Icofcs 2011.Indd

Total Page:16

File Type:pdf, Size:1020Kb

Icofcs 2011.Indd 2011 ICoFCSPROCEEDING OF THE SIXTH INTERNATIONAL 2011 CONFERENCE ON FORENSIC COMPUTER SCIENCE PROCEEDING OF THE SIXTH INTERNATIONAL CONFERENCE ON FORENSIC COMPUTER SCIENCE Print ISBN 978-85-65069-07-6 By ASSOCIAÇÃO BRASILEIRA DE ESPECIALISTAS EM ALTA TECNOLOGIA - ABEAT ICoFCSPROCEEDING OF THE SIXTH INTERNATIONAL 2011 CONFERENCE ON FORENSIC COMPUTER SCIENCE 1st Edition Brasília, DF Abeat 2011 Proceeding of the Sixth International Conference on Forensic Computer Science – ICoFCS 2011 ABEAT (ed.) – Brasília, Brazil, 2011, 210 pp. – Print ISBN 978-85-65069-07-6 - Online ISBN 978-85-65069-05-2 © Copyright 2011 by Associação Brasileira De Especialistas Em Alta Tecnologia (ABEAT) Address: CLN 309, Bloco D, Sala 103 CEP: 70.755-540 – Brasília/DF - Brazil Phone: +55 (61) 3202-3006 Email: [email protected] – www.abeat.org.br Print ISBN 978-85-65069-07-6 - Online ISBN 978-85-65069-05-2 COMMITTEE GENERAL CHAIR Dr. PAULO QUINTILIANO DA SILVA, Brazilian Federal Police, and University of Brasília, Brazil SESSION CHAIRS Dr. ALEXANDRE RICARDO SOARES ROMARIZ, University of Brasilia, Brazil Dr. ANTÔNIO NUNO DE CASTRO SANTA ROSA, University of Brasilia, Brazil Dr. FRANCISCO DE OLIVEIRA ASSIS NASCIMENTO, University of Brasilia, Brazil Dr. PEDRO DE AZEVEDO BERGER, University of Brasilia, Brazil REVIEWERS Dr. Adriano Mauro Cansian, São Paulo State University, Brazil Dr. Alexandre Ricardo Soares Romariz, University of Brasilia, Brazil Dr. Anderson Clayton Alves Nascimento, University of Brasilia, Brazil Dr. Antonio Montes, Renato Archer Research Center, Brazil Dr. Antonio Nuno de Castro Santa Rosa, University of Brasilia, Brazil Dr. Ayyaswamy Kathirvel, Anna University, India Dr. Avinash Pokhriyal, Uttar Pradesh Technical University, Lucknow, India Dr. “candidate” Bruno Werneck Pinto Hoelz, Brazilian Federal Police and University of Brasília, Brazil Dr. Carlos Henrique Quartucci Forster, Air Force Institute of Technology, Brazil Dr. Célia Ghedini Ralha, University of Brasilia, Brazil Dr. Clovis Torres Fernandes, Air Force Institute of Technology, Brazil Dr. Deepak Laxmi Narasimha, University of Malaya, Malaysia Dr. Dibio Leandro Borges, University of Brasilia, Brazil Dr. Dinei Florêncio, Microsoft Research, USA Dr. Francisco de Oliveira Assis Nascimento, University of Brasilia, Brazil Dr. Ganesan Ramachandrarao, Bharathiar University, India Dr. Geovany Araujo Borges, University of Brasilia, Brazil Dr. Gerhard Ritter, University of Florida, USA Dr. Hélvio Pereira Peixoto, Brazilian Federal Police, Brazil Dr. Igor B. Gourevitch, Russian Academy of Science, Russia Dr. Jaisankar Natarajan, Vit University, India Dr. Jeimy J. Cano, University of Los Andes, Colombia Dr. Juliana Fernandes Camapum, University of Brasilia, Brazil Dr. Luciano Silva, Federal University of Parana, Brazil Dr. Luiz Pereira Calôba, Federal University of Rio de Janeiro, Brazil Dr. Marcos Cordeiro d’Ornellas, Federal University of Santa Maria, Brazil Dr. Mohd Nazri Ismail, University of Kuala Lumpur, Malasya Dr. Nei Yoshihiro Soma, Air Force Institute of Technology, Brazil Dr. Nikolay G. Zagoruiko, Novosibirsk State University, Russia Dr. Nilton Correa da Silva, Evangelic University of Anapolis, Brazil Dr. Norbert Pohlmann, Fachhochschule Gelsenkirchen, Germany