SlideShare a Scribd company logo
WIRELESS ATTACKS & IPHONE
FORENSICS
By John Intindolo
ISSC456 Digital Forensics: InvestigatingWireless Networks and Devices
ProfessorAndrew Ingraham
(Iphone forensics, n.d.)(Wireless web, n.d.)
WIRELESS NETWORKS
 What is aWireless Network?
 Overview ofWireless Networks
 WirelessTechnologies
 Bluetooth
 Infrared
 Wi-Fi
 Wireless USB
(Wireless network advantages, n.d.)
WIRELESS ATTACKS
 Methods
 Wardriving
 Warflying
 Warchalking
(Wardriver, n.d.)
(Warchalking symbols, n.d.)
WIRELESS ATTACKS CONT’D.
 Passive Attacks
 Eavesdropping
 Traffic Analysis
 Traffic Monitoring ((Hacker, n.d.)
WIRELESS ATTACKS CONT’D.
 Active Attacks
 Denial-of-Service
 Flooding
 Man-in-the-Middle
 Hijacking
(Dos attack, n.d.)
BEST PRACTICES
 Create aWireless Security Policy
 Secure the Enterprise Wireless LAN
 Secure the Enterprise Ethernet Network
 Secure Corporate Laptops fromWirelessThreats
When Outside the Enterprise
 Educate Employees onWireless Policy
WIRELESS FORENSICS OVERVIEW
 Obtain a Search Warrant
 IdentifyWireless Devices
 Rogue Access Point
 Document the Scene
 DetectWireless Connections/Wireless Field
Strength
WIRELESS FORENSICS OVERVIEW
CONT’D.
 MapWireless Zones and Hot Spots
 Connect to theWireless Network
 Acquiring and Analyzing Data
 Generate Report
IPHONE FORENSICS
 Evidence Stored
 Collection
 Disable Automatic Syncing
 Write Blocking
 Image Evidence
 Viewing Evidence
(Iphone forensics 2, n.d.)
IPHONE FORENSICS CONT’D.
 Breaking an iPhone Security Passcode
 Acquire
 Recover
 Forensic Information
 Analyze the Information
IPHONE FORENSICS CONT’D.
 Jailbreaking
 Tools
 Encase
 DiskInternals Music Recovery
 Elcomsoft Phone Password Breaker
 Cellebrite UFED
 Katana Forensics Lantern
REFERENCES
 Dos attack. (n.d.). Retrieved from
http://botandbotnets.weebly.com/uploads/1/3/8/4/13840480/1556513_orig.jpg
 Hacker. (n.d.). Retrieved from https://1.bp.blogspot.com/-
mubCSoqmXbk/Um5vwbDHElI/AAAAAAAAYT8/5l-BUCCZFGQ/s800/Israeli
Road Control System hack, shutting down Haifa highwayTraffic.jpg
 IPhone forensics. (n.d.). Retrieved from http://www.htcia.org/wp-
content/uploads/iphone_forensics.jpg
 Iphone fornesics 2. (n.d.). Retrieved from
http://www.google.com/imgres?imgurl=http://gcn.com/articles/2014/10/08/~/me
dia/GIG/GCN/Redesign/Articles/2014/October/passware.png&imgrefurl=http://g
cn.com/articles/2014/10/08/passware-ios-
forensics.asp&xh=300&w=620&tbnid=VuG8m5Yj20emHM:&zoom=1&docid=A3
560UUrjbuwPM&ei=kx6RVMb7G6bGsQSZpoKwCw&tbm=isch&ved=0CEcQMyg
gMCA&iact=rc&uact=3&dur=1600&page=2&start=15&ndsp=19
REFERENCES CONT’D.
 Warchalking symbols. (n.d.). Retrieved from
http://weblog.bergersen.net/wp/mt/archives/warchalk.gif
 Wardriver. (n.d.). Retrieved from
http://muskrat707.tripod.com/pictures/pageicon.gif
 Wireless network advantages. (n.d.). Retrieved from http://wireless-
head.net/img/wireless-network-advantages.jpg
 Wireless web. (n.d.). Retrieved from http://www.renogeek.com/blog/wp-
content/uploads/2014/08/wireless-1-web.jpg

