mainelyforensics.blogspot.com mainelyforensics.blogspot.com

MAINELYFORENSICS.BLOGSPOT.COM

Mainely Forensics

Thursday, April 17, 2014. This final blog post will summarize my findings on my Capstone project on Hping3 forensics. Since my research portion was finished in the last blog post this post will focus on obscuring the data, catching the data using an intrusion detection system (IDS), and why this information is significant. Below is command typed to send a document (test) through to an IP address (216.93.147.70) at one byte at a time (-d 1). The first parameter was data =! 48 This would filter all packets...

http://mainelyforensics.blogspot.com/

WEBSITE DETAILS
SEO
PAGES
SIMILAR SITES

TRAFFIC RANK FOR MAINELYFORENSICS.BLOGSPOT.COM

TODAY'S RATING

>1,000,000

TRAFFIC RANK - AVERAGE PER MONTH

BEST MONTH

June

AVERAGE PER DAY Of THE WEEK

HIGHEST TRAFFIC ON

Friday

TRAFFIC BY CITY

CUSTOMER REVIEWS

Average Rating: 4.0 out of 5 with 4 reviews
5 star
1
4 star
2
3 star
1
2 star
0
1 star
0

Hey there! Start your review of mainelyforensics.blogspot.com

AVERAGE USER RATING

Write a Review

WEBSITE PREVIEW

Desktop Preview Tablet Preview Mobile Preview

LOAD TIME

0.2 seconds

FAVICON PREVIEW

  • mainelyforensics.blogspot.com

    16x16

  • mainelyforensics.blogspot.com

    32x32

  • mainelyforensics.blogspot.com

    64x64

  • mainelyforensics.blogspot.com

    128x128

CONTACTS AT MAINELYFORENSICS.BLOGSPOT.COM

Login

TO VIEW CONTACTS

Remove Contacts

FOR PRIVACY ISSUES

CONTENT

SCORE

6.2

PAGE TITLE
Mainely Forensics | mainelyforensics.blogspot.com Reviews
<META>
DESCRIPTION
Thursday, April 17, 2014. This final blog post will summarize my findings on my Capstone project on Hping3 forensics. Since my research portion was finished in the last blog post this post will focus on obscuring the data, catching the data using an intrusion detection system (IDS), and why this information is significant. Below is command typed to send a document (test) through to an IP address (216.93.147.70) at one byte at a time (-d 1). The first parameter was data =! 48 This would filter all packets...
<META>
KEYWORDS
1 mainely forensics
2 hping3 reflection
3 obscuring the data
4 using an ids
5 significance
6 posted by
7 kevin nickerson
8 no comments
9 email this
10 blogthis
CONTENT
Page content here
KEYWORDS ON
PAGE
mainely forensics,hping3 reflection,obscuring the data,using an ids,significance,posted by,kevin nickerson,no comments,email this,blogthis,share to twitter,share to facebook,share to pinterest,hping3 forensic aritfacts,updates,the research,test 1,test 2
SERVER
GSE
CONTENT-TYPE
utf-8
GOOGLE PREVIEW

Mainely Forensics | mainelyforensics.blogspot.com Reviews

https://mainelyforensics.blogspot.com

Thursday, April 17, 2014. This final blog post will summarize my findings on my Capstone project on Hping3 forensics. Since my research portion was finished in the last blog post this post will focus on obscuring the data, catching the data using an intrusion detection system (IDS), and why this information is significant. Below is command typed to send a document (test) through to an IP address (216.93.147.70) at one byte at a time (-d 1). The first parameter was data =! 48 This would filter all packets...

INTERNAL PAGES

mainelyforensics.blogspot.com mainelyforensics.blogspot.com
1

Mainely Forensics: A Little Introduction

http://www.mainelyforensics.blogspot.com/2014/01/a-little-introduction.html

Wednesday, January 22, 2014. Hello blog viewing world! My name is Kevin Nickerson and I am a senior in the Computer and Digital Forensics major here at Champlain College. This blog is part of my Senior Capstone Class that involves research and contribution to the field of computer forensics. This is my first of several blog posts about the work I have started on Covert Channel Forensics. Covert Channeling hides exfiltrated data in DNS Headers. Picture from Erik Couture article below). If you are ever hea...

