As authors, instructors, and researchers, we enjoy writing and speaking. Here you will find a collection of whitepapers and presentation slides. We will be adding more during the next few months; check back often for updates.
LMG researchers have created the world’s first proof-of-concept cellular intrusion detection system (CIDS), which will enable enterprise security professionals to detect hacked smartphones cheaply and effectively, even in BYOD environments.Whitepaper: "Do-It-Yourself Cellular IDS"
Welcome readers! Here you’ll find the evidence files for each case study in the book Network Forensics: Tracking Hackers Through Cyberspace (Prentice Hall, 2012). You can download them and follow along with the book to gain hands-on experience.
Please note that these materials are copyrighted. We are offering them publicly for the community to enjoy for your personal use. You can read the full license here; below is a quick summary:
Play with real packet captures and learn about network forensics! From time to time, LMG releases forensics puzzles on the Network Forensics Puzzle Contest site. Follow the exploits of Ann Dercover, Dr. Clearwater and their hacker friends. Analyze packet captures that contain VOIP, SMTP, Apple TV, the Operation Aurora exploit, Android traffic, and more.
Going to DEF CON? Join us for our annual DEF CON Network Forensics Puzzle Contest!
LMG Security: Learn from the Best