More Related Content

What's hot

George Delaportas - VEDICOR (Hacking CV)
George Delaportas - VEDICOR (Hacking CV)George Delaportas - VEDICOR (Hacking CV)
George Delaportas - VEDICOR (Hacking CV)
PROBOTEK
 
Implementing Enterprise Wireless Security Policy in the BYOD Era
Implementing Enterprise Wireless Security Policy in the BYOD EraImplementing Enterprise Wireless Security Policy in the BYOD Era
Implementing Enterprise Wireless Security Policy in the BYOD Era
Kappa Data
 
FRONTIERS IN CRYPTOGRAPHY
FRONTIERS IN CRYPTOGRAPHYFRONTIERS IN CRYPTOGRAPHY
FRONTIERS IN CRYPTOGRAPHY
LINE Corporation
 
Securing Internet of Things
Securing Internet of ThingsSecuring Internet of Things
Securing Internet of Things
Rishabh Sharma
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
Fabio Pietrosanti
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
Kenny Huang Ph.D.
 
Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 ) ClubHack
 
Ch 04 wireless security
Ch 04 wireless securityCh 04 wireless security
Ch 04 wireless security
ChaushreeeLamichhane
 
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
viaForensics
 
The New frontiers in Information Security
The New frontiers in Information SecurityThe New frontiers in Information Security
The New frontiers in Information Security
Vineet Sood
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
Santosh Satam
 
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
CableLabs
 
John Yessis - Telecom and Security
John Yessis - Telecom and Security John Yessis - Telecom and Security
John Yessis - Telecom and Security
John Yessis
 
Network Appliances at Rhino Labs Inc.
Network Appliances at Rhino Labs Inc. Network Appliances at Rhino Labs Inc.
Network Appliances at Rhino Labs Inc.
Shane Williams
 
Research Issues
Research IssuesResearch Issues
Research Issues
HerrycaRonaldo
 
Your Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTYour Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoT
WSO2
 
Internet safty
Internet saftyInternet safty
Internet safty
Collinwood
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019
Tonex
 
Drawing the Line Correctly: Enough Security, Everywhere
Drawing the Line Correctly:   Enough Security, EverywhereDrawing the Line Correctly:   Enough Security, Everywhere
Drawing the Line Correctly: Enough Security, Everywhere
LINE Corporation
 

What's hot (20)

George Delaportas - VEDICOR (Hacking CV)
George Delaportas - VEDICOR (Hacking CV)George Delaportas - VEDICOR (Hacking CV)
George Delaportas - VEDICOR (Hacking CV)
 
Implementing Enterprise Wireless Security Policy in the BYOD Era
Implementing Enterprise Wireless Security Policy in the BYOD EraImplementing Enterprise Wireless Security Policy in the BYOD Era
Implementing Enterprise Wireless Security Policy in the BYOD Era
 
FRONTIERS IN CRYPTOGRAPHY
FRONTIERS IN CRYPTOGRAPHYFRONTIERS IN CRYPTOGRAPHY
FRONTIERS IN CRYPTOGRAPHY
 
Securing Internet of Things
Securing Internet of ThingsSecuring Internet of Things
Securing Internet of Things
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 )
 
Ch 04 wireless security
Ch 04 wireless securityCh 04 wireless security
Ch 04 wireless security
 
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
 
The New frontiers in Information Security
The New frontiers in Information SecurityThe New frontiers in Information Security
The New frontiers in Information Security
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
 
BYOD and Your Business
BYOD and Your BusinessBYOD and Your Business
BYOD and Your Business
 
John Yessis - Telecom and Security
John Yessis - Telecom and Security John Yessis - Telecom and Security
John Yessis - Telecom and Security
 
Network Appliances at Rhino Labs Inc.
Network Appliances at Rhino Labs Inc. Network Appliances at Rhino Labs Inc.
Network Appliances at Rhino Labs Inc.
 
Research Issues
Research IssuesResearch Issues
Research Issues
 
Your Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTYour Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoT
 
Internet safty
Internet saftyInternet safty
Internet safty
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019
 
Drawing the Line Correctly: Enough Security, Everywhere
Drawing the Line Correctly:   Enough Security, EverywhereDrawing the Line Correctly:   Enough Security, Everywhere
Drawing the Line Correctly: Enough Security, Everywhere
 

Viewers also liked

урок доброты
урок добротыурок доброты
урок доброты
arzmary
 
Introduccinalinternetysusservicios andrea
Introduccinalinternetysusservicios andreaIntroduccinalinternetysusservicios andrea
Introduccinalinternetysusservicios andrea
Kathia Chiquita
 
Professional Certifications and Achievements
Professional Certifications and AchievementsProfessional Certifications and Achievements
Professional Certifications and AchievementsAbhishek Verma
 
Tik bab 2 kls 9
Tik bab 2 kls 9Tik bab 2 kls 9
Tik bab 2 kls 9
dinoartacahyono
 
Bibliography
BibliographyBibliography
Bibliography
Methembedarikwa5
 
Bxd 681 qd-bxd-12072016
Bxd 681 qd-bxd-12072016Bxd 681 qd-bxd-12072016
Bxd 681 qd-bxd-12072016
Tuấn Vinh Huỳnh
 
Робота Маріупольської ЗОШ № 31
Робота Маріупольської ЗОШ № 31Робота Маріупольської ЗОШ № 31
Робота Маріупольської ЗОШ № 31
blackcat
 
NEHF Happy, Healthy, at Home symposium 100117 Session 3 - Making Connections
NEHF Happy, Healthy, at Home symposium 100117   Session 3 - Making ConnectionsNEHF Happy, Healthy, at Home symposium 100117   Session 3 - Making Connections
NEHF Happy, Healthy, at Home symposium 100117 Session 3 - Making Connections
Health Innovation Wessex
 
Recording studio dubai
Recording studio dubaiRecording studio dubai
Recording studio dubai
feelproductions
 
Llevats
LlevatsLlevats
Un Bello Hogar Lección 1
Un Bello Hogar Lección 1 Un Bello Hogar Lección 1
Un Bello Hogar Lección 1
Henry Alexander Salgado Martinez
 
News 4 youth_Jeunes-CSC_janv2016
News 4 youth_Jeunes-CSC_janv2016News 4 youth_Jeunes-CSC_janv2016
News 4 youth_Jeunes-CSC_janv2016
JeunesCSC
 
My 5 minutes bell
My 5 minutes bellMy 5 minutes bell
My 5 minutes bell
Andoni Duhart
 
Boston Real Estate Report
Boston Real Estate ReportBoston Real Estate Report
Boston Real Estate Report
Joshua Stiles
 
Summary of Learning
Summary of Learning Summary of Learning
Summary of Learning
Sheri Schlosser
 
Franchise-Opp-Brochurev2
Franchise-Opp-Brochurev2Franchise-Opp-Brochurev2
Franchise-Opp-Brochurev2David Dembinski
 
Interior Design Autum term -research
Interior Design Autum term -researchInterior Design Autum term -research
Interior Design Autum term -research
Ruby Hooper
 

Viewers also liked (20)

урок доброты
урок добротыурок доброты
урок доброты
 
Pitch 2016
Pitch 2016Pitch 2016
Pitch 2016
 
Introduccinalinternetysusservicios andrea
Introduccinalinternetysusservicios andreaIntroduccinalinternetysusservicios andrea
Introduccinalinternetysusservicios andrea
 
Professional Certifications and Achievements
Professional Certifications and AchievementsProfessional Certifications and Achievements
Professional Certifications and Achievements
 
Tik bab 2 kls 9
Tik bab 2 kls 9Tik bab 2 kls 9
Tik bab 2 kls 9
 
appache_1
appache_1appache_1
appache_1
 
Bibliography
BibliographyBibliography
Bibliography
 
Bxd 681 qd-bxd-12072016
Bxd 681 qd-bxd-12072016Bxd 681 qd-bxd-12072016
Bxd 681 qd-bxd-12072016
 
Робота Маріупольської ЗОШ № 31
Робота Маріупольської ЗОШ № 31Робота Маріупольської ЗОШ № 31
Робота Маріупольської ЗОШ № 31
 
