.a.d.s.online | Entersect Corp. | peoplefinders | intellus.com | INTELIUS | GorillaTrace - Metasearch for Investigative Professionals
ONLINE PRESENCE: Google BlogSearch | Snitch.Name
Ziggs, a site that allows a person to be notified when someone Googles them -- and to find out who was Googling!
SOCIAL SECURITY NUMBERS: SSN Verification (SSA.gov) | SSN validation software (Maresware)
SATELLITE PICTURES: TerraFly (Java) | TerraServer | TerraServer-USA | Google maps
SOCIAL NETWORKS: Social network analysis | PieSpy Social Network Bot | Snitch.Name | YoName
BOT NETS: "Know your Enemy: Tracking Botnets (Honeynet Project) | "Botnets as a Vehicle for Online Crime" (CERT) | "An Inside Look at Botnets" | "Attack of the Bots (WIRED, 14.11, Nov. 2006) || ZeuS Tracker
Online Investigator's Handbook
WIFI GEOLOCATION: Windows Incident Response blog (9/27/2009) | Skyhook WiFi Geolocation
MoocherHunter, mobile tracking software tool (LE version available)
VoIP/SKYPE: Paraben Chat Examiner | Red Wolf Skype parser || Skypeex (Extract Skype chats from a RAM dump)
INTEL GATHERING ON THE INTERNET: Automating OSINT (Seitz)
Electronic Discovery
Terrorism-Related Issues/Investigations
Return to your last page...