Notifications
Clear all
General (Technical, Procedural, Software, Hardware etc.)
3
Posts
2
Users
0
Reactions
825
Views
Topic starter
02/10/2012 3:03 pm
I'm currently studying Forensic Computing at UCLan (in my third year). I'm doing a requirement elicitation for my project and wondered if you could help?
My project is "hacking" into a honeypot and altering the log files to pretend I wasn't there.
Could anyone think how this would benefit a forensic investigator?
Thanks!
S
03/10/2012 10:01 am
First, unless one is authorized by an organization to do penetration testing for their network one was "hacking," it would be illegal and unethical.
The reason it would help a forensic investigator is that the types of modifications made during this process would teach the investigator what to look for.
Topic starter
06/10/2012 8:46 pm
Thank you for your response.
I intend to create the honeypot myself on a virtual network, so it will be ethical.
Thanks