Computer Crime Inve...
 
Notifications
Clear all

Computer Crime Investigation Framework (CCIF)

5 Posts
2 Users
0 Likes
267 Views
tebodell
(@tebodell)
Posts: 25
Eminent Member
Topic starter
 

Has anyone seen anything come out of here:

http://www.oissg.org/content/view/72/72/

Does anyone know of anything similiar? The OSSTMM and ISSAF frameworks turned out great, I think this project would be a benefit to new examiners or even for experienced ones just to have a formalized checklist covering all the bases.

Cheers,
Ty

 
Posted : 04/04/2005 9:59 pm
 Andy
(@andy)
Posts: 357
Reputable Member
 

The link doesn't work

Andy

 
Posted : 05/04/2005 9:38 am
tebodell
(@tebodell)
Posts: 25
Eminent Member
Topic starter
 

Wow bummer you're right. Worked this afternoon when I posted it. Here's google's cache http://66.102.7.104/search?q=cache:_FUyRtTAfrIJ:www.oissg.org/content/view/72/72/+ccif+issaf&hl=en&start=1&client=firefox-a but yeah I can't resolve it from anywhere when I try it right now. Sorry all, maybe check it later cause I'd really like to know if people are using it or have looked at it.

Thanks,
Ty

 
Posted : 05/04/2005 10:28 am
tebodell
(@tebodell)
Posts: 25
Eminent Member
Topic starter
 

Just got notice the site is back up, so you can hit up http://www.oissg.org/content/view/72/72/ and let me know if you know of anyone using it or stuff like that. Just curious to see it's exposure or mainly if there is anything else like it either state entity or private sector side. I know there's guidelines and stuff like that but I'm looking for more of the framework outline type document.
Thanks for your time,
Ty

 
Posted : 09/04/2005 10:35 pm
 Andy
(@andy)
Posts: 357
Reputable Member
 

Yeah, the sites back up now, it looks interesting. There checklist is quite comprehensive and concentrates on INFOSEC more than FC, (I’m personally not its target audience), it's not that relevant to my post mortem work. However, I am interested in system logs (one aspect covered in detail). I would like to know more about how a single home Windows XP user may be vulnerable to hacking, and how & where to find evidence of this post mortem on the local compromised machine.

Andy

 
Posted : 10/04/2005 9:07 am
Share: