CYBERCRIME DETECTION
AND FORENSICS
CIS 4930-01
Syllabus, lectures, and other materials — Spring 2010

Spring 2010: Syllabus for CIS-4930r-01

Final Paper Requirements

Assignments

Assigned 2010-01-07:

Assigned 2010-01-28:

Assigned 2010-02-04:

Assigned 2010-02-16:

Assigned 2010-02-23:

Assigned 2010-03-18:

Class Notes

Introduction

Technical Introduction to Windows

Technical Introduction to Linux

Memory Analysis, Part 1

Memory Analysis, Part 2

Malware Post-Mortem

The Windows Registry

File Analysis, part 1

File Analysis, part 2

Live Analysis: Executables and Execution

Rootkits and Blue Pill

Basics of static analysis

Other Material

2008-08-11: Plastic Keys to Physical Locks: Researchers Crack Medeco High-Security Locks With Plastic Keys

2008-08-22: An Email about an intrusion at Redhat's Fedora: Infrastructure report, 2008-08-22 UTC 1200

2009-02-10: Data breach at FAA: FAA reports 45,000 data records pilfered from server

2009-04-01: Spam Back to 94% of All E-Mail

2009-05-12: Berkeley data break-in: Hackers attack campus databases, steal Social Security numbers, other data

2009-05-15: Backup woes at Avsim: Hackers 'destroy' flight sim site

2009-07-23: Adobe Flash woes: New attacks exploit vuln in (fully-patched) Adobe Flash

2009-10-16: Big-Box Breach: The Inside Story of Wal-Mart's Hacker Attack

2009-10-22: FBI and SOCA plot cybercrime smackdown: White hats get proactive on e-crime

2010-01-20: Fearing Hackers Who Leave No Trace

2010-01-20: More Researchers Going On The Offensive To Kill Botnets

2010-02-04: Identifying almost identical files using context triggered piecewise hashing

2010-02-04: Using Every Part of the Buffalo in Windows Memory Analysis

2010-02-04: Using Hashing to Improve Volatile Memory Forensic Analysis

2010-02-05: Hacking for Fun and Profit in China’s Underworld

2010-02-05: US oil industry hit by cyberattacks: Was China involved?

2010-02-06: FATKit: A Framework for the Extraction and Analysis of Digital Forensic Data from Volatile System Memory.

2010-02-19: Modern banker malware undermines two-factor authentication

2010-02-19: Broad New Hacking Attack Detected.

2010-02-19: The Kneber botnet - FAQ.

2010-02-19: As mentioned in class yesterday, the creation of a rogue CA certificate via an MD5 collision story: MD5 considered harmful today: Creating a rogue CA certificate.

2010-02-19: Why the Windows Registry sucks... technically

2010-02-23: Keyloggers: Churchill High grade scheme may involve half-dozen students; apparently, from other stories on this incident, the students may have picked this up from Youtube, which hosts videos on install keyloggers, including ones showing how to create trojans to install keyloggers (search Youtube for "Ardamax", for instance.)

2010-03-02: Big botnet: Authorities bust 3 in infection of 13M computers

2010-03-08: A classic: No Stone Unturned

2010-03-16: What we know (and learned) from the Waledac takedown

2010-04-01: Another classic on the Linux ELF format: A Whirlwind Tutorial on Creating Really Teensy ELF Executables for Linux.

2010-04-08: Older work on analyzing a binary

Suggested Mailing Lists

I also highly recommend reading comp.risks (you can read it in rdf format at http://catless.ncl.ac.uk/rdigest.rdf, or via email — instructions are at http://www.csl.sri.com/users/risko/risksinfo.html) or adding its RSS feed at http://catless.ncl.ac.uk/risksatom.xml to your feed browser.