1 / 22

E - Detective Network Investigation Toolkit - NIT (2010)

E - Detective Network Investigation Toolkit - NIT (2010). Decision Group www.edecision4u.com. Introduction to Network Investigation Toolkit. What are the capabilities of NIT? Interception of Ethernet LAN traffic through mirror port (or by network tap).

jenna
Download Presentation

E - Detective Network Investigation Toolkit - NIT (2010)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. E-DetectiveNetwork Investigation Toolkit - NIT (2010) Decision Group www.edecision4u.com

  2. Introduction to Network Investigation Toolkit What are the capabilities of NIT? • Interception of Ethernet LAN traffic through mirror port (or by network tap). • Interception of WLAN traffic (up to 4 different WLAN channels). • Intercept ion of Ethernet LAN HTTPS/SSL traffic by MITM attack. • Intercept ion of WLAN HTTPS/SSL traffic by MITM attack. • Real-time raw data decoding and reconstruction. • Offline raw data decoding and reconstruction. • Forensics analysis and investigation. Solution for: Lawful Enforcement Agencies (Police Intelligence, Military Intelligence, National Security, Counter Terrorism, Cyber Security, Defense Ministry etc.

  3. NIT Implementation Mode (1)

  4. NIT Implementation Mode (2)

  5. NIT Implementation Mode (3)

  6. NIT Implementation Mode (4)

  7. NIT – Homepage – Status of Operation Display the current operation mode and status of implementation

  8. Email Webmail HTTP (Link, Content, Reconstruct, Upload Download) IM/Chat (Yahoo, MSN, ICQ, QQ, IRC, Google Talk Etc.) File Transfer FTP, P2P Others Online Games Telnet etc. NIT Internet Protocols Supported

  9. NIT – Homepage – Status of Operation Top-Down view on Case Results GUI.

  10. Sample: Email (POP3, SMTP, IMAP)

  11. Sample: Webmail (Read and Sent) Webmail Type: Yahoo Mail, Gmail, Windows Live Hotmail, Giga Mail and others

  12. Sample: IM (Yahoo, MSN, ICQ etc.) Yahoo: Includes file transfer, webcam, voice call (GIPS Decoder Required) MSN: Includes file transfer, webcam

  13. Sample: HTTP Link and HTTP Content

  14. Sample: HTTP Video Streaming

  15. Sample: Incomplete Connections Incomplete connection sessions can be viewed by binary-text viewer

  16. Search – Free Text (Key Words) and Advanced Free Text (Key Words Search) Advanced Search (Conditional Search)

  17. NIT – System Specifications (1)

  18. NIT – System Specifications (2)

  19. NIT – System Specifications (3)

  20. NIT – System Specifications (4)

  21. References – Implementation Sites and Customers • Criminal Investigation Bureau • The Bureau of Investigation Ministry of Justice • National Security Agency (Bureau) in various countries • Intelligence Agency in various countries • Ministry of Defense in various countries • Counter/Anti Terrorism Department • National Police, Royal Police in various countries • Government Ministries in various countries • Federal Investigation Bureau in various countries • Telco/Internet Service Provider in various countries • Banking and Finance organizations in various countries • Others Notes: Due to confidentiality of this information, the exact name and countries of the various organizations cannot be revealed.

  22. Thank You ! Decision Group www.edecision4u.com

More Related