SlideShare a Scribd company logo
1 of 25
EC-Council, Malaysia
Instructor : Sina Manavi
19 August 2014
http://eccouncilacademy.org/home/exposing-hacking-
methodology-hackaway-workshop/
 Who am I?
 Are you ready to be hacked? (Demo)
 Hands on- Password Extraction
 Digital Forensics
 Dumping The Facebook
 Hands-on Scam, Fraud and Email Tracing
 Break time
 Facebook Forensics
 Skype Forensics
 Malware Analysis
Who am I
Sina Manavi is Master of Computer
Security and digital Forensics. He is
interested in digital Forensics ,E-
Discovery and First Response.
Contact : Manavi.Sina@Gmail.com
Homepage: sinamanavi.wordpress.com
 As an Digital Forensics Investigator, authorized access
to the user profile either by interview or digging the
system. But he is not allowed to hack the system  .
http://cybermap.kaspersky.com/
 http://youtu.be/F7pYHN9iC9I
http://blog.x1discovery.com/2013/12/10/social-media-case-law-update-november-2013/
 Get source of Email,
 Find out who, when, from where has sent the email to
you.
 Tor, Fake IP and no foot prints
 Crime
 Human Trafficking
 Scam, Fraud
 Inappropriate media sharing
 Malware distribution through social media
 Missing Person
 Infidelity
 Malware
 Scams, Fraud, Human Trafficking
 Child Pornography
 Illegal Media Sharing
 Activity Log, or searching using “Graph search”…etc. :
 My friends who like EC-Council Academy Malaysia
 Facebook Archive: includes the whole user activity in
FB.
 But takes time and two authentication step to download
it
 Profile Information, Location, Photos
 Locations and Geo-Locations
 Text and links,Checkins
 Friends/ Close Friends and families
 Apps
 Pages
 groups
 Interests
 Top Chat and free Video and voice call
application
 Skype users hit milestone 2 billion
minutes per day
 Chats
 Contacts
 IP
 Device Info
 Last Online
 Transfer Data
 Call logs
 Etc
 Volatile memory
 Non-Volatile Memory
EC-Council Hackway Workshop Presentation- Social Media Forensics

More Related Content

What's hot

S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
azman21
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 Viruses
Catherine MacAllister
 
Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus Trojan
Megan Bell
 

What's hot (20)

Hacking
HackingHacking
Hacking
 
What is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenWhat is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolen
 
Brute force attack
Brute force attackBrute force attack
Brute force attack
 
Brute force
Brute forceBrute force
Brute force
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Online safety and malwares
Online safety and malwaresOnline safety and malwares
Online safety and malwares
 
Browser security
Browser securityBrowser security
Browser security
 
Footprinting
FootprintingFootprinting
Footprinting
 
Evolution Of Web Security
Evolution Of Web SecurityEvolution Of Web Security
Evolution Of Web Security
 
Unit6
Unit6Unit6
Unit6
 
Cyber hacking dev days by aes team
Cyber hacking dev days by aes teamCyber hacking dev days by aes team
Cyber hacking dev days by aes team
 
What is hacking
What is hackingWhat is hacking
What is hacking
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
ID cuffs: Hackers targeting international travelers
ID cuffs: Hackers targeting international travelersID cuffs: Hackers targeting international travelers
ID cuffs: Hackers targeting international travelers
 
Internet
InternetInternet
Internet
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 Viruses
 
Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus Trojan
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based Security
 

Viewers also liked

ESD Company Profile - 17-2-2016 Rev2
ESD Company Profile - 17-2-2016 Rev2ESD Company Profile - 17-2-2016 Rev2
ESD Company Profile - 17-2-2016 Rev2
T. MADIBA
 

Viewers also liked (20)

2011 Social Media Malware Trends
2011 Social Media Malware Trends2011 Social Media Malware Trends
2011 Social Media Malware Trends
 
Email05 test slides
Email05   test slidesEmail05   test slides
Email05 test slides
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
 
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
 
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
 
Reverse engineering Emails on Next Level
Reverse engineering Emails on Next LevelReverse engineering Emails on Next Level
Reverse engineering Emails on Next Level
 