Dr. Olga Regina Pereira Bellon, Federal University of Parana, Brazil Dr. Ovidio Salvetti, Italian National Research Council, Italy Dr. Paulo Licio de Geus, University of Campinas, Brazil Dr. Paulo Sergio Motta Pires, Federal University of Rio Grande do Norte, Brazil Dr. Paulo Quintiliano da Silva, Brazilian Federal Police, and University of Brasília, Brazil Dr. Pedro de Azevedo Berger, University of Brasilia, Brazil Dr. Pedro Luis Prospero Sanches, University of São Paulo, Brazil Dr. Renato da Veiga Guadagnin, Catholic University of Brasilia, Brazil Dr. Ricardo L. de Queiroz, University of Brasilia, Brazil Dr. Roberto Ventura Santos, University of Brasilia, Brazil Dr. Vladimir Cobarrubias, University of Chile, Chile Dr. Volnys Borges Bernal, University of São Paulo, Brazil Dr. William A. Sauck, Western Michigan University, USA ABEAT – Associação Brasileira de Especialistas em Alta Tecnologia SCLN 309, Bloco D, Sala 103 Brassília-DF - CEP: 70.755-540 - Fone: + 55 (61) 3202-3006 CONFERENCE SCOPE Artificial Intelligence Artificial Neural Network Biometrics Computer Crimes Computer Forensics Computer Forensics in Education Computer Law Computer Vision Criminology Cryptology Digital Investigation Image Analysis Image Processing Information Security International Police Cooperation Intrusion Prevention and Detection Machine Learning Management Issues Network Security Pattern Recognition Secure Software Development Semantic Web Signal Processing Simulation Software Engineering BEST PAPER AWARD On this year, the “Best Paper Award” big winner is the paper “Raciocínio Baseado em Casos Aplicado em Análise Live”, written by Frederico Imbroisi Mesquita, Bruno Werneck Pinto Hoels, and Celia Ghedini Ralha. The paper “Computer Forensic Document Clustering with ART1 Neural Networks”, written by Georger Rommel Ferreira de Araújo, and Célia Ghedini Ralha, is the runner-up paper of the conference The choice was made by vote of this Conference Review Committee members. CONTENTS Uma Análise do Reconhecimento Textual de Nomes de Pessoas e Organizações na Computação Forense By Osvaldo Dalben Junior, and Daniela Barreiro Claro ................................................................................................................................................................07 Uma Proposta de Método para o Processo Investigatório de Análise da Informação Digital By Levi Roberto Costa, and Helvio Pereira Peixoto .......................................................................................................................................................................16 Ferramentas e Metodologia para Simplificar Investigações Criminais Utilizando Interceptação Telemática By André Peron, Flávio Elias de Deus, and Rafael Timóteo de Souza Júnior ........................................................................................................................30 Identificação de Artefatos Periciais do eMule By Rodrigo Lange, and Celia Ghedini Ralha ....................................................................................................................................................................................43 Identificação e Análise de Vestígios Deixados pelo Skype 5.X By Galileu Batista de Sousa ....................................................................................................................................................................................................................54 Evaluating the Security of the Brazilian e-Passport By Ivo de Carvalho Peixinho, , and Auto Tavares da Camara Júnior ........................................................................................................................................62 Raciocínio Baseado em Casos Aplicado em Análise Live By Frederico Imbroisi Mesquita, Bruno Werneck Pinto Hoels, and Celia Ghedini Ralha ..................................................................................................68 Utilização da Computação Distribuída para o Armazenamento e Indexação de Dados Forenses By Marcelo Antônio da Silva, and Romualdo Alves Pereira Júnior ..........................................................................................................................................78 Aquisição de Evidências Digitais em Smartphones Android By André Morum Simão, Fábio Caus Sícoli, Laerte Peotta de Melo, Flávio Elias de Deus, and Rafael Timóteo de Souza Júnior .....................92 Ensino da Forense Digital Baseado em Ferramentas Open Source By Leonardo L. Fagundes, Paulo A. Neukamp, and Pamela C. da Silva ................................................................................................................................100 Computer Forensic Document Clustering with ART1 Neural Networks By Georger Rommel Ferreira de Araújo, and Célia Ghedini Ralha .........................................................................................................................................106 OCR Errors and their Effects on Computer Forensics By Mateus de Castro Polastro, and Nalvo Franco de Almeida Júnior ...................................................................................................................................115 Uma Arquitetura de Software para Extração de Vestígios de Programas de Mensagens Instantâneas By Vicente de Paula Melo Filho, Galileu Batista de Sousa, and Gibeon Soares Aquino Jr .............................................................................................122 Using XSLT Filters to Improve Productivity and Quality on Cell Phone Forensics By Alexandre Vrubel ...............................................................................................................................................................................................................................132 Creation and Maintenance of MD5 Hash Libraries, and their Application in Cases of Child Pornography By Alexandre Vrubel ...............................................................................................................................................................................................................................137 Blind Automatic Malicious Activity Detection in Honeypot Data By Bernardo Machado David, João Paulo C. L. da Costa, Anderson C. A. Nascimento,
Recommended publications
  • Qos: NBAR Protocol Library, Cisco IOS XE Release 3.8S