2

Mainely Forensics: Hping3 Forensic Aritfacts

http://www.mainelyforensics.blogspot.com/2014/03/hping3-forensic-aritfacts.html

Thursday, March 13, 2014. Once I switched my project to hping3 I started researching the program and testing its capabilities. Hping3 is a command line based tool that can be used to troubleshoot and test networks and hosts. In addition to its ability to test network connection and help a company, it also has the capabilities to send information through different network protocols. My tests done so far have been tested on IP, ICMP, and UDP. The underlined hex values are resent that this packet is an IP p...

3

Mainely Forensics: March 2014

http://www.mainelyforensics.blogspot.com/2014_03_01_archive.html

Thursday, March 13, 2014. Once I switched my project to hping3 I started researching the program and testing its capabilities. Hping3 is a command line based tool that can be used to troubleshoot and test networks and hosts. In addition to its ability to test network connection and help a company, it also has the capabilities to send information through different network protocols. My tests done so far have been tested on IP, ICMP, and UDP. The underlined hex values are resent that this packet is an IP p...

4

Mainely Forensics: April 2014

http://www.mainelyforensics.blogspot.com/2014_04_01_archive.html

Thursday, April 17, 2014. This final blog post will summarize my findings on my Capstone project on Hping3 forensics. Since my research portion was finished in the last blog post this post will focus on obscuring the data, catching the data using an intrusion detection system (IDS), and why this information is significant. Below is command typed to send a document (test) through to an IP address (216.93.147.70) at one byte at a time (-d 1). The first parameter was data =! 48 This would filter all packets...

5

Mainely Forensics: Hping3 Reflection

http://www.mainelyforensics.blogspot.com/2014/04/hping3-reflection.html

Thursday, April 17, 2014. This final blog post will summarize my findings on my Capstone project on Hping3 forensics. Since my research portion was finished in the last blog post this post will focus on obscuring the data, catching the data using an intrusion detection system (IDS), and why this information is significant. Below is command typed to send a document (test) through to an IP address (216.93.147.70) at one byte at a time (-d 1). The first parameter was data =! 48 This would filter all packets...

UPGRADE TO PREMIUM TO VIEW 1 MORE

TOTAL PAGES IN THIS WEBSITE

6

LINKS TO THIS WEBSITE

forensicadventures.blogspot.com forensicadventures.blogspot.com

Maegan's Forensic Adventures: The ReFS Forensics Adventure Continues

http://forensicadventures.blogspot.com/2014/03/the-refs-forensics-adventure-continues.html

Tuesday, March 11, 2014. The ReFS Forensics Adventure Continues. Over the past few months I have been attempting to understand ReFS. This post will outline what I have done with the project so far and what discoveries I have made. Sample ReFS Virtual Drive. ReFS is not bootable. This was an expected result based on prior research and information posted on MSDN. Timestamps are in same format as NTFS (Windows 64 bit Little Endian). Subscribe to: Post Comments (Atom). View my complete profile. Watermark tem...

forensicadventures.blogspot.com forensicadventures.blogspot.com

Maegan's Forensic Adventures: March 2014

http://forensicadventures.blogspot.com/2014_03_01_archive.html

Thursday, March 20, 2014. File Tables in ReFS. MACE times in unallocated space file table. MACE times in allocated space file table. File Table Entry Example. Tuesday, March 11, 2014. The ReFS Forensics Adventure Continues. Over the past few months I have been attempting to understand ReFS. This post will outline what I have done with the project so far and what discoveries I have made. Sample ReFS Virtual Drive. Timestamps are in same format as NTFS (Windows 64 bit Little Endian). File Tables in ReFS.

forensicadventures.blogspot.com forensicadventures.blogspot.com

Maegan's Forensic Adventures: April 2014

http://forensicadventures.blogspot.com/2014_04_01_archive.html

Saturday, April 12, 2014. Nearing the End of the ReFS Adventure. I am nearing the end of my semester and finishing up my Capstone project. I have made quite a bit of progress in discovering ReFS's structure and how it compares to NTFS. Below are my findings, including updates to the findings talked about in my post, File Tables in ReFS. Compared to NTFS there is the possibility for a significantly more slack space with ReFS. This is due to the file system defaulting to large cluster sizes. This a...These...

