Join Us!

Computer Crime Inve...
 
Notifications
Clear all

Computer Crime Investigation Framework (CCIF)  

  RSS
tebodell
(@tebodell)
Junior Member

Has anyone seen anything come out of here:

http://www.oissg.org/content/view/72/72/

Does anyone know of anything similiar? The OSSTMM and ISSAF frameworks turned out great, I think this project would be a benefit to new examiners or even for experienced ones just to have a formalized checklist covering all the bases.

Cheers,
Ty

Quote
Posted : 04/04/2005 10:59 pm
Andy
 Andy
(@andy)
Active Member

The link doesn't work

Andy

ReplyQuote
Posted : 05/04/2005 10:38 am
tebodell
(@tebodell)
Junior Member

Wow bummer you're right. Worked this afternoon when I posted it. Here's google's cache http://66.102.7.104/search?q=cache:_FUyRtTAfrIJ:www.oissg.org/content/view/72/72/+ccif+issaf&hl=en&start=1&client=firefox-a but yeah I can't resolve it from anywhere when I try it right now. Sorry all, maybe check it later cause I'd really like to know if people are using it or have looked at it.

Thanks,
Ty

ReplyQuote
Posted : 05/04/2005 11:28 am
tebodell
(@tebodell)
Junior Member

Just got notice the site is back up, so you can hit up http://www.oissg.org/content/view/72/72/ and let me know if you know of anyone using it or stuff like that. Just curious to see it's exposure or mainly if there is anything else like it either state entity or private sector side. I know there's guidelines and stuff like that but I'm looking for more of the framework outline type document.
Thanks for your time,
Ty

ReplyQuote
Posted : 09/04/2005 11:35 pm
Andy
 Andy
(@andy)
Active Member

Yeah, the sites back up now, it looks interesting. There checklist is quite comprehensive and concentrates on INFOSEC more than FC, (I’m personally not its target audience), it's not that relevant to my post mortem work. However, I am interested in system logs (one aspect covered in detail). I would like to know more about how a single home Windows XP user may be vulnerable to hacking, and how & where to find evidence of this post mortem on the local compromised machine.

Andy

ReplyQuote
Posted : 10/04/2005 10:07 am
Share: