With the increase in the use of wireless network and wireless devices, there is an increase in the number of security issues. Wireless attacks became easy for attackers who are familiar with passive attack techniques resulting in loss of time and money of the company/organization.
This chapter familiarizes you with the types of wireless attacks and thus helps you in investigating those attacks. It covers the topics such as analyzing DHCP log files for issued MAC addresses, firewall logs for intrusions, and network logs for intrusion activities during investigating wireless networks. It also highlights the various scanning tools that are used.
Personal Digital Assistants (PDA) is a lightweight and small mobile handheld device. Computer forensic investigators handling a PDA would need a basic understanding of the features of various types of PDA available in the market. They must take care in examining the PDA because any wrong step would lead to the loss of valuable and case-related information.
This chapter describes the basic understanding of PDA, its security issues, and various PDA forensics steps taken while PDA forensic investigation. It also highlights the forensic tools and their features that are helpful during investigation.
Like any other digital storage device, the iPod/ iPhone may hold incriminating evidence. In its native format, the iPod/ iPhone may contain calendar entries related to a crime or other event of interest. Additionally, contact information stored on the device may be relevant to an investigation. The iPod/ iPhone is also capable of creating voice recordings. As such, recordings of meetings may be recovered. Coupled with photographs or other substantiation, the iPod/ iPhone could be a rich source of evidence to the investigator. With its large hard drive, the iPod/ iPhone is the ideal storage location for music that violates Copyright and with the newer devices pornographic pictures.
This chapter discusses how iPod/ iPhone acts as excellent alternate data storage option, its features, how to conduct forensic analysis on the data hidden within the device, how iPod/ iPhone forensic investigation is carried out, and how to avoid the misuse of iPod/ iPhone.
Blackberry is a personal wireless handheld device that supports e-mail, mobile phone capabilities, text messaging, web browsing, and other wireless information services. This chapter familiarizes with topics such as Blackberry, Blackberry functions, and its security. It mainly focuses on ways of collecting evidence from Blackberry and how Blackberry investigation is carried. It also highlights the signing authority tool which protects the data and intellectual property of the applications.