Forensic DHCP Information Extraction from Home Routers

نویسنده

  • Tobias Fiebig
چکیده

This document explores the feasibility and admissibility of a so far unrecognized source for digital evidence. The extraction of a suspect’s home router’s main memory to obtain valuable evidence is proposed and implemented. This method aims at providing time lines of devices appearing in a home network, and therefore possibly in that home, along with their owner. The technique is implemented and tested on the standards of modern volatile memory forensics. The results show that the proposed method is viable and may be extended to a wide range of devices.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Warkitting: The Drive-by Subversion of Wireless Home Routers

In this paper we introduce the notion of warkitting as the drive-by subversion of wireless home routers through unauthorized access by mobile WiFi clients. We describe how such attacks can be performed, evaluate the vulnerability of currently deployed wireless routers based on experimental data, and examine the impact of these attacks on Internet fraud. Our analysis shows that it is possible in...

متن کامل

DHCP Message Authentication with an Effective Key Management

In this paper we describes the authentication for DHCP (Dynamic Host Configuration Protocol) message which provides the efficient key management and reduces the danger replay attack without an additional packet for a replay attack. And the authentication for DHCP message supports mutual authentication and provides both entity authentication and message authentication. We applied the authenticat...

متن کامل

Detecting the Auto-configuration Attacks on IPv4 and IPv6 Networks

Auto-configuration is a mechanism, which assigns IP address, default gateway address and DNS server address to a node for accessing to the network. On IPv4 network, autoconfiguration is done by using DHCP protocol, but IPv6 network has two ways to assign auto-configuration information to a node, which are stateless address configuration by routers and stateful address configuration by DHCPv6 se...

متن کامل

A case of acute intoxication due to combined use of fentanyl and 3,4-dichloro-N-[2-(dimethylamino)cyclohexyl]-N-methylbenzamide (U-47700).

A 30-year old man was found dead in his home after inhaling fumes of a powder burned on aluminum foil. Blood and urine were taken by the medical examiner during the external body examination and submitted to the laboratory for a comprehensive systematic toxicological analysis. A toxic fentanyl level of 10.9μg/L was measured in the subclavian blood. Police investigation revealed that the man sea...

متن کامل

Procedures and IANA Guidelines for Definition of New DHCP Options and Message Types

The Dynamic Host Configuration Protocol (DHCP) provides a framework for passing configuration information to hosts on a Transmission Control Protocol/Internet Protocol (TCP/IP) network. Configuration parameters and other control information are carried in tagged data items that are stored in the 'options' field of the DHCP message. The data items themselves are also called "options". DHCP proto...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013