PREVIEW: Instant Messaging & TikTok Forensics

Download
File
eForensics Magazine 2020 09 Instant Messaging and TikTok Forensics PREVIEW.pdf

Dear Readers,

A forensic investigator should always stay up to date with the constantly growing cyberspace. We assume that you’ve heard about TikTok, an emerging app that is rapidly gaining popularity, but it’s time to take a look at it from a forensic perspective! 

Raluca Matei prepared a comprehensive article on TikTok Forensics for you. She shows some OSINT techniques that don’t even require an account, saving video techniques, checking old usernames, and how this affects users. You should definitely look at this paper.

What else? Instant messaging! Daniele Giomo in his paper analyzes Telegram’s functions that may bring relevant information in various forensic investigations. Telegram is an instant messaging application with the advantage of being available on iOS, Android and Windows Phone. 

When it comes to instant messaging we couldn’t forget about WhatsApp… Check out “Challenges to WhatsApp Forensic Data Extraction”.

Inside there is also a piece, prepared by Anudeep Nayakoti, “Forensic Analysis on Instant Messaging Applications”, in which he speaks about Telegram and WhatsApp, and also Facebook Messenger, WeChat, QQ, and Snapchat.

This edition also has a collection of articles on other topics such as automotive forensics (which is the subject of the hour!), network forensics, cloud forensics, machine learning, and malware detection. 

Check out our Table of Contents! Many thanks to all the authors who made it possible, and our reviewers, who helped us with the creation of this issue. 

Have a nice read!

Regards,

Dominika Zdrodowska

and the eForensics Magazine Editorial Team


INSIDE OF THE PREVIEW: Full article by by Filipi Pires Fail in Detection flow of AV-based “Malware Bazaar!”


Subscriber? Click here to download the whole issue

Buy this issue


TABLE OF CONTENTS


Fail in Detection flow of AV-based “Malware Bazaar!”

by Filipi Pires

The purpose of this document is to execute several efficiency and detection tests in our endpoint solution, provided by Cybereason. this document brings the result of the defensive security analysis with an offensive mindset performed in the execution of 185 different malware in our environment.

TikTok Forensics

by Raluca Matei

Why have I chosen TikTok as a platform to focus on? What is it that I will look into and how will I be putting it all together to provide informative material based on one of the hottest apps right now?

Telegram Forensics on Android OS

 by Daniele Giomo

Telegram is a secure instant messaging application with the advantage of being available on iOS, Android and Windows Phone, but also in a Web version; there are also applications for MacOS, Windows and Linux. So you can use Telegram comfortably on almost all possible and imaginable platforms.

Forensic Analysis on Instant-Messaging Application

by Anudeep Nayakoti, [email protected]

As the number of users across the world using the internet grew, many tech companies have built instant messaging apps across multiple platforms. They have good user-interfaces and can communicate using these apps instantly across many countries using the internet. These apps are freely available. 

Some of the widely used messaging apps across the globe are: WhatsApp, Telegram, Facebook Messenger, Viber, WeChat, etc. 

Among all the messaging apps, there are more WhatsApp users than any other messaging app. In the beginning of 2020, a WhatsApp spokesperson announced officially that 2 billion users across the world are using WhatsApp. 

A Brief Discussion on Challenges to WhatsApp Forensic Data Extraction

by Rhonda Johnson

WhatsApp is an extremely popular, cross-platform social media application that allows users to send text messages, videos, images, voicemails and make calls free of charge using VOIP technology. It had an estimated 800 million users in 2015. With an exploding number of internet users and the ability of anyone to use WhatsApp due to its free cost and increasingly internet connection availability, it is fair to assume that extracting forensic artifacts from this application will become a skill needed for future digital forensic investigations. While there are tools, such as WhatsApp Xtract and SQLite Browser, that can allow for the extradition of data from WhatsApp, there are still some challenges. The following article will explore some of the challenges to extracting data from WhatsApp. 

Network Forensics 

by Phalgun Kulkarni

Network forensics is a sub-domain of computer forensics that deals with acquiring and analyzing network data such as packets, logs and information from the networking devices such as firewalls and routers. Examining and reporting where the attack came from (IP, location), how the attack was deployed and what it affected comprises Network Forensics. 

Cyber Kill Chain: Valuable Tool for Incident Response 

by Florence Love Nkosi

There has been a growing number of cyber-attacks in the past few years. These have varied from social engineering, phishing, ransomware, and denial of service, just to mention a few. The growing number of these cyber-attacks has necessitated security experts to re-evaluate the security perimeter especially when it comes to implementing tools and techniques that fight to protect critical information assets from the various cyber threats. This has seen the rise of various cyber tools, techniques, and frameworks in the fight against cyber threats. Thus, the rise of the cyber kill chain framework and its implementation in cybersecurity. 

Automotive Forensics 

by Phalgun Kulkarni

Automotive forensics deals with extracting the information about the details of the vehicle position, driver’s position and similar details from the electronic systems installed in the automobile. Information such as acceleration, braking, air bag initiation times, crash time, passenger seat position, gear position, etc. Such evidence is used to back up the events that happened earlier and are involved in a legal case.

Considerations With Cloud Forensics

By Matthew Kafami

Perhaps you’ve heard the joke about the little boy pointing to the sky and asking what clouds are made of, to which the parent responds “Linux servers, mostly”. This article will discuss some of the basics of cloud infrastructures and considerations for hosting data in the cloud. 

The "Soft" and the "Hard" of Machine Learning and "Deep Learning" - part I, the "Soft"(ware)

by Alessandro Lofaro

Given the stereotypes about "ITers" :-) (and yes, I am one myself), to be clear, what we are going to look at in this article is some software used in "machine learning", "deep learning", and "artificial intelligence" (a marketing approach would prefer to use "artificial intelligence", but seeing the status, type and characteristics of production implementations at the moment, I will use in this article "machine learning", abbreviated as "ML").


Download
File
eForensics Magazine 2020 09 Instant Messaging and TikTok Forensics PREVIEW.pdf

October 6, 2020
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013