Social networking forensics
Download
1 / 12

Related PPT Presentation - PowerPoint PPT Presentation


  • 456 Views
  • Updated On :

Social Networking Forensics. Janet Cheng Jennifer Hoffman Therese LaMarche Ahmet Tavil Amit Yadav Client: Steve Kim Professor Tappert. Team 6. Overview. Background information about Social Network Forensics Forensic tools

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Related PPT Presentation' - mike_john


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Social networking forensics l.jpg

Social Networking Forensics

Janet Cheng

Jennifer Hoffman

Therese LaMarche

Ahmet Tavil

Amit Yadav

Client: Steve Kim

Professor Tappert

Team 6


Overview l.jpg

Overview

Background information about Social Network Forensics

Forensic tools

Top ten social networking sites and their privacy configurations

Social Networking Tracker Website

Find IP address in Gmail, Yahoo, and Hotmail

Demonstrations on C# Program and PHP website

Future recommendations

▫ Page 1


Background information l.jpg

Cases

“A 22-year-old Arizona woman was arrested for plotting a murder on another woman after seeing photos from her boyfriend’s MySpace website.”

Background Information

“Three suspects have been charged in connection with a kidnap and attempted murder of a man, after meeting with a woman through a social networking website called mocospace.com.”

“A mother falsified her identity using MySpace to hoax a 13-year-old neighbor who later committed suicide. “

Numerous murders, kidnaps, robbers, and etc. involve social networking sites led to security issues

Security has not been a high priority in the popular social networking sites

▫ Page 2



Social networking sites l.jpg

Social Networking Sites

Security Configurations

  • Evaluated on all different social networking sites focusing on their privacy configurations

▫ Page 4


Social networking sites6 l.jpg

Social Networking Sites

Security Configurations

Extended Tracker Program

  • Created a website called “Social Networking Visitor Tracker”.

  • Developed and tested modules for major Social Networking Sites.

▫ Page 5


Tracing sender s ip address from an e mail account l.jpg

Gmail

Tracing sender‘s IP address from an E-mail account

Access your inbox

Click on the message

Click on the upside down triangle located on the right

Select “Show Original”

▫ Page 6


Tracing sender s ip address from an e mail account8 l.jpg

Hotmail

Tracing sender‘s IP address from an E-mail account

Make sure you are in classic mode

Right click on message

Click on the message

Select “View Message Source”

▫ Page 7


Slide9 l.jpg

Tracing sender‘s IP address from an E-mail account

Yahoo! Mail

  • Select the message

  • Scroll down and click “Full Headers”

▫ Page 8


Demo demonstration c application l.jpg

Demo Demonstration: C# Application

Security Configurations

▫ Page 9


Demo demonstration php website l.jpg

Demo Demonstration: PHP Website

Security Configurations

▫ Page 10


Future recommendations l.jpg

Future Recommendations

  • Retrieving more information about the visitor of a monitored Social Networking page

  • Develop additional modules for the PHP tool to support Facebook, Second Life and other websites.

  • Craigslist presents the need to be monitored due to the increasing cases in scams. Craigslist users could benefit from knowing more about the people contacting them.

▫ Page 11


ad