Network Forensic Tool -- Concept and Architecture

Author(s):  
Mrunal H. Mate ◽  
Smita R. Kapse
Keyword(s):  
2018 ◽  
Vol 5 (2) ◽  
pp. 73-83
Author(s):  
Hussein Abed Ghannam

WhatsApp is a giant mobile instant message IM application with over 1billion users. The huge usage of IM like WhatsApp through giant smart phone “Android” makes the digital forensic researchers to study deeply. The artefacts left behind in the smartphone play very important role in any electronic crime, or any terror attack. “WhatsApp” as a biggest IM in the globe is considered to be very important resource for information gathering about any digital crime. Recently, end-to-end encryption and many other important features were added and no device forensic analysis or network forensic analysis studies have been performed to the time of writing this paper. This paper explains how can we able to extract the Crypt Key of “WhatsApp” to decrypt the databases and extract precious artefacts resides in the android system without rooting the device. Artefacts that extracted from the last version of WhatsApp have been analysed and correlate to give new valuable evidentiary traces that help in investigating. Many hardware and software tools for mobile and forensics are used to collect as much digital evidence as possible from persistent storage on android device. Some of these tools are commercial like UFED Cellebrite and Andriller, and other are open source tools such as autopsy, adb, WhatCrypt. All of these tools that forensically sound accompanied this research to discover a lot of artefacts resides in android internal storage in WhatsApp application.


2017 ◽  
Vol 5 (2) ◽  
pp. 15-46 ◽  
Author(s):  
Daniel Spiekermann ◽  
Tobias Eggendorfer ◽  
◽  

Author(s):  
Kazuki Hashimoto ◽  
Hiroyuki Hiruma ◽  
Takashi Matsumoto ◽  
Kosetus Kayama ◽  
Yoshio Kaikizaki ◽  
...  

2014 ◽  
Vol 2014 ◽  
pp. 1-27 ◽  
Author(s):  
Suleman Khan ◽  
Muhammad Shiraz ◽  
Ainuddin Wahid Abdul Wahab ◽  
Abdullah Gani ◽  
Qi Han ◽  
...  

Network forensics enables investigation and identification of network attacks through the retrieved digital content. The proliferation of smartphones and the cost-effective universal data access through cloud has made Mobile Cloud Computing (MCC) a congenital target for network attacks. However, confines in carrying out forensics in MCC is interrelated with the autonomous cloud hosting companies and their policies for restricted access to the digital content in the back-end cloud platforms. It implies that existing Network Forensic Frameworks (NFFs) have limited impact in the MCC paradigm. To this end, we qualitatively analyze the adaptability of existing NFFs when applied to the MCC. Explicitly, the fundamental mechanisms of NFFs are highlighted and then analyzed using the most relevant parameters. A classification is proposed to help understand the anatomy of existing NFFs. Subsequently, a comparison is given that explores the functional similarities and deviations among NFFs. The paper concludes by discussing research challenges for progressive network forensics in MCC.


Sign in / Sign up

Export Citation Format

Share Document