Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet72/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   68   69   70   71   72   73   74   75   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

66
CHAPTER 6
High-tech investigations of cyber crime 
SIGNATURE ANALYSIS
It is easy to obscure a files’ true meaning, and it useful to identify whether all the files 
are what they purport to be; this can be a simple way of highlighting notable files. 
Operating systems use a process of application binding to link a file type to an appli-
cation. Windows, for example, uses file extensions and maintains a record of which 
application should open which file: for example .doc files are opened in Microsoft 
Word. The fact that Windows uses file extensions gives rise to a data-hiding tech-
nique whereby a user can change the extension of the file to obscure its contents. If 
a file named 
MyContraband.jpg
was changed to 
lansys.dll
and moved to a system 
folder, the casual observer would probably never find it.
Linux uses a files header (or signature) to identify which application should 
open the file (the file can be viewed in hex to see this). It is therefore harder to 
obscure a files’ contents/true type as with a broken header the file will often not 
open. Linux (and Mac) have a built-in Terminal command that allows you to iden-
tify a file’s signature, simply using the command 
file –i
[where 
–i
represents the 
input file].
Most Forensic tools have the capability to check a file’s signature and report 
whether this is different from that expected from the extension. The file’s signature 
can be checked against a precompiled database. If the signature exists it will then 
check the extension associated with it. One of the following results for each file will 
then be obtained (certain forensic tools may give more specific results but all align 
to the same two concepts):
• 
Match
- the signature and extension match with what is stored
• 

Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   68   69   70   71   72   73   74   75   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish