Internet Forensics: Using Digital Evidence to Solve Computer Crime

Inhaltsverzeichnis

Preface;
Who This Book Is For;
Contents of This Book;
Conventions Used in This Book;
Safari Enabled;
Using Code Examples;
How to Contact Us;
Acknowledgments;
Chapter 1: Introduction;
1.1 What Is Internet Forensics?;
1.2 The Seamy Underbelly of the Internet;
1.3 Pulling Back the Curtain;
1.4 Taking Back Our Internet;
1.5 Protecting Your Privacy;
1.6 Before You Begin;
1.7 A Network Neighborhood Watch;
Chapter 2: Names and Numbers;
2.1 Addresses on the Internet;
2.2 Internet Address Tools;
2.3 DNS Record Manipulation;
2.4 An Example-Dissecting a Spam Network;
Chapter 3: Email;
3.1 Message Headers;
3.2 Forged Headers;
3.3 Forging Your Own Headers;
3.4 Tracking the Spammer;
3.5 Viruses, Worms, and Spam;
3.6 Message Attachments;
3.7 Message Content;
3.8 Is It Really Spam?;
Chapter 4: Obfuscation;
4.1 Anatomy of a URL;
4.2 IP Addresses in URLs;
4.3 Usernames in URLs;
4.4 Encoding the Entire Message;
4.5 Similar Domain Names;
4.6 Making a Form Look Like a URL;
4.7 Bait and Switch-URL Redirection;
4.8 JavaScript;
4.9 Browsers and Obfuscation;
Chapter 5: Web Sites;
5.1 Capturing Web Pages;
5.2 Viewing HTML Source;
5.3 Comparing Pages;
5.4 Non-Interactive Downloads Using wget;
5.5 Mapping Out the Entire Web Site;
5.6 Hidden Directories;
5.7 In-Depth Example-Directory Listings;
5.8 Dynamic Web Pages;
5.9 Filling Out Forms;
5.10 In-Depth Example-Server-Side Database;
5.11 Opening the Black Box;
Chapter 6: Web Servers;
6.1 Viewing HTTP Headers;
6.2 What Can Headers Tell Us?;
6.3 Cookies;
6.4 Redirection;
6.5 Web Server Statistics;
6.6 Controlling HTTP Headers;
6.7 A Little Bit of Everything;
Chapter 7: Web Browsers;
7.1 What Your Browser Reveals;
7.2 Apache Web Server Logging;
7.3 Server Log Analysis;
7.4 Protecting Your Privacy;
Chapter 8: File Contents;
8.1 Word Document Metadata;
8.2 U.K. Government Dossier on Iraq;
8.3 Document Forgery;
8.4 Redaction of Sensitive Information;
Chapter 9: People and Places;
9.1 Geographic Location;
9.2 Time Zone;
9.3 Language;
9.4 Expertise;
9.5 Criminal or Victim?;
9.6 Hardware and Software;
Chapter 10: Patterns of Activity;
10.1 Signatures;
10.2 Searching with Signatures;
10.3 Problems with Simple Signatures;
10.4 Full Text Comparison;
10.5 Using Internet Search Engines for Patterns;
Chapter 11: Case Studies;
11.1 Case Study 1: Tidball;
11.2 Case Study 2: Spam Networks;
Chapter 12: Taking Action;
12.1 What Is Being Done to Tackle Internet Fraud?;
12.2 What You Can Do to Help;
12.3 Getting in Over Your Head;
12.4 Vision of a Community Response;
About the Author;
Colophon;

Internet Forensics: Using Digital Evidence to Solve Computer Crime

Buch (Taschenbuch, Englisch)

Fr.63.90

inkl. gesetzl. MwSt.
Taschenbuch

Taschenbuch

Fr. 63.90

Internet Forensics: Using Digital Evidence to Solve Computer Crime

Ebenfalls verfügbar als:

Taschenbuch

Taschenbuch

ab Fr. 63.90
eBook

eBook

ab Fr. 30.90

Beschreibung

Because it's so large and unregulated, the Internet is a fertile breeding ground for all kinds of scams and schemes. Usually it's your credit card number they're after, and they won't stop there. Not just mere annoyances, these scams are real crimes, with real victims. Now, thanks to Internet Forensics from O'Reilly, there's something you can do about it.
This practical guide to defending against Internet fraud gives you the skills you need to uncover the origins of the spammers, con artists, and identity thieves that plague the Internet. Targeted primarily at the developer community, Internet Forensics shows you how to extract the information that lies hidden in every email message, web page, and web server on the Internet. It describes the lengths the bad guys will go to cover their tracks, and offers tricks that you can use to see through their disguises. You'll also gain an understanding for how the Internet functions, and how spammers use these protocols to their devious advantage.
The book is organized around the core technologies of the Internet-email, web sites, servers, and browsers. Chapters describe how these are used and abused and show you how information hidden in each of them can be revealed. Short examples illustrate all the major techniques that are discussed. The ethical and legal issues that arise in the uncovering of Internet abuse are also addressed.
Not surprisingly, the audience for Internet Forensics is boundless. For developers, it's a serious foray into the world of Internet security; for weekend surfers fed up with spam, it's an entertaining and fun guide that lets them play amateur detective from the safe confines of their home or office.

