ADSL Router Forensics Part 1: An introduction to a new source of electronic evidence

@inproceedings{Szewczyk2007ADSLRF,
  title={ADSL Router Forensics Part 1: An introduction to a new source of electronic evidence},
  author={Patryk Szewczyk},
  year={2007}
}
Currently there appears to be a lack of research in the area of developing tools, testing methodologies, and creating standards for ADSL router forensics. The paper examines a wide range of literature and introduces the concept of ADSL router forensics as a new and potential field of research for digital forensics investigators. It begins by examining why there is a need for router forensics by detailing some of the more common threats which consumers may experience while online. An outline… Expand

Figures and Tables from this paper

Forensic Analysis of Consumer Routers
TLDR
This research examines what kind of traces are left behind on a consumer router and what may be deduced from this and investigates methods of access and extraction and areas of interest. Expand
WiFi Stakeout: A network forensics tool for reconnaissance and first responders
Forensic research and tools for consumer-grade routers is a relatively unexplored area. This is surprising considering the amount of consumer-grade routers currently in use around the world. ThisExpand
Forensic DHCP Information Extraction from Home Routers Memory Forensics on SOHO / Enduser Embedded Routing and Gateway Systems
This document explores the feasibility and admissibility of a so far unrecognized source for digital evidence. The extraction of a suspect’s home router’s main memory to obtain valuable evidence isExpand
Investigating Identity Concealing and Email Tracing Techniques
TLDR
Standard email tracing techniques and how email senders try and hide their electronic trail are looked at and advanced digital forensics techniques for email tracing are investigated namely Investigating residual data on servers and investigating network devices. Expand

References

SHOWING 1-10 OF 41 REFERENCES
First Responders Guide to Computer Forensics
Abstract : This handbook is for technical staff members charged with administering and securing information systems and networks. It targets a critical training gap in the fields of informationExpand
An Examination of Digital Forensic Models
TLDR
This paper explores the development of the digital forensics process, compares and contrasts four particular forensic methodologies, and finally proposes an integrated methodology that encompasses the forensic analysis of all genres of digital crime scene investigations. Expand
Forensic imaging of embedded systems using JTAG (boundary-scan)
This paper describes how to use JTAG (JTAG: Joint Test Action Group, also called boundary-scan) for producing a forensic image (image: an one-on-one copy of data found on an exhibit) of an embeddedExpand
Tool review - WinHex
  • E. Casey
  • Computer Science
  • Digit. Investig.
  • 2004
This paper presents strengths and shortcomings of WinHex Specialist Edition (version 11.25 SR-7) in the context of the overall digital forensics process, focusing on its ability to preserve andExpand
Phishing with Consumer Electronics - Malicious Home Routers
  • Alex Tsow
  • Engineering, Computer Science
  • MTW
  • 2006
This short paper describes an attack that exploits the online marketplace’s susceptibility to covert fraud, opaqueness of embedded software, and social engineering to hijack account access andExpand
Drive-By Pharming
TLDR
This paper describes an attack concept termed Drive-by Pharming where an attacker sets up a web page that, when simply viewed by the victim, attempts to change the DNS server settings on the victim's home broadband router. Expand
Guidelines on Cell Phone Forensics
TLDR
This work states that certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately and not necessarily the best available for the purpose. Expand
Getting Physical with the Digital Investigation Process
TLDR
The notion of a digital crime scene with its own witnesses, evidence, and events that can be investigated using the same model as a physical crime scene is introduced. Expand
Computer Evidence: Collection and Preservation
TLDR
This book teaches law enforcement, system administrators, information technology security professionals, legal professionals, and students of computer forensics how to identify, collect, and maintain digital artifacts to preserve their reliability for admission as evidence. Expand
FATKit: A framework for the extraction and analysis of digital forensic data from volatile system memory
TLDR
FATKit allows analysts to focus on higher-level tasks by providing novel methods for automatically deriving digital object definitions from C source code, extracting those objects from memory images, and visualizing the underlying data in various ways. Expand
...
1
2
3
4
5
...