<br /> Digital<br /> The Quarterly Magazine for Digital Forensics Practitioners Issue 28 · August 2016<br /> WIN! an iPod Nano<br /> ForensicS<br /> / magazine<br /> Log Extraction and Analysis of<br /> CHROMECAST<br /> 2.0<br /> Latest News, 360<br /> Book Reviews, IRQ<br /> & much more inside!<br /> PLUS!<br /> Mathematica<br /> Careers in Cyber Security<br /> Embedded Computing<br /> Cloud Honeypots<br /> 28<br /> 9 772042 061004<br /> Issue 28 / £14.99 TR Media<br /> <br /> EDITORIAL<br /> O<br /> ver the past few weeks and months<br /> I have been involved with research, doing<br /> presentations, sitting at Round Table events<br /> and reading more<a title="DFM28 - Online page 1" href="http://viewer.zmags.com/publication/d92f9eea?page=1"> Digital The Quarterly Magazine for Digital Fore</a> <a title="DFM28 - Online page 2" href="http://viewer.zmags.com/publication/d92f9eea?page=2"> </a> <a title="DFM28 - Online page 3" href="http://viewer.zmags.com/publication/d92f9eea?page=3"> EDITORIAL O </a> <a title="DFM28 - Online page 4" href="http://viewer.zmags.com/publication/d92f9eea?page=4"> </a> <a title="DFM28 - Online page 5" href="http://viewer.zmags.com/publication/d92f9eea?page=5"> 50 FEATURES 08 / Image Visualization and </a> <a title="DFM28 - Online page 6" href="http://viewer.zmags.com/publication/d92f9eea?page=6"> / NEWS NEWS NEWS / European Biometrics For Sec</a> <a title="DFM28 - Online page 7" href="http://viewer.zmags.com/publication/d92f9eea?page=7"> / NEWS ROUND-UP POKÉMON GO SERVERS BROUGHT DOWN B</a> <a title="DFM28 - Online page 8" href="http://viewer.zmags.com/publication/d92f9eea?page=8"> / FEATURE IMAGE VISUALIZATION & CONTENT IDENTI</a> <a title="DFM28 - Online page 9" href="http://viewer.zmags.com/publication/d92f9eea?page=9"> / Thumbnail[] Through experimentation, we have de</a> <a title="DFM28 - Online page 10" href="http://viewer.zmags.com/publication/d92f9eea?page=10"> / FEATURE Equally important is determinin</a> <a title="DFM28 - Online page 11" href="http://viewer.zmags.com/publication/d92f9eea?page=11"> Example output from running Code Snippet 3 is</a> <a title="DFM28 - Online page 12" href="http://viewer.zmags.com/publication/d92f9eea?page=12"> / FEATURE Figure </a> <a title="DFM28 - Online page 13" href="http://viewer.zmags.com/publication/d92f9eea?page=13"> </a> <a title="DFM28 - Online page 14" href="http://viewer.zmags.com/publication/d92f9eea?page=14"> / FEATURE (* PROGRAM INITIALIZATION & MEMORY </a> <a title="DFM28 - Online page 15" href="http://viewer.zmags.com/publication/d92f9eea?page=15"> for parallelized and non-parallelized code. Memor</a> <a title="DFM28 - Online page 16" href="http://viewer.zmags.com/publication/d92f9eea?page=16"> / FEATURE and personal preferences, are often</a> <a title="DFM28 - Online page 17" href="http://viewer.zmags.com/publication/d92f9eea?page=17"> recognized as persons or as the clothes they wore</a> <a title="DFM28 - Online page 18" href="http://viewer.zmags.com/publication/d92f9eea?page=18"> </a> <a title="DFM28 - Online page 19" href="http://viewer.zmags.com/publication/d92f9eea?page=19"> / LEGAL EDITORIAL LEGAL EDITORIAL The elephant in</a> <a title="DFM28 - Online page 20" href="http://viewer.zmags.com/publication/d92f9eea?page=20"> / LEGAL FEATURE TALKING ABOUT PATENT INFRINGEM</a> <a title="DFM28 - Online page 21" href="http://viewer.zmags.com/publication/d92f9eea?page=21"> THE DOCTRINE PREVENTING INFRINGEMENT LIABIL</a> <a title="DFM28 - Online page 22" href="http://viewer.zmags.com/publication/d92f9eea?page=22"> / LEGAL FEATURE TO PUT IT ANOTHER WAY, </a> <a title="DFM28 - Online page 23" href="http://viewer.zmags.com/publication/d92f9eea?page=23"> previously) irreparable damages to the complainan</a> <a title="DFM28 - Online page 24" href="http://viewer.zmags.com/publication/d92f9eea?page=24"> / LEGAL