Details

Einband

Taschenbuch

Erscheinungsdatum

01.11.2005

Verlag

O'Reilly Media

Seitenzahl

223

Maße (L/B/H)

23.3/17.9/1.2 cm

Beschreibung

Details

Einband

Taschenbuch

Erscheinungsdatum

01.11.2005

Verlag

O'Reilly Media

Seitenzahl

223

Maße (L/B/H)

23.3/17.9/1.2 cm

Gewicht

336 g

Auflage

1. Auflage

Sprache

Englisch

ISBN

978-0-596-10006-3

Das meinen unsere Kund*innen

0.0

0 Bewertungen

Informationen zu Bewertungen

Zur Abgabe einer Bewertung ist eine Anmeldung im Kund*innenkonto notwendig. Die Authentizität der Bewertungen wird von uns nicht überprüft. Wir behalten uns vor, Bewertungstexte, die unseren Richtlinien widersprechen, entsprechend zu kürzen oder zu löschen.

Verfassen Sie die erste Bewertung zu diesem Artikel

Helfen Sie anderen Kund*innen durch Ihre Meinung

Erste Bewertung verfassen

Unsere Kund*innen meinen

0.0

0 Bewertungen filtern

Die Leseprobe wird geladen.
  • Internet Forensics: Using Digital Evidence to Solve Computer Crime
  • Preface;
    Who This Book Is For;
    Contents of This Book;
    Conventions Used in This Book;
    Safari Enabled;
    Using Code Examples;
    How to Contact Us;
    Acknowledgments;
    Chapter 1: Introduction;
    1.1 What Is Internet Forensics?;
    1.2 The Seamy Underbelly of the Internet;
    1.3 Pulling Back the Curtain;
    1.4 Taking Back Our Internet;
    1.5 Protecting Your Privacy;
    1.6 Before You Begin;
    1.7 A Network Neighborhood Watch;
    Chapter 2: Names and Numbers;
    2.1 Addresses on the Internet;
    2.2 Internet Address Tools;
    2.3 DNS Record Manipulation;
    2.4 An Example-Dissecting a Spam Network;
    Chapter 3: Email;
    3.1 Message Headers;
    3.2 Forged Headers;
    3.3 Forging Your Own Headers;
    3.4 Tracking the Spammer;
    3.5 Viruses, Worms, and Spam;
    3.6 Message Attachments;
    3.7 Message Content;
    3.8 Is It Really Spam?;
    Chapter 4: Obfuscation;
    4.1 Anatomy of a URL;
    4.2 IP Addresses in URLs;
    4.3 Usernames in URLs;
    4.4 Encoding the Entire Message;
    4.5 Similar Domain Names;
    4.6 Making a Form Look Like a URL;
    4.7 Bait and Switch-URL Redirection;
    4.8 JavaScript;
    4.9 Browsers and Obfuscation;
    Chapter 5: Web Sites;
    5.1 Capturing Web Pages;
    5.2 Viewing HTML Source;
    5.3 Comparing Pages;
    5.4 Non-Interactive Downloads Using wget;
    5.5 Mapping Out the Entire Web Site;
    5.6 Hidden Directories;
    5.7 In-Depth Example-Directory Listings;
    5.8 Dynamic Web Pages;
    5.9 Filling Out Forms;
    5.10 In-Depth Example-Server-Side Database;
    5.11 Opening the Black Box;
    Chapter 6: Web Servers;
    6.1 Viewing HTTP Headers;
    6.2 What Can Headers Tell Us?;
    6.3 Cookies;
    6.4 Redirection;
    6.5 Web Server Statistics;
    6.6 Controlling HTTP Headers;
    6.7 A Little Bit of Everything;
    Chapter 7: Web Browsers;
    7.1 What Your Browser Reveals;
    7.2 Apache Web Server Logging;
    7.3 Server Log Analysis;
    7.4 Protecting Your Privacy;
    Chapter 8: File Contents;
    8.1 Word Document Metadata;
    8.2 U.K. Government Dossier on Iraq;
    8.3 Document Forgery;
    8.4 Redaction of Sensitive Information;
    Chapter 9: People and Places;
    9.1 Geographic Location;
    9.2 Time Zone;
    9.3 Language;
    9.4 Expertise;
    9.5 Criminal or Victim?;
    9.6 Hardware and Software;
    Chapter 10: Patterns of Activity;
    10.1 Signatures;
    10.2 Searching with Signatures;
    10.3 Problems with Simple Signatures;
    10.4 Full Text Comparison;
    10.5 Using Internet Search Engines for Patterns;
    Chapter 11: Case Studies;
    11.1 Case Study 1: Tidball;
    11.2 Case Study 2: Spam Networks;
    Chapter 12: Taking Action;
    12.1 What Is Being Done to Tackle Internet Fraud?;
    12.2 What You Can Do to Help;
    12.3 Getting in Over Your Head;
    12.4 Vision of a Community Response;
    About the Author;
    Colophon;