forensicadventures.blogspot.com forensicadventures.blogspot.com

Maegan's Forensic Adventures: January 2014

http://forensicadventures.blogspot.com/2014_01_01_archive.html

Monday, January 20, 2014. An Introduction to the ReFS Forensics Adventure. This is my first post in a series of posts for my Digital Forensics Capstone. At Champlain College. Each senior has the ability to chose one project and conduct cutting-edge research on it; I have chosen to do my project on Resilient File System (ReFS). Windows Server 2012: Main operating system being used for this project. The questions I would like to answer through my research include:. What does the structure of ReFS look like?

forensicadventures.blogspot.com forensicadventures.blogspot.com

Maegan's Forensic Adventures: ReFS/NTFS Comparison

http://forensicadventures.blogspot.com/2014/04/refsntfs-comparison.html

Sunday, April 6, 2014. In my last post I talked about the ReFS file table. Here's a visual comparing ReFS to NTFS:. Subscribe to: Post Comments (Atom). 160;is a recent graduate of Champlain College with a Bachelors Degree in Computer and Digital Forensics. View my complete profile. Nearing the End of the ReFS Adventure. Under the Hill Forensics. Final Update and Conclusions. Google Glass Timeline Forensics. A Forensic Examiner's Guide to Google Glass. Nick Aspinwall Digital Forensics Research.

forensicadventures.blogspot.com forensicadventures.blogspot.com

Maegan's Forensic Adventures: CEIC 2014

http://forensicadventures.blogspot.com/2014/06/ceic-2014.html

Monday, June 2, 2014. A little over a week ago I had the opportunity to attend Guidance Software's Computer and Enterprise Investigations Conference (CEIC). I attended a number of sessions including Field Triage and RAM Analysis, Defrag Forensics, Vehicle System Forensics, Examining Volume Shadow Copies, APT Attacks Exposed, and Advanced Decryption, but the two that stuck with me the most were Analysis and Correlation of Mac Logs and SSD Forensics. This year was my second time going to the SSD Forensics.

forensicadventures.blogspot.com forensicadventures.blogspot.com

Maegan's Forensic Adventures: June 2014

http://forensicadventures.blogspot.com/2014_06_01_archive.html

Monday, June 2, 2014. A little over a week ago I had the opportunity to attend Guidance Software's Computer and Enterprise Investigations Conference (CEIC). I attended a number of sessions including Field Triage and RAM Analysis, Defrag Forensics, Vehicle System Forensics, Examining Volume Shadow Copies, APT Attacks Exposed, and Advanced Decryption, but the two that stuck with me the most were Analysis and Correlation of Mac Logs and SSD Forensics. This year was my second time going to the SSD Forensics.

lahaie4n6.blogspot.com lahaie4n6.blogspot.com

Under the Hill Forensics: January 2014

http://lahaie4n6.blogspot.com/2014_01_01_archive.html

Under the Hill Forensics. A blog about my capstone and my life as a forensicator. And no, I do not live in the Shire with Bilbo Baggins. Monday, January 20, 2014. IDrive Forensics: Up in the Clouds. Welcome to my first blog post for my Capstone project! I will be doing my Capstone on a cloud service called IDrive. Before I start with what I am doing, let me introduce myself. My name is Colby Lahaie. And I am currently a senior attending Champlain College. In the Computer and Digital Forensics. For this p...

lahaie4n6.blogspot.com lahaie4n6.blogspot.com

Under the Hill Forensics: Hidden Behind the Cumulonimbus Part 2A

http://lahaie4n6.blogspot.com/2014/04/the-cloud-continues-to-dissipate.html

Under the Hill Forensics. A blog about my capstone and my life as a forensicator. And no, I do not live in the Shire with Bilbo Baggins. Sunday, April 13, 2014. Hidden Behind the Cumulonimbus Part 2A. This is part two of "Hidden Behind the Cumulonimbus Part. Blog post. This blog continues to cover the IDTEMP folder. Delete and Archive Cleanup Files. After deleting files within IDrive there is one additional file created in the IDTEMP folder. This files is called “Delete.txt”. This file is similar to the ...

UPGRADE TO PREMIUM TO VIEW 35 MORE

TOTAL LINKS TO THIS WEBSITE

44

OTHER SITES

mainelyfood.com mainelyfood.com

Mainely Food | About the food and culture of coastal Maine

About the food and culture of coastal Maine. More culinary information coming soon…. April 4, 2013. More culinary information coming soon…. Proudly powered by WordPress.

mainelyfoods.com mainelyfoods.com

mainelyfoods.com

mainelyfoods.net mainelyfoods.net

mainelyfoods.net

mainelyfoods.org mainelyfoods.org

mainelyfoods.org

mainelyfootcare.com mainelyfootcare.com

Mainely Foot Care & Wellness - Home

160;                                               Thank You for visiting  . 160;    Kathy Long     Tiffany Parsons     Jessica Belanger        Claire Guy. 160;   . During an average life time each person walks about 115,000. 160;and three quarters of the people have foot problems at some point in their lives. Foot problems can arise from wearing ill-fitted shoes,. 160; times greater to develop foot problems. we only have 1 pair. Healthy Feet are Happy Feet! We use professional products.

mainelyforensics.blogspot.com mainelyforensics.blogspot.com

Mainely Forensics

Thursday, April 17, 2014. This final blog post will summarize my findings on my Capstone project on Hping3 forensics. Since my research portion was finished in the last blog post this post will focus on obscuring the data, catching the data using an intrusion detection system (IDS), and why this information is significant. Below is command typed to send a document (test) through to an IP address (216.93.147.70) at one byte at a time (-d 1). The first parameter was data =! 48 This would filter all packets...

mainelyforthebirds.com mainelyforthebirds.com

Mainely For The Birds

Mainely For The Birds. Coming Soon.Elvis Presley, US ARMY, Maine Lobsters and more! I am taking orders for Harley Davidson BIrd Houses.  PLease contact me at [email protected]. To place your order.  Takes about 2 weeks to make. PLEASE NOTE IF AN ITEM IS MARKED SOLD.PLEASE INQUIRE AS MOST ITEMS CAN BE DUPLICATED. If you do not have a PayPal account, please email me at. And put Bird House Order in Subject. FOR LOCAL PICK UP I WILL DISCOUNT $10.00 FROM THE PRICE FOR MY SHIPPING AND HANDLING FEES. John Deere...

mainelygaming.com mainelygaming.com

Home

We offer a wide variety of Video Game Consoles from Nintendo, Playstation and Xbox. A large selection of popular Video Games like Mario, The Legend of Zelda, Call of Duty, Battlefield and much more! Please feel free to contact Mainely Gaming with any questions via phone, email or facebook. Need another controller or want to upgrade your gaming experience? Find items dating back to the original Nintendo Entertainment System. Nintendo Wii / U. Nintendo DS / 3DS. Nintendo Gameboy / GBA.

mainelygardening.blogspot.com mainelygardening.blogspot.com

Mainely Gardening

Saturday, June 2, 2012. Writing Camp Begins June 4! Hope you stay tuned for a new season of gardening with Jacquie and friends. I've joined a Writer's Camp with Kate Messner; she has invited teachers and librarians from all around the world to join in on a summer of writing. My gardens have long been my muse. I look forward to sharing with so many others and am excited about what's ahead. Tuesday, July 27, 2010. Sunday, June 27, 2010. This climbing rose would struggle in my garden were it not for the pla...

mainelygarlic.com mainelygarlic.com

Mainely Garlic .COM

Mainely Garlic .COM. You cant got there from here) Ayuh. Keep checking. I got garlic. I planted over twenty varieties last fall. I can spare a pound or two! First come, first served and while supplies last. Thanks for stopping by. Try, louiethibault@yahoo.com. Ya never know. It depends. Powered by InstantPage® from GoDaddy.com. Want one?

mainelygatesandhandrails.com mainelygatesandhandrails.com

Exterior & Interior Wrought Iron Railings, Handrails, Gates, Fencing.

Accent your home or business with custom wrought iron railings. Serving New England and Beyond. Call us with your measurements. Wrought Iron Decor Hardware Brackets. Wrought Iron Wallmount Handrail Brackets. Wrought Iron Wood Holders. Wrought Iron Fire Bowls. Wrought Iron Wallmount Hooks. Custom Wrought Iron Garden Arbor Trellis. Curved Wrought Iron Railings. Custom Iron Wall mount Handrails. Commercial Anodized Aluminum Railings/Handrails. Residential Wrought Iron Railings/Handrails. Winslow, Maine 04901.