    QoS: NBAR Protocol Library, Cisco IOS XE Release 3.8S Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 C O N T E N T S 3COM-AMP3 through AYIYA-IPV6-TUNNELED 34 3COM-AMP3 35 3COM-TSMUX 36 3PC 37 9PFS 38 914C G 39 ACAP 40 ACAS 40 ACCESSBUILDER 41 ACCESSNETWORK 42 ACP 43 ACR-NEMA 44 ACTIVE-DIRECTORY 45 ACTIVESYNC 45 ADOBE-CONNECT 46 AED-512 47 AFPOVERTCP 48 AGENTX 49 ALPES 50 AMINET 50 AN 51 ANET 52 ANSANOTIFY 53 ANSATRADER 54 ANY-HOST-INTERNAL 54 AODV 55 AOL-MESSENGER 56 AOL-MESSENGER-AUDIO 57 AOL-MESSENGER-FT 58 QoS: NBAR Protocol Library, Cisco IOS XE Release 3.8S ii Contents AOL-MESSENGER-VIDEO 58 AOL-PROTOCOL 59 APC-POWERCHUTE 60 APERTUS-LDP 61 APPLEJUICE 62 APPLEQTC 63 APPLEQTCSRVR 63 APPLIX 64 ARCISDMS 65 ARGUS 66 ARIEL1 67 ARIEL2 67 ARIEL3 68 ARIS 69 ARNS 70 ARUBA-PAPI 71 ASA 71 ASA-APPL-PROTO 72 ASIPREGISTRY 73 ASIP-WEBADMIN 74 AS-SERVERMAP 75 AT-3 76 AT-5 76 AT-7 77 AT-8 78 AT-ECHO 79 AT-NBP 80 AT-RTMP 80 AT-ZIS 81 AUDIO-OVER-HTTP 82 AUDIT 83 AUDITD 84 AURORA-CMGR 85 AURP 85 AUTH 86 QoS: NBAR Protocol Library, Cisco IOS XE Release 3.8S iii Contents AVIAN 87 AVOCENT 88 AX25 89 AYIYA-IPV6-TUNNELED 89 BABELGUM through BR-SAT-MON 92 BABELGUM 93 BACNET 93 BAIDU-MOVIE 94 BANYAN-RPC 95 BANYAN-VIP 96 BB 97 BBNRCCMON 98 BDP 98 BFTP 99 BGMP 100 BGP 101 BGS-NSI 102 BHEVENT 103 BHFHS 103 BHMDS 104 BINARY-OVER-HTTP 105 BITTORRENT 106 BL-IDM 107 BLIZWOW 107 BLOGGER 108 BMPP 109 BNA 110 BNET 111 BORLAND-DSJ 112 BR-SAT-MON 112
    [Show full text]
  • Simulacijski Alati I Njihova Ograničenja Pri Analizi I Unapređenju Rada Mreža Istovrsnih Entiteta
    SVEUČILIŠTE U ZAGREBU FAKULTET ORGANIZACIJE I INFORMATIKE VARAŽDIN Tedo Vrbanec SIMULACIJSKI ALATI I NJIHOVA OGRANIČENJA PRI ANALIZI I UNAPREĐENJU RADA MREŽA ISTOVRSNIH ENTITETA MAGISTARSKI RAD Varaždin, 2010. PODACI O MAGISTARSKOM RADU I. AUTOR Ime i prezime Tedo Vrbanec Datum i mjesto rođenja 7. travanj 1969., Čakovec Naziv fakulteta i datum diplomiranja Fakultet organizacije i informatike, 10. listopad 2001. Sadašnje zaposlenje Učiteljski fakultet Zagreb – Odsjek u Čakovcu II. MAGISTARSKI RAD Simulacijski alati i njihova ograničenja pri analizi i Naslov unapređenju rada mreža istovrsnih entiteta Broj stranica, slika, tablica, priloga, XIV + 181 + XXXVIII stranica, 53 slike, 18 tablica, 3 bibliografskih podataka priloga, 288 bibliografskih podataka Znanstveno područje, smjer i disciplina iz koje Područje: Informacijske znanosti je postignut akademski stupanj Smjer: Informacijski sustavi Mentor Prof. dr. sc. Željko Hutinski Sumentor Prof. dr. sc. Vesna Dušak Fakultet na kojem je rad obranjen Fakultet organizacije i informatike Varaždin Oznaka i redni broj rada III. OCJENA I OBRANA Datum prihvaćanja teme od Znanstveno- 17. lipanj 2008. nastavnog vijeća Datum predaje rada 9. travanj 2010. Datum sjednice ZNV-a na kojoj je prihvaćena 18. svibanj 2010. pozitivna ocjena rada Prof. dr. sc. Neven Vrček, predsjednik Sastav Povjerenstva koje je rad ocijenilo Prof. dr. sc. Željko Hutinski, mentor Prof. dr. sc. Vesna Dušak, sumentor Datum obrane rada 1. lipanj 2010. Prof. dr. sc. Neven Vrček, predsjednik Sastav Povjerenstva pred kojim je rad obranjen Prof. dr. sc. Željko Hutinski, mentor Prof. dr. sc. Vesna Dušak, sumentor Datum promocije SVEUČILIŠTE U ZAGREBU FAKULTET ORGANIZACIJE I INFORMATIKE VARAŽDIN POSLIJEDIPLOMSKI ZNANSTVENI STUDIJ INFORMACIJSKIH ZNANOSTI SMJER STUDIJA: INFORMACIJSKI SUSTAVI Tedo Vrbanec Broj indeksa: P-802/2001 SIMULACIJSKI ALATI I NJIHOVA OGRANIČENJA PRI ANALIZI I UNAPREĐENJU RADA MREŽA ISTOVRSNIH ENTITETA MAGISTARSKI RAD Mentor: Prof.
