


Code injection refers to force a code – which may be malicious - to run inside another benign code, by inserting it into known process name or process ID. This paper will discuss potential attack that exploits a certain vulnerability of BitTorrent based systems. Its clients are widely spread worldwide and account for a large fraction of today’s Internet traffic. The presented methodology can be applied to any BitTorrent protocol.īitTorrent is the most extensively used protocol in peer-to-peer systems. The comparison of the calculated hash with the list of publicly available hashes allows determination whether sharing of the file is legal or illegal. During the monitoring, it is possible to calculate the public lookup SHA1 hash of the shared file. The experiment was carried in two modes: 1) simulating of the use of the BitTorrent Sync application 2) monitoring of real traffic on the Internet. Therefore, we proposed the methodology that enables to capture the initiation step and to inform the forensics investigator, which then takes the reactive actions. The initiation of the activity is carried out in the plain text only. The BitTorrent Sync client application employs quite largely the encryption for sending data packages.

Nevertheless, it can be used for the activities that draw the attention of the forensics invetigators. The BitTorrent Sync client application is the most progressive development in the BitTorrent family. This paper proposes a methodology for the investigation of illegal file sharers using BitTorrent networks through the use of a P2P digital investigation process. As a result, it is difficult to apply previous investigation processes for investigation of conventional P2P networks to the investigation of suspected illegal file sharing using BitTorrent. This is because the role of the server in BitTorrent networks has been changed compared to servers in conventional P2P networks. Further, there is a lack of research on investigation techniques to reveal illegal BitTorrent sharers. However, it is difficult to gather enough probative evidence to prosecute illegal file sharers in criminal court and/or sued for damages in civil court. Regardless, the number of illegal file sharing using BitTorrent continues to grow and most of file sharers and downloader are unconcerned legal action to transfer copywrite-protected files. Sharing copyright protected content without the copyright holder’s permission is illegal in many countries.