NEHF Happy, Healthy, at Home symposium 100117 Session 3 - Making Connections
NEHF Happy, Healthy, at Home symposium 100117   Session 3 - Making ConnectionsNEHF Happy, Healthy, at Home symposium 100117   Session 3 - Making Connections
NEHF Happy, Healthy, at Home symposium 100117 Session 3 - Making Connections
 
Recording studio dubai
Recording studio dubaiRecording studio dubai
Recording studio dubai
 
Llevats
LlevatsLlevats
Llevats
 
Un Bello Hogar Lección 1
Un Bello Hogar Lección 1 Un Bello Hogar Lección 1
Un Bello Hogar Lección 1
 
VICTOR CV-LINK
VICTOR CV-LINKVICTOR CV-LINK
VICTOR CV-LINK
 
News 4 youth_Jeunes-CSC_janv2016
News 4 youth_Jeunes-CSC_janv2016News 4 youth_Jeunes-CSC_janv2016
News 4 youth_Jeunes-CSC_janv2016
 
My 5 minutes bell
My 5 minutes bellMy 5 minutes bell
My 5 minutes bell
 
Boston Real Estate Report
Boston Real Estate ReportBoston Real Estate Report
Boston Real Estate Report
 
Summary of Learning
Summary of Learning Summary of Learning
Summary of Learning
 
Franchise-Opp-Brochurev2
Franchise-Opp-Brochurev2Franchise-Opp-Brochurev2
Franchise-Opp-Brochurev2
 
Interior Design Autum term -research
Interior Design Autum term -researchInterior Design Autum term -research
Interior Design Autum term -research
 

Similar to ISSC456_Project_Presentation_Intindolo

ISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloJohn Intindolo
 
Attacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network SecurityAttacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network Security
ijtsrd
 
Presentation on iot- Internet of Things
Presentation on iot- Internet of ThingsPresentation on iot- Internet of Things
Presentation on iot- Internet of Things
JIGAR MAKHIJA
 
Mobile Day - App (In)security
Mobile Day - App (In)securityMobile Day - App (In)security
Mobile Day - App (In)security
Software Guru
 
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIESEFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
IJNSA Journal
 
1Table of Contents.docx
1Table of Contents.docx1Table of Contents.docx
1Table of Contents.docx
felicidaddinwoodie
 
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfWireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
SeanHussey8
 
A Survey On Wireless security
A Survey On Wireless securityA Survey On Wireless security
A Survey On Wireless security
Sarath K Sukumar
 
Wi-Vi Technology
Wi-Vi TechnologyWi-Vi Technology
Wi-Vi Technology
Student
 
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
Dr. Amarjeet Singh
 
Wireless Intrusion Prevention Systems or WIPS
Wireless Intrusion Prevention Systems or WIPSWireless Intrusion Prevention Systems or WIPS
Wireless Intrusion Prevention Systems or WIPS
Md Sohail Ahmad
 
ART 315 LECTURE 11Richard Hamilton, Just What Is It Th.docx
ART 315 LECTURE 11Richard Hamilton, Just What Is It Th.docxART 315 LECTURE 11Richard Hamilton, Just What Is It Th.docx
ART 315 LECTURE 11Richard Hamilton, Just What Is It Th.docx
festockton
 
vdocument.in_wi-vi-technology-559c15bfa4d45.pdf
vdocument.in_wi-vi-technology-559c15bfa4d45.pdfvdocument.in_wi-vi-technology-559c15bfa4d45.pdf
vdocument.in_wi-vi-technology-559c15bfa4d45.pdf
SalmanMamdapur
 
Smau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano ZaneroSmau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano Zanero
SMAU
 
IoT_IS_Presentation_104_159_179_011 (1).pdf
IoT_IS_Presentation_104_159_179_011 (1).pdfIoT_IS_Presentation_104_159_179_011 (1).pdf
IoT_IS_Presentation_104_159_179_011 (1).pdf
israrali99
 
Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your Enterprise
AirTight Networks
 
Lecture 1-2.pptx
Lecture 1-2.pptxLecture 1-2.pptx
Lecture 1-2.pptx
RechieJohnRelator
 