    [Show full text]
  • Synology NAS User's Guide Based on DSM 4.3
    Synology NAS User's Guide Based on DSM 4.3 Document ID Syno_UsersGuide_NAS_20130906 Table of Contents Chapter 1: Introduction Chapter 2: Get Started with Synology DiskStation Manager Install Synology NAS and DSM ............................................................................................................................................. 8 Log into Synology DiskStation Manager .............................................................................................................................. 8 DiskStation Manager Appearance ........................................................................................................................................ 9 Manage DSM with the Main Menu ..................................................................................................................................... 11 Manage Personal Options ................................................................................................................................................... 12 Chapter 3: Modify System Settings Change DSM Settings .......................................................................................................................................................... 14 Change Network Settings .................................................................................................................................................... 16 Modify Regional Options .....................................................................................................................................................
    [Show full text]
  • NBAR2 Standard Protocol Pack 1.0
    NBAR2 Standard Protocol Pack 1.0 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 © 2013 Cisco Systems, Inc. All rights reserved. CONTENTS CHAPTER 1 Release Notes for NBAR2 Standard Protocol Pack 1.0 1 CHAPTER 2 BGP 3 BITTORRENT 6 CITRIX 7 DHCP 8 DIRECTCONNECT 9 DNS 10 EDONKEY 11 EGP 12 EIGRP 13 EXCHANGE 14 FASTTRACK 15 FINGER 16 FTP 17 GNUTELLA 18 GOPHER 19 GRE 20 H323 21 HTTP 22 ICMP 23 IMAP 24 IPINIP 25 IPV6-ICMP 26 IRC 27 KAZAA2 28 KERBEROS 29 L2TP 30 NBAR2 Standard Protocol Pack 1.0 iii Contents LDAP 31 MGCP 32 NETBIOS 33 NETSHOW 34 NFS 35 NNTP 36 NOTES 37 NTP 38 OSPF 39 POP3 40 PPTP 41 PRINTER 42 RIP 43 RTCP 44 RTP 45 RTSP 46 SAP 47 SECURE-FTP 48 SECURE-HTTP 49 SECURE-IMAP 50 SECURE-IRC 51 SECURE-LDAP 52 SECURE-NNTP 53 SECURE-POP3 54 SECURE-TELNET 55 SIP 56 SKINNY 57 SKYPE 58 SMTP 59 SNMP 60 SOCKS 61 SQLNET 62 SQLSERVER 63 SSH 64 STREAMWORK 65 NBAR2 Standard Protocol Pack 1.0 iv Contents SUNRPC 66 SYSLOG 67 TELNET 68 TFTP 69 VDOLIVE 70 WINMX 71 NBAR2 Standard Protocol Pack 1.0 v Contents NBAR2 Standard Protocol Pack 1.0 vi CHAPTER 1 Release Notes for NBAR2 Standard Protocol Pack 1.0 NBAR2 Standard Protocol Pack Overview The Network Based Application Recognition (NBAR2) Standard Protocol Pack 1.0 is provided as the base protocol pack with an unlicensed Cisco image on a device.