EDITORIAL LEGAL NEWS A round-up of the la</a> <a title="DFM28 - Online page 25" href="http://viewer.zmags.com/publication/d92f9eea?page=25"> </a> <a title="DFM28 - Online page 26" href="http://viewer.zmags.com/publication/d92f9eea?page=26"> / INTERVIEW MEET THE PROFESSIONALS / Steve Wa</a> <a title="DFM28 - Online page 27" href="http://viewer.zmags.com/publication/d92f9eea?page=27"> What are your main areas of interest and research</a> <a title="DFM28 - Online page 28" href="http://viewer.zmags.com/publication/d92f9eea?page=28"> / INTERVIEW What are your views on the indust</a> <a title="DFM28 - Online page 29" href="http://viewer.zmags.com/publication/d92f9eea?page=29"> </a> <a title="DFM28 - Online page 30" href="http://viewer.zmags.com/publication/d92f9eea?page=30"> / FROM THE LAB SSD FORENSICS Santosh Khadsare </a> <a title="DFM28 - Online page 31" href="http://viewer.zmags.com/publication/d92f9eea?page=31"> / SSD Advantages · SSD is approx 15 times faster </a> <a title="DFM28 - Online page 32" href="http://viewer.zmags.com/publication/d92f9eea?page=32"> / FROM THE LAB / SSD Architecture `TRIM` Scare T</a> <a title="DFM28 - Online page 33" href="http://viewer.zmags.com/publication/d92f9eea?page=33"> is easier to implement and does not have an impac</a> <a title="DFM28 - Online page 34" href="http://viewer.zmags.com/publication/d92f9eea?page=34"> / FROM THE LAB SOLID STATE </a> <a title="DFM28 - Online page 35" href="http://viewer.zmags.com/publication/d92f9eea?page=35"> </a> <a title="DFM28 - Online page 36" href="http://viewer.zmags.com/publication/d92f9eea?page=36"> / FEATURE CAREERS IN CYBER SECURITY AND P</a> <a title="DFM28 - Online page 37" href="http://viewer.zmags.com/publication/d92f9eea?page=37"> / Professional Development Planning THE</a> <a title="DFM28 - Online page 38" href="http://viewer.zmags.com/publication/d92f9eea?page=38"> / FEATURE THE SECURITY </a> <a title="DFM28 - Online page 39" href="http://viewer.zmags.com/publication/d92f9eea?page=39"> / IISP The Institute for Information Security Pro</a> <a title="DFM28 - Online page 40" href="http://viewer.zmags.com/publication/d92f9eea?page=40"> / ADVERTORIAL CYBER SECURITY, ACADEMIA AND INDUST</a> <a title="DFM28 - Online page 41" href="http://viewer.zmags.com/publication/d92f9eea?page=41"> 41</a> <a title="DFM28 - Online page 42" href="http://viewer.zmags.com/publication/d92f9eea?page=42"> / COMPETITION COMPETITION / This issue we have</a> <a title="DFM28 - Online page 43" href="http://viewer.zmags.com/publication/d92f9eea?page=43"> / COMING SOON COMING SOON… A round-up of featu</a> <a title="DFM28 - Online page 44" href="http://viewer.zmags.com/publication/d92f9eea?page=44"> / FEATURE CHROMECAST 2.0 LOG EXTRACTION AND AN</a> <a title="DFM28 - Online page 45" href="http://viewer.zmags.com/publication/d92f9eea?page=45"> Figure 3. Additional Report Files Chromecast. Th</a> <a title="DFM28 - Online page 46" href="http://viewer.zmags.com/publication/d92f9eea?page=46"> / FEATURE To ascertain why this error occ</a> <a title="DFM28 - Online page 47" href="http://viewer.zmags.com/publication/d92f9eea?page=47"> addresses may be an issue for forensic investigat</a> <a title="DFM28 - Online page 48" href="http://viewer.zmags.com/publication/d92f9eea?page=48"> / FEATURE THE PRESENCE OF THESE IP ADDRE</a> <a title="DFM28 - Online page 49" href="http://viewer.zmags.com/publication/d92f9eea?page=49"> </a> <a title="DFM28 - Online page 50" href="http://viewer.zmags.com/publication/d92f9eea?page=50"> / FEATURE SECURITY GUIDANCE FOR CRITICAL AREAS</a> <a title="DFM28 - Online page 51" href="http://viewer.zmags.com/publication/d92f9eea?page=51"> / The Problem with IoT ‘Security’ They're proprie</a> <a title="DFM28 - Online page 52" href="http://viewer.zmags.com/publication/d92f9eea?page=52"> / FEATURE / Open Source Microsoft