Discuss IT and Design a variety of tutorials and design it. let's read that are useful to you. thank you for visiting my humble blog

Analysis metadata in accounting filtered PP

Before reading this article, I want to make clear that this is nothing more than an exercise in technical document review, and expert reports could take more information. It is true that with so many documents are leaked, it was impossible not to think of all the metadata to analyze them to see what can be captured in all their entirety but do not know if it was the same person who scanned them, all packed in a file. ZIP and leaked online. Let's do a little digital forensics, to see what happens.


Figura 1: Vídeo-Tutorial de Forensic FOCA

For this exercise will form part of the example of forensic metadata people assume that they are all different - until proven otherwise - and just make metadata analysis exercise to see what comes up. Of course, to make the data analysis task over 5GB Forensic FOCA is nothing better than that for this set.

Compressed files


The documents were posted on the file. ZIP compressed, which appeared thumbnail Thumbs.db file, which could mean that they have created with Windows XP or earlier. In the latter, accounting in 2011 emerged, however, between the complex folder structure, DS_Store., Mac OS X operating system is typical, so it seems they can do it from a computer box document. So we must assume that the person who packaged, or one with two different teams, or two different people.

Los file uncompressed

If the file is decompressed them, appearing more than 400 documents in PDF format. All ellos are scanned copies of the documents but te la ventaja originales which has in limpiados metadata, by which you can sign up mucha ellos extract information. To analizarlos Forensic FOCA with all extracted and crawl to Tools pull. It is a land hace break.

Appear compressed files with thumbnails files and PDF documents with metadata could make us think that the person who leaked the documents online or not is the same as scan and compressed - and therefore do not mind the info that there can be removed - or do not have a high technical profile, what you think about the leak from someone with access to the documents in place hacktivist attacks.

Path to the folder

If we look at the structure of folders displayed, curious to see units like m: ot:, which means you are using some sort of NAS network storage system to store all the documents when scanning. If there are people who speculate on the system, such as eating scanner / digital / multifunctional and generate PDF documents, but there are things that make a difference later.

The software used

This is highly relevant information, as well as common software such as Adobe Acrobat or Adobe Distiler, is a very specific version of software such as EFI Cyclone or Developer Express Inc.

The first one is extraordinary, such as professional print software that is used in high-end printers used in document CRDS. This list of equipment incorporating EFI library can be found on the manufacturer's website. Nitro PDF Professional is a software that is not too common, and version 6 is quite old.

Document creation date

After analyzing when a document is created and modified can be viewed as you create and modify PDF files. This is typical of documents created page to page, ie page 1 and digitize documents created, then scanned page 2, and change the PDF document before.

Creation date scanned documents began to be serialized from February 8, 2013 and so on, which seemed to be made aware of, because there are thousands of pages in all documents.

users

No users appear in nearly documents, but there are 4 of them in that way. In one of them emerged from the generic Administrator, but three other documents is the name of a user MAGomezc.

This name, which looks like Miguel Ángel Gómez C., Marco Antonio Garmendia Crespo or that style, appeared in three scanned documents in 2008, ie five years ago, but could indicate a particular person.

Of course, this just says that the metadata scan of the computer in 2008, in which users work with Adobe Acrobat 7.0 PDF maker is MAgomezc.

In the end, the researchers will in this case the software will have to marry someone with a personal computer or printer model shop / digitizer with the owner, and the names of those users, but it is because police work is still far from our goal for now .
Share:

No comments:

Post a Comment

Popular Posts

Ismail Maha Putra. Powered by Blogger.
twitterfacebookgoogle pluslinkedinrss feedemail
SEO Reports for kendariit.blogspot.com

Followers

Blog Archive

Poll

Facebook Page Like

Translate

Get ThisWidget
Blogger Widgets

submit your site

http://smallseotools.com/google-pagerank-checker

Sonicrun

Google Search

Popular Posts

Tutorials, IT and Design

Blog Archive

Recent Posts

About Metro