Intrusion prevention systems
Intrusion prevention systemsIntrusion prevention systems
Intrusion prevention systems
samis
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
North Texas Chapter of the ISSA
 
15
1515

Similar to ISSC456_Project_Presentation_Intindolo (20)

ISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloISSC456_Final_J_Intindolo
ISSC456_Final_J_Intindolo
 
Attacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network SecurityAttacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network Security
 
Presentation on iot- Internet of Things
Presentation on iot- Internet of ThingsPresentation on iot- Internet of Things
Presentation on iot- Internet of Things
 
Mobile Day - App (In)security
Mobile Day - App (In)securityMobile Day - App (In)security
Mobile Day - App (In)security
 
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIESEFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
 
1Table of Contents.docx
1Table of Contents.docx1Table of Contents.docx
1Table of Contents.docx
 
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfWireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
 
A Survey On Wireless security
A Survey On Wireless securityA Survey On Wireless security
A Survey On Wireless security
 
Wi-Vi Technology
Wi-Vi TechnologyWi-Vi Technology
Wi-Vi Technology
 
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
 
Wireless Intrusion Prevention Systems or WIPS
Wireless Intrusion Prevention Systems or WIPSWireless Intrusion Prevention Systems or WIPS
Wireless Intrusion Prevention Systems or WIPS
 
ART 315 LECTURE 11Richard Hamilton, Just What Is It Th.docx
ART 315 LECTURE 11Richard Hamilton, Just What Is It Th.docxART 315 LECTURE 11Richard Hamilton, Just What Is It Th.docx
ART 315 LECTURE 11Richard Hamilton, Just What Is It Th.docx
 
vdocument.in_wi-vi-technology-559c15bfa4d45.pdf
vdocument.in_wi-vi-technology-559c15bfa4d45.pdfvdocument.in_wi-vi-technology-559c15bfa4d45.pdf
vdocument.in_wi-vi-technology-559c15bfa4d45.pdf
 
Smau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano ZaneroSmau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano Zanero
 
IoT_IS_Presentation_104_159_179_011 (1).pdf
IoT_IS_Presentation_104_159_179_011 (1).pdfIoT_IS_Presentation_104_159_179_011 (1).pdf
IoT_IS_Presentation_104_159_179_011 (1).pdf
 
Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your Enterprise
 
Lecture 1-2.pptx
Lecture 1-2.pptxLecture 1-2.pptx
Lecture 1-2.pptx
 
Intrusion prevention systems
Intrusion prevention systemsIntrusion prevention systems
Intrusion prevention systems
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
 
15
1515
15
 

More from John Intindolo

Power_Point_Presentation_ISSC458_Intindolo
Power_Point_Presentation_ISSC458_IntindoloPower_Point_Presentation_ISSC458_Intindolo
Power_Point_Presentation_ISSC458_IntindoloJohn Intindolo
 
ISSC368_Final_Project Proposal_Wk8_Intindolo
ISSC368_Final_Project Proposal_Wk8_IntindoloISSC368_Final_Project Proposal_Wk8_Intindolo
ISSC368_Final_Project Proposal_Wk8_IntindoloJohn Intindolo
 
Research_Paper_Final_ISSC431_Intindolo
Research_Paper_Final_ISSC431_IntindoloResearch_Paper_Final_ISSC431_Intindolo
Research_Paper_Final_ISSC431_IntindoloJohn Intindolo
 
ISSC362_Research_Paper_Intindolo
ISSC362_Research_Paper_IntindoloISSC362_Research_Paper_Intindolo
ISSC362_Research_Paper_IntindoloJohn Intindolo
 
Research_Paper_ISSC461_Intindolo
Research_Paper_ISSC461_IntindoloResearch_Paper_ISSC461_Intindolo
Research_Paper_ISSC461_IntindoloJohn Intindolo
 
Attack_Project_Presentation_ISSC461_Intindolo
Attack_Project_Presentation_ISSC461_IntindoloAttack_Project_Presentation_ISSC461_Intindolo
Attack_Project_Presentation_ISSC461_IntindoloJohn Intindolo
 
ISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_IntindoloISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_IntindoloJohn Intindolo
 