Windows, Adobe</a> <a title="DFM28 - Online page 53" href="http://viewer.zmags.com/publication/d92f9eea?page=53"> / Secure Boot As discussed, the software in so ma</a> <a title="DFM28 - Online page 54" href="http://viewer.zmags.com/publication/d92f9eea?page=54"> / FEATURE / Securing the Internet of Things A t</a> <a title="DFM28 - Online page 55" href="http://viewer.zmags.com/publication/d92f9eea?page=55"> </a> <a title="DFM28 - Online page 56" href="http://viewer.zmags.com/publication/d92f9eea?page=56"> / FEATURE SEMANTIC TRUST IN WHAT WE OWN Brian </a> <a title="DFM28 - Online page 57" href="http://viewer.zmags.com/publication/d92f9eea?page=57"> software relied more heavily on booting software,</a> <a title="DFM28 - Online page 58" href="http://viewer.zmags.com/publication/d92f9eea?page=58"> / FEATURE a relevant phone number, contact, o</a> <a title="DFM28 - Online page 59" href="http://viewer.zmags.com/publication/d92f9eea?page=59"> many cells. Consequently an electron microscope c</a> <a title="DFM28 - Online page 60" href="http://viewer.zmags.com/publication/d92f9eea?page=60"> / FEATURE physical memory. When digital foren</a> <a title="DFM28 - Online page 61" href="http://viewer.zmags.com/publication/d92f9eea?page=61"> captivating games that can also access all of the</a> <a title="DFM28 - Online page 62" href="http://viewer.zmags.com/publication/d92f9eea?page=62"> </a> <a title="DFM28 - Online page 63" href="http://viewer.zmags.com/publication/d92f9eea?page=63"> </a> <a title="DFM28 - Online page 64" href="http://viewer.zmags.com/publication/d92f9eea?page=64"> / FEATURE CLOUD HONEYPOTS “How feasible is a d</a> <a title="DFM28 - Online page 65" href="http://viewer.zmags.com/publication/d92f9eea?page=65"> BOTH THE SIZE AND THE FREQUENCY OF THE MALI</a> <a title="DFM28 - Online page 66" href="http://viewer.zmags.com/publication/d92f9eea?page=66"> / FEATURE The European Network and Infor</a> <a title="DFM28 - Online page 67" href="http://viewer.zmags.com/publication/d92f9eea?page=67"> honeypot being as realistic as possible so as to </a> <a title="DFM28 - Online page 68" href="http://viewer.zmags.com/publication/d92f9eea?page=68"> / FEATURE Figure 5. Kippo T</a> <a title="DFM28 - Online page 69" href="http://viewer.zmags.com/publication/d92f9eea?page=69"> THE RESULTS SHOW THAT ALL THE FRONT END INP</a> <a title="DFM28 - Online page 70" href="http://viewer.zmags.com/publication/d92f9eea?page=70"> / FEATURE Figure 13. Malwa</a> <a title="DFM28 - Online page 71" href="http://viewer.zmags.com/publication/d92f9eea?page=71"> to the Bill Gates botnet which is a Linux specific</a> <a title="DFM28 - Online page 72" href="http://viewer.zmags.com/publication/d92f9eea?page=72"> / FEATURE / Findings through honeypot compari</a> <a title="DFM28 - Online page 73" href="http://viewer.zmags.com/publication/d92f9eea?page=73"> which meant their databases were easily accessibl</a> <a title="DFM28 - Online page 74" href="http://viewer.zmags.com/publication/d92f9eea?page=74"> / 360 36 Letters, emails, tweets, connections and</a> <a title="DFM28 - Online page 75" href="http://viewer.zmags.com/publication/d92f9eea?page=75"> / FACEBOOK At present we have a Facebook group, w</a> <a title="DFM28 - Online page 76" href="http://viewer.zmags.com/publication/d92f9eea?page=76"> / book reviews BOOK REVIEWS PROFESSIONAL PENETRAT</a> <a title="DFM28 - Online page 77" href="http://viewer.zmags.com/publication/d92f9eea?page=77"> COMPUTER INCIDENT RESPONSE AND FORENSICS TEAM MAN</a> <a title="DFM28 - Online page 78" href="http://viewer.zmags.com/publication/d92f9eea?page=78"> / IRQ IRQ Deterrence? I really don't fan</a> <a title="DFM28 - Online page 79" href="http://viewer.zmags.com/publication/d92f9eea?page=79"> </a> <a title="DFM28 - Online page 80" href="http://viewer.zmags.com/publication/d92f9eea?page=80"> </a>