    [Show full text]
  • Vysoke´Ucˇenítechnicke´V Brneˇ
    CORE Metadata, citation and similar papers at core.ac.uk Provided by Digital library of Brno University of Technology VYSOKE´ UCˇ ENI´ TECHNICKE´ V BRNEˇ BRNO UNIVERSITY OF TECHNOLOGY FAKULTA INFORMACˇ NI´CH TECHNOLOGII´ U´ STAV POCˇ ´ITACˇ OVY´ CH SYSTE´ MU˚ FACULTY OF INFORMATION TECHNOLOGY DEPARTMENT OF COMPUTER SYSTEMS DETEKCE DYNAMICKY´ CH SI´TˇOVY´ CH APLIKACI´ DIPLOMOVA´ PRA´ CE MASTER’S THESIS AUTOR PRA´ CE Bc. PAVEL BURIA´ N AUTHOR BRNO 2013 VYSOKE´ UCˇ ENI´ TECHNICKE´ V BRNEˇ BRNO UNIVERSITY OF TECHNOLOGY FAKULTA INFORMACˇ NI´CH TECHNOLOGII´ U´ STAV POCˇ ´ITACˇ OVY´ CH SYSTE´ MU˚ FACULTY OF INFORMATION TECHNOLOGY DEPARTMENT OF COMPUTER SYSTEMS DETEKCE DYNAMICKY´ CH SI´TˇOVY´ CH APLIKACI´ DETECTION OF DYNAMIC NETWORK APPLICATIONS DIPLOMOVA´ PRA´ CE MASTER’S THESIS AUTOR PRA´ CE Bc. PAVEL BURIA´ N AUTHOR VEDOUCI´ PRA´ CE Ing. JAN KASˇ TIL SUPERVISOR BRNO 2013 Abstrakt Tato práce se zabývá detekcí dynamických síťových aplikací. Popisuje některé stávající protokoly a zpùsoby jejich identifikace z IP tokù a obsahu paketù. Pøedstavuje návrh de- tekčního systému, založeného na automatické tvorbě regulárních výrazů a popisuje jeho implementaci. Prezentuje vytvoøené regulární výrazy pro BitTorrent a eDonkey protokol. Jejich kvalitu srovnává s řešením L7-filteru. Abstract This thesis deals with detection of dynamic network applications. It describes some of the existing protocols and methods of their identification from IP flow and packet contents. It constitues a design of a detection system based on the automatic creation of regular expressions and describes its implementation. It presents the created regular expressions for BitTorrent and eDonkey protocol. It compares their quality with the solution of L7-filter.
    [Show full text]
  • Mobile Peer Model a Mobile Peer-To-Peer Communication and Coordination Framework - with Focus on Scalability and Security
    Die approbierte Originalversion dieser Diplom-/ Masterarbeit ist in der Hauptbibliothek der Tech- nischen Universität Wien aufgestellt und zugänglich. http://www.ub.tuwien.ac.at The approved original version of this diploma or master thesis is available at the main library of the Vienna University of Technology. http://www.ub.tuwien.ac.at/eng Mobile Peer Model A mobile peer-to-peer communication and coordination framework - with focus on scalability and security DIPLOMARBEIT zur Erlangung des akademischen Grades Diplom-Ingenieur im Rahmen des Studiums Software Engineering & Internet Computing eingereicht von Jörg Schoba, BSc Matrikelnummer 01026309 an der Fakultät für Informatik der Technischen Universität Wien Betreuung: Ao.Univ.Prof. Dipl.-Ing. Dr.techn. Eva Kühn Mitwirkung: Projektass. Dipl.-Ing. Stefan Craß Wien, 10. Oktober 2017 Jörg Schoba Eva Kühn Technische Universität Wien A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.ac.at Mobile Peer Model A mobile peer-to-peer communication and coordination framework - with focus on scalability and security DIPLOMA THESIS submitted in partial fulfillment of the requirements for the degree of Diplom-Ingenieur in Software Engineering & Internet Computing by Jörg Schoba, BSc Registration Number 01026309 to the Faculty of Informatics at the TU Wien Advisor: Ao.Univ.Prof. Dipl.-Ing. Dr.techn. Eva Kühn Assistance: Projektass. Dipl.-Ing. Stefan Craß Vienna, 10th October, 2017 Jörg Schoba Eva Kühn Technische Universität Wien A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.ac.at Erklärung zur Verfassung der Arbeit Jörg Schoba, BSc Donaufelderstraße 8/1/12 1210 Wien Hiermit erkläre ich, dass ich diese Arbeit selbständig verfasst habe, dass ich die verwen- deten Quellen und Hilfsmittel vollständig angegeben habe und dass ich die Stellen der Arbeit – einschließlich Tabellen, Karten und Abbildungen –, die anderen Werken oder dem Internet im Wortlaut oder dem Sinn nach entnommen sind, auf jeden Fall unter Angabe der Quelle als Entlehnung kenntlich gemacht habe.
