Poster Session

Loading...

Media is loading
 

Faculty Mentor(s)

Ahmad Ghafarian

Campus

Dahlonega

Proposal Type

Poster

Subject Area

Computer Science

Start Date

17-4-2020 12:00 PM

End Date

17-4-2020 1:00 PM

Description/Abstract

Twitter is a global social media platform that sees a lot of use in people's daily lives. Social media platforms always have a variety of privacy settings but how private and secure are they truly? In order to retrieve evidence of Twitter web activities, the following questions will be answered from a computer forensics point of view: 1) What type of evidence can we retrieve? 2) Where is the evidence located on a suspect’s computer? 3) How can we retrieve traces of evidence from a suspect’s computer? Since this is a controlled environment research, the same browsing platform was constantly used, Mozilla Firefox. Virtual Machines (VMs) were created on newly imaged laptops that were used for this project. Afterwards, social media accounts were created on separate VMs with VMWare, pre-made scenarios were enacted and parts of the machine searched for any evidence of activity. After setting up the controlled environment and defining scenarios that will be carried out on social media, focus was put on examining the RAM of one of the social media users after the user had carried out the scenarios. Then, the memory image of a virtual machine (VM) was captured(MagnetRAMCapture) and analyzed with a forensic tool(Bulk Extractor Viewer). So far, the analysis has proven to be very successful. Through the inspection of the memory image, much was found such as the users' full name, email address, social media account name, social media password, and even the interaction between social media user 1 and social media user 2.

Media Format

flash

Share

COinS
 
Apr 17th, 12:00 PM Apr 17th, 1:00 PM

12. Assessing the Security and Privacy of Twitter

Twitter is a global social media platform that sees a lot of use in people's daily lives. Social media platforms always have a variety of privacy settings but how private and secure are they truly? In order to retrieve evidence of Twitter web activities, the following questions will be answered from a computer forensics point of view: 1) What type of evidence can we retrieve? 2) Where is the evidence located on a suspect’s computer? 3) How can we retrieve traces of evidence from a suspect’s computer? Since this is a controlled environment research, the same browsing platform was constantly used, Mozilla Firefox. Virtual Machines (VMs) were created on newly imaged laptops that were used for this project. Afterwards, social media accounts were created on separate VMs with VMWare, pre-made scenarios were enacted and parts of the machine searched for any evidence of activity. After setting up the controlled environment and defining scenarios that will be carried out on social media, focus was put on examining the RAM of one of the social media users after the user had carried out the scenarios. Then, the memory image of a virtual machine (VM) was captured(MagnetRAMCapture) and analyzed with a forensic tool(Bulk Extractor Viewer). So far, the analysis has proven to be very successful. Through the inspection of the memory image, much was found such as the users' full name, email address, social media account name, social media password, and even the interaction between social media user 1 and social media user 2.