-
December 4th, 2008, 07:15 PM
#1
Limewire Forensics
Just found a great article (.PDF) on Limewire Forensics by Joseph Lethwaite and Victoria Smith:
http://www.dfrws.org/2008/proceeding...lewthwaite.pdf
It includes great info about fileurns.cache and limewire.props
Hope you find it useful...
Above ground, vertical, and exchanging gasses.
Now you see me | Now you don't
"Relax, Bender; It was just a dream. There's no such thing as two." ~ Fry
sometimes my computer goes down on me
-
December 7th, 2008, 01:32 AM
#2
That's cute... Windows XP strikes again. Noobies use Limewire and Bearshare. TOR networks are the coolest. You can write President Bush email with that network. huh? *checkmate*
-
December 7th, 2008, 03:00 PM
#3
I really don't see what this has to do with.......... it is about FORENSICS............. that's where an investigator is faced with a fait accompli not a choice. So, if Limewire or Bearshare is what youv'e got, that's what you run with.
As for Tor............. this is what they have to say about themselves:
Ipse Dixit?
-
December 14th, 2008, 07:57 PM
#4
Originally Posted by nihil
I really don't see what this has to do with.......... it is about FORENSICS............. that's where an investigator is faced with a fait accompli not a choice. So, if Limewire or Bearshare is what youv'e got, that's what you run with.
Forensics, eh? More like think like a theif. One can tell every bootleg or Commericial encrypted DVD inserted into a Linux Machine. Here's a free answer......look inside directory .dvdcss. Everything which was written using Intermediate Programming can be decoded and analyzed (ie, .net framework\ java...etc). Cops are script kiddies....programmers are serial killers in their little world.
I don't need a keyboard nazi to provide me with a definition.
-
December 15th, 2008, 05:14 PM
#5
and so it begins
Originally Posted by Linen0ise
Forensics, eh? More like think like a theif.
Did you read the article?
One can tell every bootleg or Commericial encrypted DVD inserted into a Linux Machine. Here's a free answer......look inside directory .dvdcss. Everything which was written using Intermediate Programming can be decoded and analyzed (ie, .net framework\ java...etc).
What does this statement have to do with anything? It's completely irrelevant.
Cops are script kiddies....
Been a while since I've been called that... However, I will admit that I'm a n00b, and will be for the rest of my life. There is no such thing as an expert, and anyone who tells you otherwise is selling something. BTW, only a skiddie would start a flame war over a forensics article.
programmers are serial killers in their little world.
My world is quite far-reaching, thank you.
I don't need a keyboard nazi to provide me with a definition.
I think if there's anyone on here who doesn't fit the definition of a nazi, it would be Nihil...
Please, do us a favor and just... don't post anymore. Whatever your "actual" situation may be, you are presenting yourself only as an idiot.
Above ground, vertical, and exchanging gasses.
Now you see me | Now you don't
"Relax, Bender; It was just a dream. There's no such thing as two." ~ Fry
sometimes my computer goes down on me
-
December 19th, 2008, 06:09 AM
#6
-
December 19th, 2008, 11:54 PM
#7
... So anyways, back on to the thread subject...
This is a pretty cool document. I took a couple computer forensics classes in college (Stuff like storing info in the unused parts of floppies and programs etc) and i thought they were awesome and wanted to get more into it but never found that outlet. Limewire forensics was definitely not covered in those classes though but it is a pretty interesting read.
Thanks!
Last edited by mungyun; December 20th, 2008 at 12:00 AM.
I believe in making the world safe for our children, but not our children’s children, because I don’t think children should be having sex. -- Jack Handey
-
December 21st, 2008, 07:11 AM
#8
Very true,
This is the Computer Forensics forum, so forensics discussions belong, and are welcome here?
We still have to accept that >90% of humanity uses Windows, so I would suggest that the article has current relevance on the grounds that this is the most likely operating system for a forensics investigator to encounter.
Last edited by nihil; December 21st, 2008 at 08:58 AM.
-
December 30th, 2008, 03:32 AM
#9
Well, I found it to be both informative and humerous...of course I'm also bored out of my mind.
Also, my hex > your binary.
Windows 9x: n. A collection of 32 bit extensions and a graphical shell for a 16 bit patch to an 8 bit operating system originally coded for a 4 bit microprocessor. Written by a 2 bit company that can\'t stand 1 bit of competition.
-
December 30th, 2008, 03:43 PM
#10
Hmmmmm,
Looks like some failed banana republic bank card to me.................. ah! I forgot........... we have those in New York and London these days?
Happy New Year
Similar Threads
-
By M3mph15 in forum Miscellaneous Security Discussions
Replies: 5
Last Post: March 23rd, 2005, 10:53 PM
-
By SDK in forum Miscellaneous Security Discussions
Replies: 0
Last Post: March 16th, 2005, 03:33 AM
-
By groovicus in forum Computer Forensics
Replies: 3
Last Post: February 25th, 2004, 08:36 PM
-
By cable in forum Miscellaneous Security Discussions
Replies: 6
Last Post: January 19th, 2004, 11:44 PM
-
By magnoon in forum The Security Tutorials Forum
Replies: 2
Last Post: December 23rd, 2002, 07:50 PM
Tags for this Thread
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|