    [Show full text]
  • Hash Collision Attack Vectors on the Ed2k P2P Network
    Hash Collision Attack Vectors on the eD2k P2P Network Uzi Tuvian Lital Porat Interdisciplinary Center Herzliya E-mail: {tuvian.uzi,porat.lital}[at]idc.ac.il Abstract generate colliding executables – two different executables which share the same hash value. In this paper we discuss the implications of MD4 In this paper we present attack vectors which use collision attacks on the integrity of the eD2k P2P such colliding executables into an elaborate attacks on network. Using such attacks it is possible to generate users of the eD2k network which uses the MD4 hash two different files which share the same MD4 hash algorithm in its generation of unique file identifiers. value and therefore the same signature in the eD2k By voiding the 'uniqueness' of the identifiers, the network. Leveraging this vulnerability enables a attacks enable selective distribution – distributing a covert attack in which a selected subset of the hosts specially generated harmless file as a decoy to garner receive malicious versions of a file while the rest of the popularity among hosts in the network, and then network receives a harmless one. leveraging this popularity to send malicious We cover the trust relations that can be voided as a executables to a specific sub-group. Unlike consequence of this attack and describe a utility conventional distribution of files over P2P networks, developed by the authors that can be used for a rapid the attacks described give the attacker relatively high deployment of this technique. Additionally, we present control of the targets of the attack, and even lets the novel attack vectors that arise from this vulnerability, attacker terminate the distribution of the malicious and suggest modifications to the protocol that can executable at any given stage.
    [Show full text]
  • List of TCP and UDP Port Numbers from Wikipedia, the Free Encyclopedia
    List of TCP and UDP port numbers From Wikipedia, the free encyclopedia This is a list of Internet socket port numbers used by protocols of the transport layer of the Internet Protocol Suite for the establishment of host-to-host connectivity. Originally, port numbers were used by the Network Control Program (NCP) in the ARPANET for which two ports were required for half- duplex transmission. Later, the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) needed only one port for full- duplex, bidirectional traffic. The even-numbered ports were not used, and this resulted in some even numbers in the well-known port number /etc/services, a service name range being unassigned. The Stream Control Transmission Protocol database file on Unix-like operating (SCTP) and the Datagram Congestion Control Protocol (DCCP) also systems.[1][2][3][4] use port numbers. They usually use port numbers that match the services of the corresponding TCP or UDP implementation, if they exist. The Internet Assigned Numbers Authority (IANA) is responsible for maintaining the official assignments of port numbers for specific uses.[5] However, many unofficial uses of both well-known and registered port numbers occur in practice. Contents 1 Table legend 2 Well-known ports 3 Registered ports 4 Dynamic, private or ephemeral ports 5 See also 6 References 7 External links Table legend Official: Port is registered with IANA for the application.[5] Unofficial: Port is not registered with IANA for the application. Multiple use: Multiple applications are known to use this port. Well-known ports The port numbers in the range from 0 to 1023 are the well-known ports or system ports.[6] They are used by system processes that provide widely used types of network services.
    [Show full text]
  • Hacking for Dummies.Pdf
    01 55784X FM.qxd 3/29/04 4:16 PM Page i Hacking FOR DUMmIES‰ by Kevin Beaver Foreword by Stuart McClure 01 55784X FM.qxd 3/29/04 4:16 PM Page v 01 55784X FM.qxd 3/29/04 4:16 PM Page i Hacking FOR DUMmIES‰ by Kevin Beaver Foreword by Stuart McClure 01 55784X FM.qxd 3/29/04 4:16 PM Page ii Hacking For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 Copyright © 2004 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permis- sion of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4447, e-mail: permcoordinator@ wiley.com. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc.
