1 / 12

Social Networking Forensics

Social Networking Forensics. Janet Cheng Jennifer Hoffman Therese LaMarche Ahmet Tavil Amit Yadav Client: Steve Kim Professor Tappert. Team 6. Overview. Background information about Social Network Forensics Forensic tools

mike_john
Download Presentation

Social Networking Forensics

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Social Networking Forensics Janet Cheng Jennifer Hoffman Therese LaMarche Ahmet Tavil Amit Yadav Client: Steve Kim Professor Tappert Team 6

  2. Overview Background information about Social Network Forensics Forensic tools Top ten social networking sites and their privacy configurations Social Networking Tracker Website Find IP address in Gmail, Yahoo, and Hotmail Demonstrations on C# Program and PHP website Future recommendations ▫ Page 1

  3. Cases “A 22-year-old Arizona woman was arrested for plotting a murder on another woman after seeing photos from her boyfriend’s MySpace website.” Background Information “Three suspects have been charged in connection with a kidnap and attempted murder of a man, after meeting with a woman through a social networking website called mocospace.com.” “A mother falsified her identity using MySpace to hoax a 13-year-old neighbor who later committed suicide. “ Numerous murders, kidnaps, robbers, and etc. involve social networking sites led to security issues Security has not been a high priority in the popular social networking sites ▫ Page 2

  4. Commonly Used Forensic Applications ▫ Page 3

  5. Social Networking Sites Security Configurations • Evaluated on all different social networking sites focusing on their privacy configurations ▫ Page 4

  6. Social Networking Sites Security Configurations Extended Tracker Program • Created a website called “Social Networking Visitor Tracker”. • Developed and tested modules for major Social Networking Sites. ▫ Page 5

  7. Gmail Tracing sender‘s IP address from an E-mail account Access your inbox Click on the message Click on the upside down triangle located on the right Select “Show Original” ▫ Page 6

  8. Hotmail Tracing sender‘s IP address from an E-mail account Make sure you are in classic mode Right click on message Click on the message Select “View Message Source” ▫ Page 7

  9. Tracing sender‘s IP address from an E-mail account Yahoo! Mail • Select the message • Scroll down and click “Full Headers” ▫ Page 8

  10. Demo Demonstration: C# Application Security Configurations ▫ Page 9

  11. Demo Demonstration: PHP Website Security Configurations ▫ Page 10

  12. Future Recommendations • Retrieving more information about the visitor of a monitored Social Networking page • Develop additional modules for the PHP tool to support Facebook, Second Life and other websites. • Craigslist presents the need to be monitored due to the increasing cases in scams. Craigslist users could benefit from knowing more about the people contacting them. ▫ Page 11

More Related