Book Image

Learn Computer Forensics

By : William Oettinger
Book Image

Learn Computer Forensics

By: William Oettinger

Overview of this book

A computer forensics investigator must possess a variety of skills, including the ability to answer legal questions, gather and document evidence, and prepare for an investigation. This book will help you get up and running with using digital forensic tools and techniques to investigate cybercrimes successfully. Starting with an overview of forensics and all the open source and commercial tools needed to get the job done, you'll learn core forensic practices for searching databases and analyzing data over networks, personal devices, and web applications. You'll then learn how to acquire valuable information from different places, such as filesystems, e-mails, browser histories, and search queries, and capture data remotely. As you advance, this book will guide you through implementing forensic techniques on multiple platforms, such as Windows, Linux, and macOS, to demonstrate how to recover valuable information as evidence. Finally, you'll get to grips with presenting your findings efficiently in judicial or administrative proceedings. By the end of this book, you'll have developed a clear understanding of how to acquire, analyze, and present digital evidence like a proficient computer forensics investigator.
Table of Contents (17 chapters)
1
Section 1: Acquiring Evidence
6
Section 2: Investigation
12
Section 3: Reporting

Peer-to-Peer file sharing

Peer-to-Peer (P2P) file sharing allows users to share files with others in the P2P community. Users will share videos or music files with the community, but you can find almost any file type you can imagine. P2P has legitimate and illegitimate uses, depending on the user's search criteria. It is a popular method of sharing illicit images and videos with other users in the P2P community. There are several P2P applications the user can choose from. I cannot give a detailed analysis on all potential P2P applications, but we will go over some more common P2P applications you may run into during your investigations.

P2P applications allow the user to become a node on the network. When the user installs the application, they can designate which files/folders they want to make available to the P2P network. The application will then create an index of the shared files/folders to share on the P2P network. When the user searches the P2P network and finds a file...