    [Show full text]
  • Broadcasters and the Broadcasters and the Internet
    Broadcasters and the Broadcasters and the Internet Internet EBU Members’ Internet Presence Distribution Strategies Online Consumption Trends Social Networking and Video Sharing Communities November 2007 European Broadcasting Union Strategic Information Service (SIS) L’Ancienne-Route 17A CH-1218 Grand-Saconnex Switzerland Phone +41 (0) 22 717 21 11 Fax +41 (0)22 747 40 00 www.ebu.ch/sis European Broadcasting Union l Strategic Information Service Broadcasters and the Internet EBU Members' Internet Presence Distribution Strategies Online Consumption Trends Social Networking and Video Sharing Communities November 2007 The Report Staff This report was produced by the Strategic Information Service of the EBU. Editor: Alexander Shulzycki Production Editor: Anna-Sara Stalvik Principal Researcher: Anna-Sara Stalvik Special appreciation to: Danish Radio and Television (DR) Swedish Television (SVT) Swedish Radio (SR) Cover Design: Philippe Juttens European Broadcasting Union Telephone: +41 22 717 2111 Address: L'Ancienne-Route 17A, 1218 Geneva, Switzerland SIS web-site: www.ebu.ch/director_general/sis.php SIS contact e-mail: [email protected] BROADCASTERS AND THE INTERNET TABLE OF CONTENTS INTRODUCTION.............................................................................................................. 1 OVERVIEW .............................................................................................................................1 1. The general Internet landscape: usage, websites, advertising ............................................
    [Show full text]
  • The Deep Dark
    THE DEEP DARK WEB Pierluigi Paganini—Richard Amores Published by Paganini Amores at Smashwords Copyright 2012 Paganini–Amores The Deep Dark Web - paganini/amores publishing 212 providence St, West Warwick, RI 02893 - 401-400-2932 ALL RIGHTS RESERVED. This book contains material protected under International and Federal Copyright Laws and Treaties. Any unauthorized reprint or use of this material is prohibited. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system without express written permission from the author / publisher. The information in this book is distributed on an “As Is and for educational only” basis, without warranty. While every precaution has been taken in the preparation of this work, neither the author nor Paganini-Amores publishing. shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in this book. ISBN: 9781301147106 Publisher – Paganini – Amores For information on book distributors or translations, please contact Publisher Paganini –Amores 212 Providence St Rhode Island 02893 Or Via Dell'Epomeo 180 Parco del Pino Fab.C Sc. A 80126 - Napoli (ITALY) Phone 401-400-2932 – [email protected] deepdarkweb.com – uscyberlabs.com – securityaffairs.co Graphics Designer – Gianni Motta was born in Naples in 1977. He is a creative with over ten years in the field of communication, graphic and web designer. Currently he is in charge for Communication Manager in a cyber security firm.
    [Show full text]
  • Technical Report Java Multi User Learning Environment (Jmule)
    JMule team 3/8/2004 Technical Report Java Multi User Learning Environment (jMule) Ioannis Baltopoulos Robin Kilpatrick Hannes Ricklefs Neil Saunders [email protected] [email protected] [email protected] [email protected] University of Kent, University of Kent, University of Kent, University of Kent, Computing Laboratory, Computing Laboratory, Computing Laboratory, Computing Laboratory, Canterbury, CT2 7NF Canterbury, CT2 7NF Canterbury, CT2 7NF Canterbury, CT2 7NF ABSTRACT This report provides an overview of the final year project undertaken as part of a BSc (Hons) degree in Computer Science at the University of Kent during the academic year 2003-4. The project involved creating a software application that enables multiple physically isolated individuals to collaborate, learn, and give presentations through virtual meetings. The solution produced was entitled jMule, the Java Multi User Learning Environment. This paper outlines the processes, design rationale, implementation and testing that were conducted during this project and offers an exploration of possible future enhancements. It concludes by offering critical evaluation on the overall success of the project. Keywords Distance Collaboration, Distant Learning, Virtual Presence, Collaboration in Education 1. INTRODUCTION ................................................1 6.2 User Evaluations ..........................................6 1.1 Background .................................................1 6.3 Performance Measures ...................................6 1.2 Aims ..........................................................2
    [Show full text]