Computer Crime Inve...
 
Notifications
Clear all

Computer Crime Investigation Framework (CCIF)

5 Posts
2 Users
0 Reactions
600 Views
tebodell
(@tebodell)
Eminent Member
Joined: 20 years ago
Posts: 25
Topic starter  

Has anyone seen anything come out of here:

http://www.oissg.org/content/view/72/72/

Does anyone know of anything similiar? The OSSTMM and ISSAF frameworks turned out great, I think this project would be a benefit to new examiners or even for experienced ones just to have a formalized checklist covering all the bases.

Cheers,
Ty


   
Quote
 Andy
(@andy)
Reputable Member
Joined: 21 years ago
Posts: 357
 

The link doesn't work

Andy


   
ReplyQuote
tebodell
(@tebodell)
Eminent Member
Joined: 20 years ago
Posts: 25
Topic starter  

Wow bummer you're right. Worked this afternoon when I posted it. Here's google's cache http://66.102.7.104/search?q=cache:_FUyRtTAfrIJ:www.oissg.org/content/view/72/72/+ccif+issaf&hl=en&start=1&client=firefox-a but yeah I can't resolve it from anywhere when I try it right now. Sorry all, maybe check it later cause I'd really like to know if people are using it or have looked at it.

Thanks,
Ty


   
ReplyQuote
tebodell
(@tebodell)
Eminent Member
Joined: 20 years ago
Posts: 25
Topic starter  

Just got notice the site is back up, so you can hit up http://www.oissg.org/content/view/72/72/ and let me know if you know of anyone using it or stuff like that. Just curious to see it's exposure or mainly if there is anything else like it either state entity or private sector side. I know there's guidelines and stuff like that but I'm looking for more of the framework outline type document.
Thanks for your time,
Ty


   
ReplyQuote
 Andy
(@andy)
Reputable Member
Joined: 21 years ago
Posts: 357
 

Yeah, the sites back up now, it looks interesting. There checklist is quite comprehensive and concentrates on INFOSEC more than FC, (I’m personally not its target audience), it's not that relevant to my post mortem work. However, I am interested in system logs (one aspect covered in detail). I would like to know more about how a single home Windows XP user may be vulnerable to hacking, and how & where to find evidence of this post mortem on the local compromised machine.

Andy


   
ReplyQuote
Share: