-
Recent Posts
- Zurich!
- Paper: “Exchanging Demands: Weaknesses in SSL Implementations for Mobile Platforms”
- Paper: “Geo Forensics: Classes of Locational Data Sources for Embedded Devices”
- Paper: “Eavesdropping on the Smart Grid”
- Paper: GeoIntelligence: Data Mining Locational Social Media Content for Profiling and Information Gathering
Recent Comments
Archives
Categories
Links
Meta
Monthly Archives: December 2007
Paper: "Pocket SDV with SDGuardian: A Secure & Forensically Safe Portable Execution Environment"
Title: Pocket SDV with SDGuardian: A Secure & Forensically Safe Portable Execution Environment Authors: Peter Hannay, Peter James Abstract Storage of sensitive and/or business critical data on portable USB attachable mass storage devices is a common practice. The ability to … Continue reading
Posted in paper, security
Leave a comment
Paper: "A Methodology for the Forensic Acquisition of the TomTom One Satellite Navigation System"
Title: A Methodology for the Forensic Acquisition of the TomTom One Satellite Navigation System Authors: Peter Hannay Abstract The use of Satellite Navigation Systems (SNS) has become increasingly common in recent years. The wide scale adoption of this technology has … Continue reading
Paper: "LIARS Phase One – A live CD system for extraction of user and owner information from laptop and notebook hard drives"
Title: “LIARS Phase One – A live CD system for extraction of user and owner information from laptop and notebook hard drives” Authors: Peter Hannay, Andrew Woodward, Nic Cope Abstract Laptop and notebook theft is major issue worldwide. Many laptops … Continue reading
Posted in forensics, paper
Leave a comment
Spoofing onto a peer
The original arpspoof utility (part of dsniff) provides an easy way to send forged ARP packets. The normal use for this utility is to intercept traffic between two hosts, such as a user and the gateway. As part of an … Continue reading
Posted in code, security
Leave a comment