Project_Paper_Presentation_ISSC471_Intindolo
Project_Paper_Presentation_ISSC471_IntindoloProject_Paper_Presentation_ISSC471_Intindolo
Project_Paper_Presentation_ISSC471_IntindoloJohn Intindolo
 
ISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_IntindoloISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_IntindoloJohn Intindolo
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloJohn Intindolo
 
ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
ISSC455_Week6_Project_PowerPoint_Presentation_IntindoloISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
ISSC455_Week6_Project_PowerPoint_Presentation_IntindoloJohn Intindolo
 
Wk 7 Case Study Summary Paper_ISSC331_Intindolo
Wk 7 Case Study Summary Paper_ISSC331_IntindoloWk 7 Case Study Summary Paper_ISSC331_Intindolo
Wk 7 Case Study Summary Paper_ISSC331_IntindoloJohn Intindolo
 
ISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloJohn Intindolo
 
ISSC490_Project_John_Intindolo
ISSC490_Project_John_IntindoloISSC490_Project_John_Intindolo
ISSC490_Project_John_IntindoloJohn Intindolo
 
ISSC361_Project_John_Intindolo
ISSC361_Project_John_IntindoloISSC361_Project_John_Intindolo
ISSC361_Project_John_IntindoloJohn Intindolo
 
Project_Presentation_ISSC361_Intindolo
Project_Presentation_ISSC361_IntindoloProject_Presentation_ISSC361_Intindolo
Project_Presentation_ISSC361_IntindoloJohn Intindolo
 

More from John Intindolo (16)

Power_Point_Presentation_ISSC458_Intindolo
Power_Point_Presentation_ISSC458_IntindoloPower_Point_Presentation_ISSC458_Intindolo
Power_Point_Presentation_ISSC458_Intindolo
 
ISSC368_Final_Project Proposal_Wk8_Intindolo
ISSC368_Final_Project Proposal_Wk8_IntindoloISSC368_Final_Project Proposal_Wk8_Intindolo
ISSC368_Final_Project Proposal_Wk8_Intindolo
 
Research_Paper_Final_ISSC431_Intindolo
Research_Paper_Final_ISSC431_IntindoloResearch_Paper_Final_ISSC431_Intindolo
Research_Paper_Final_ISSC431_Intindolo
 
ISSC362_Research_Paper_Intindolo
ISSC362_Research_Paper_IntindoloISSC362_Research_Paper_Intindolo
ISSC362_Research_Paper_Intindolo
 
Research_Paper_ISSC461_Intindolo
Research_Paper_ISSC461_IntindoloResearch_Paper_ISSC461_Intindolo
Research_Paper_ISSC461_Intindolo
 
Attack_Project_Presentation_ISSC461_Intindolo
Attack_Project_Presentation_ISSC461_IntindoloAttack_Project_Presentation_ISSC461_Intindolo
Attack_Project_Presentation_ISSC461_Intindolo
 
ISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_IntindoloISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_Intindolo
 
Project_Paper_Presentation_ISSC471_Intindolo
Project_Paper_Presentation_ISSC471_IntindoloProject_Paper_Presentation_ISSC471_Intindolo
Project_Paper_Presentation_ISSC471_Intindolo
 
ISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_IntindoloISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_Intindolo
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_Intindolo
 
ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
ISSC455_Week6_Project_PowerPoint_Presentation_IntindoloISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
 
Wk 7 Case Study Summary Paper_ISSC331_Intindolo
Wk 7 Case Study Summary Paper_ISSC331_IntindoloWk 7 Case Study Summary Paper_ISSC331_Intindolo
Wk 7 Case Study Summary Paper_ISSC331_Intindolo
 
ISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_Intindolo
 
ISSC490_Project_John_Intindolo
ISSC490_Project_John_IntindoloISSC490_Project_John_Intindolo
ISSC490_Project_John_Intindolo
 
ISSC361_Project_John_Intindolo
ISSC361_Project_John_IntindoloISSC361_Project_John_Intindolo
ISSC361_Project_John_Intindolo
 
