Books & Videos

Table of Contents

  1. Chapter 1 Introduction

    1. What Is Internet Forensics?

    2. The Seamy Underbelly of the Internet

    3. Pulling Back the Curtain

    4. Taking Back Our Internet

    5. Protecting Your Privacy

    6. Before You Begin

    7. A Network Neighborhood Watch

  2. Chapter 2 Names and Numbers

    1. Addresses on the Internet

    2. Internet Address Tools

    3. DNS Record Manipulation

    4. An Example—Dissecting a Spam Network

  3. Chapter 3 Email

    1. Message Headers

    2. Forged Headers

    3. Forging Your Own Headers

    4. Tracking the Spammer

    5. Viruses, Worms, and Spam

    6. Message Attachments

    7. Message Content

    8. Is It Really Spam?

  4. Chapter 4 Obfuscation

    1. Anatomy of a URL

    2. IP Addresses in URLs

    3. Usernames in URLs

    4. Encoding the Entire Message

    5. Similar Domain Names

    6. Making a Form Look Like a URL

    7. Bait and Switch—URL Redirection

    8. JavaScript

    9. Browsers and Obfuscation

  5. Chapter 5 Web Sites

    1. Capturing Web Pages

    2. Viewing HTML Source

    3. Comparing Pages

    4. Non-Interactive Downloads Using wget

    5. Mapping Out the Entire Web Site

    6. Hidden Directories

    7. In-Depth Example—Directory Listings

    8. Dynamic Web Pages

    9. Filling Out Forms

    10. In-Depth Example—Server-Side Database

    11. Opening the Black Box

  6. Chapter 6 Web Servers

    1. Viewing HTTP Headers

    2. What Can Headers Tell Us?

    3. Cookies

    4. Redirection

    5. Web Server Statistics

    6. Controlling HTTP Headers

    7. A Little Bit of Everything

  7. Chapter 7 Web Browsers

    1. What Your Browser Reveals

    2. Apache Web Server Logging

    3. Server Log Analysis

    4. Protecting Your Privacy

  8. Chapter 8 File Contents

    1. Word Document Metadata

    2. U.K. Government Dossier on Iraq

    3. Document Forgery

    4. Redaction of Sensitive Information

  9. Chapter 9 People and Places

    1. Geographic Location

    2. Time Zone

    3. Language

    4. Expertise

    5. Criminal or Victim?

    6. Hardware and Software

  10. Chapter 10 Patterns of Activity

    1. Signatures

    2. Searching with Signatures

    3. Problems with Simple Signatures

    4. Full Text Comparison

    5. Using Internet Search Engines for Patterns

  11. Chapter 11 Case Studies

    1. Case Study 1: Tidball

    2. Case Study 2: Spam Networks

  12. Chapter 12 Taking Action

    1. What Is Being Done to Tackle Internet Fraud?

    2. What You Can Do to Help

    3. Getting in Over Your Head

    4. Vision of a Community Response

  1. Appendix About the Author

  2. Colophon