Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

ISSC456_Project_Presentation_Intindolo

244 views

Published on

  • Be the first to comment

  • Be the first to like this

ISSC456_Project_Presentation_Intindolo

  1. 1. WIRELESS ATTACKS & IPHONE FORENSICS By John Intindolo ISSC456 Digital Forensics: InvestigatingWireless Networks and Devices ProfessorAndrew Ingraham (Iphone forensics, n.d.)(Wireless web, n.d.)
  2. 2. WIRELESS NETWORKS  What is aWireless Network?  Overview ofWireless Networks  WirelessTechnologies  Bluetooth  Infrared  Wi-Fi  Wireless USB (Wireless network advantages, n.d.)
  3. 3. WIRELESS ATTACKS  Methods  Wardriving  Warflying  Warchalking (Wardriver, n.d.) (Warchalking symbols, n.d.)
  4. 4. WIRELESS ATTACKS CONT’D.  Passive Attacks  Eavesdropping  Traffic Analysis  Traffic Monitoring ((Hacker, n.d.)
  5. 5. WIRELESS ATTACKS CONT’D.  Active Attacks  Denial-of-Service  Flooding  Man-in-the-Middle  Hijacking (Dos attack, n.d.)
  6. 6. BEST PRACTICES  Create aWireless Security Policy  Secure the Enterprise Wireless LAN  Secure the Enterprise Ethernet Network  Secure Corporate Laptops fromWirelessThreats When Outside the Enterprise  Educate Employees onWireless Policy
  7. 7. WIRELESS FORENSICS OVERVIEW  Obtain a Search Warrant  IdentifyWireless Devices  Rogue Access Point  Document the Scene  DetectWireless Connections/Wireless Field Strength
  8. 8. WIRELESS FORENSICS OVERVIEW CONT’D.  MapWireless Zones and Hot Spots  Connect to theWireless Network  Acquiring and Analyzing Data  Generate Report
  9. 9. IPHONE FORENSICS  Evidence Stored  Collection  Disable Automatic Syncing  Write Blocking  Image Evidence  Viewing Evidence (Iphone forensics 2, n.d.)
  10. 10. IPHONE FORENSICS CONT’D.  Breaking an iPhone Security Passcode  Acquire  Recover  Forensic Information  Analyze the Information
  11. 11. IPHONE FORENSICS CONT’D.  Jailbreaking  Tools  Encase  DiskInternals Music Recovery  Elcomsoft Phone Password Breaker  Cellebrite UFED  Katana Forensics Lantern
  12. 12. REFERENCES  Dos attack. (n.d.). Retrieved from http://botandbotnets.weebly.com/uploads/1/3/8/4/13840480/1556513_orig.jpg  Hacker. (n.d.). Retrieved from https://1.bp.blogspot.com/- mubCSoqmXbk/Um5vwbDHElI/AAAAAAAAYT8/5l-BUCCZFGQ/s800/Israeli Road Control System hack, shutting down Haifa highwayTraffic.jpg  IPhone forensics. (n.d.). Retrieved from http://www.htcia.org/wp- content/uploads/iphone_forensics.jpg  Iphone fornesics 2. (n.d.). Retrieved from http://www.google.com/imgres?imgurl=http://gcn.com/articles/2014/10/08/~/me dia/GIG/GCN/Redesign/Articles/2014/October/passware.png&imgrefurl=http://g cn.com/articles/2014/10/08/passware-ios- forensics.asp&xh=300&w=620&tbnid=VuG8m5Yj20emHM:&zoom=1&docid=A3 560UUrjbuwPM&ei=kx6RVMb7G6bGsQSZpoKwCw&tbm=isch&ved=0CEcQMyg gMCA&iact=rc&uact=3&dur=1600&page=2&start=15&ndsp=19
  13. 13. REFERENCES CONT’D.  Warchalking symbols. (n.d.). Retrieved from http://weblog.bergersen.net/wp/mt/archives/warchalk.gif  Wardriver. (n.d.). Retrieved from http://muskrat707.tripod.com/pictures/pageicon.gif  Wireless network advantages. (n.d.). Retrieved from http://wireless- head.net/img/wireless-network-advantages.jpg  Wireless web. (n.d.). Retrieved from http://www.renogeek.com/blog/wp- content/uploads/2014/08/wireless-1-web.jpg

×