Project_Presentation_ISSC361_Intindolo
Project_Presentation_ISSC361_IntindoloProject_Presentation_ISSC361_Intindolo
Project_Presentation_ISSC361_Intindolo
 

ISSC456_Project_Presentation_Intindolo

  • 1. WIRELESS ATTACKS & IPHONE FORENSICS By John Intindolo ISSC456 Digital Forensics: InvestigatingWireless Networks and Devices ProfessorAndrew Ingraham (Iphone forensics, n.d.)(Wireless web, n.d.)
  • 2. WIRELESS NETWORKS  What is aWireless Network?  Overview ofWireless Networks  WirelessTechnologies  Bluetooth  Infrared  Wi-Fi  Wireless USB (Wireless network advantages, n.d.)
  • 3. WIRELESS ATTACKS  Methods  Wardriving  Warflying  Warchalking (Wardriver, n.d.) (Warchalking symbols, n.d.)
  • 4. WIRELESS ATTACKS CONT’D.  Passive Attacks  Eavesdropping  Traffic Analysis  Traffic Monitoring ((Hacker, n.d.)
  • 5. WIRELESS ATTACKS CONT’D.  Active Attacks  Denial-of-Service  Flooding  Man-in-the-Middle  Hijacking (Dos attack, n.d.)
  • 6. BEST PRACTICES  Create aWireless Security Policy  Secure the Enterprise Wireless LAN  Secure the Enterprise Ethernet Network  Secure Corporate Laptops fromWirelessThreats When Outside the Enterprise  Educate Employees onWireless Policy
  • 7. WIRELESS FORENSICS OVERVIEW  Obtain a Search Warrant  IdentifyWireless Devices  Rogue Access Point  Document the Scene  DetectWireless Connections/Wireless Field Strength
  • 8. WIRELESS FORENSICS OVERVIEW CONT’D.  MapWireless Zones and Hot Spots  Connect to theWireless Network  Acquiring and Analyzing Data  Generate Report
  • 9. IPHONE FORENSICS  Evidence Stored  Collection  Disable Automatic Syncing  Write Blocking  Image Evidence  Viewing Evidence (Iphone forensics 2, n.d.)
  • 10. IPHONE FORENSICS CONT’D.  Breaking an iPhone Security Passcode  Acquire  Recover  Forensic Information  Analyze the Information
  • 11. IPHONE FORENSICS CONT’D.  Jailbreaking  Tools  Encase  DiskInternals Music Recovery  Elcomsoft Phone Password Breaker  Cellebrite UFED  Katana Forensics Lantern
  • 12. REFERENCES  Dos attack. (n.d.). Retrieved from http://botandbotnets.weebly.com/uploads/1/3/8/4/13840480/1556513_orig.jpg  Hacker. (n.d.). Retrieved from https://1.bp.blogspot.com/- mubCSoqmXbk/Um5vwbDHElI/AAAAAAAAYT8/5l-BUCCZFGQ/s800/Israeli Road Control System hack, shutting down Haifa highwayTraffic.jpg  IPhone forensics. (n.d.). Retrieved from http://www.htcia.org/wp- content/uploads/iphone_forensics.jpg  Iphone fornesics 2. (n.d.). Retrieved from http://www.google.com/imgres?imgurl=http://gcn.com/articles/2014/10/08/~/me dia/GIG/GCN/Redesign/Articles/2014/October/passware.png&imgrefurl=http://g cn.com/articles/2014/10/08/passware-ios- forensics.asp&xh=300&w=620&tbnid=VuG8m5Yj20emHM:&zoom=1&docid=A3 560UUrjbuwPM&ei=kx6RVMb7G6bGsQSZpoKwCw&tbm=isch&ved=0CEcQMyg gMCA&iact=rc&uact=3&dur=1600&page=2&start=15&ndsp=19
  • 13. REFERENCES CONT’D.  Warchalking symbols. (n.d.). Retrieved from http://weblog.bergersen.net/wp/mt/archives/warchalk.gif  Wardriver. (n.d.). Retrieved from http://muskrat707.tripod.com/pictures/pageicon.gif  Wireless network advantages. (n.d.). Retrieved from http://wireless- head.net/img/wireless-network-advantages.jpg  Wireless web. (n.d.). Retrieved from http://www.renogeek.com/blog/wp- content/uploads/2014/08/wireless-1-web.jpg

Editor's Notes

  1. I have chosen wireless attacks and iPhone forensics as my topic for the project paper, because I am very interested in securing against wireless attacks and performing forensics analysis on a mobile phone.
  2. A wireless network is any type of computer network that is comprised of wireless data connections for connecting network nodes. An example of this would be a modem connected to the Internet that uses a wireless router to connect computers, laptops, smartphones, tablets, T.V.’s, or any other wireless devices by way of a Wi-Fi connection found in an average person’s home. Wireless Networks such as Wi-Fi would not exist today if it were not for the decision of the Federal Communications Commission (FCC) to open several bands of wireless spectrum, and allowing them to be used without the need of a government license. The most common types of wireless technologies include Bluetooth, Infrared, Wi-Fi, and Wireless USB.
  3. Wireless Attacks can occur anywhere a wireless connection is being used. This could range from a person’s home, a corporate business, schools and universities, an internet café, or even a local pizza shop. The three methods used by hackers to perform a wireless attack are Wardriving, Warflying, and Warchalking. Wardriving is the act of searching for Wi-Fi networks to exploit in a moving vehicle through the use of a laptop, smartphone, tablet, or PDA. Warflying is performing the same action as Wardiving, with the only difference being that an airplane or even a drone is used rather than a car. Warchalking is the use of chalk marks on outdoor surfaces to let others know the existence of an open wireless network connection. Open networks make for easy targets and are at a high risk of an attack.
  4. There are many different wireless attacks that fall under two categories, passive and active. Passive attack examples would be eavesdropping, traffic analysis, and traffic monitoring, and are used to find vulnerabilities that can be exploited to perform an active attack or to obtain sensitive information.
  5. Active attacks are used for several reasons depending on the type of attack. For instance denial-of-service and flooding attack’s are used to make the network unavailable to the user. A man-in-the-middle attack allows the attacker the ability to monitor and inject messages into a communication between two users. They do so by impersonating one user to trick the other to believing the message is authentic. This could cause the victim to give valuable information such as an encryption key.
  6. Some of the best practices that should be implemented to safeguard against wireless attacks include the following: creating a wireless security policy, securing the Wireless LAN, Securing the Ethernet network, Securing business laptops when employees are using them outside of the workplace, and ensuring that all employees are educated on company the wireless policy.
  7. Wireless Forensics is much like a typical forensic investigation in that the main concepts remain. A warrant must be obtained, the scene must be “taped off”, then document everything at the scene, and all while following the chain of custody. The difference here is that all wireless devices must be identified including the rogue access point which allowed the attack to occur.
  8. Once all that information is acquired there are several more steps to take. Using a program such as Microsoft Visio, investigators can prepare a map of the wireless zones and hot spots that were used. Connecting to the network can be done directly to the WAP or by sniffing traffic between the access point and its associated devices. Once all data is acquired and analyzed it needs to be written in a report.
  9. The iPhone has a vast amount of evidence that is stored on it that can be recover even if deleted.
  10. An iPhone’s that is acquired and has a secure password can be broken using a forensic tool that allow the investigator to obtain the pass code. The evidence acquired falls into the following DeviceInfo file and SysInfo file. DeviceInfo is things like the name given to the device and username logged into the computer, while SysInfo gives information about the iPhone itself such as model number, serial number, etc. There are many things that can be recovered including: network informaiton, photos, contacts, calendar events, call logs, messages and e-mails, etc. Once the information is gather it must be analyzed using forensic tools.
  11. There are many different tools that can be used in analyzing the iPhone. One method is by jailbreaking it. This means that the phone is unlocked so that third-party applications can be installed and it will allow the investigator to open the file system of the iPhone so it may be accessed from a computer. Some of the more popular forensic tools for the iPhone are listed here such as EnCase, DiskInternals Music Recovery, Elcomsoft Phone Password Breaker, Cellebrite UFED, and Katana Forensics Lantern. Some of these are tools that will help to recover even deleted data (Encase and Cellebrite UFED for instance).