Facebook: SUGGEST YOUR FRIENDS TO THEMSELVES
Facebook: SUGGEST YOUR FRIENDS TO THEMSELVESFacebook: SUGGEST YOUR FRIENDS TO THEMSELVES
Facebook: SUGGEST YOUR FRIENDS TO THEMSELVES
 
Vulnerabilities on mobile Dating Applications
Vulnerabilities on mobile Dating ApplicationsVulnerabilities on mobile Dating Applications
Vulnerabilities on mobile Dating Applications
 
Logical attacks
Logical attacksLogical attacks
Logical attacks
 
Offensive malware usage and defense
Offensive malware usage and defenseOffensive malware usage and defense
Offensive malware usage and defense
 
Ftk 1.80 manual
Ftk 1.80 manualFtk 1.80 manual
Ftk 1.80 manual
 
Tracing an email by Amin Pathan
Tracing an email by Amin PathanTracing an email by Amin Pathan
Tracing an email by Amin Pathan
 
Ftk ug
Ftk ugFtk ug
Ftk ug
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensics
 
ESD Company Profile - 17-2-2016 Rev2
ESD Company Profile - 17-2-2016 Rev2ESD Company Profile - 17-2-2016 Rev2
ESD Company Profile - 17-2-2016 Rev2
 
CiviCRM User Group-Intro to CiviCRM
CiviCRM User Group-Intro to CiviCRMCiviCRM User Group-Intro to CiviCRM
CiviCRM User Group-Intro to CiviCRM
 
M2 programacion grafica_2ed
M2 programacion grafica_2edM2 programacion grafica_2ed
M2 programacion grafica_2ed
 
Fed exsocialmediastudy findingsreport_final
Fed exsocialmediastudy findingsreport_finalFed exsocialmediastudy findingsreport_final
Fed exsocialmediastudy findingsreport_final
 
Carmen grimaldi herrera. concepto; competencia
Carmen grimaldi herrera. concepto; competenciaCarmen grimaldi herrera. concepto; competencia
Carmen grimaldi herrera. concepto; competencia
 
Science Update - No 260 - June 2015
Science Update - No 260 - June 2015Science Update - No 260 - June 2015
Science Update - No 260 - June 2015
 

Similar to EC-Council Hackway Workshop Presentation- Social Media Forensics

Phishing & spamming
Phishing & spammingPhishing & spamming
Phishing & spamming
Kavis Pandey
 

Similar to EC-Council Hackway Workshop Presentation- Social Media Forensics (20)

pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrpypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
 
safeguard children from cyber bullying.pdf
safeguard children from cyber bullying.pdfsafeguard children from cyber bullying.pdf
safeguard children from cyber bullying.pdf
 
Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...
Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...
Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...
 
Blogging today
Blogging todayBlogging today
Blogging today
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
What is Social Engineering
What is Social EngineeringWhat is Social Engineering
What is Social Engineering
 
Privacy and social media
Privacy and social mediaPrivacy and social media
Privacy and social media
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Phishing & spamming
Phishing & spammingPhishing & spamming
Phishing & spamming
 
Seminar
SeminarSeminar
Seminar
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scams
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scams
 
Unit 2
Unit 2Unit 2
Unit 2
 
Unit 2
Unit 2Unit 2
Unit 2
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
36.44.final
36.44.final36.44.final
36.44.final
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 

More from Sina Manavi

A Brief Introduction in SQL Injection
A Brief Introduction in SQL InjectionA Brief Introduction in SQL Injection
A Brief Introduction in SQL Injection
Sina Manavi
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard)
Sina Manavi
 
Honeypot honeynet
Honeypot honeynetHoneypot honeynet
Honeypot honeynet
Sina Manavi
 

More from Sina Manavi (8)

Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting
 
Password Cracking
Password Cracking Password Cracking
Password Cracking
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
A Brief Introduction in SQL Injection
A Brief Introduction in SQL InjectionA Brief Introduction in SQL Injection
A Brief Introduction in SQL Injection
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard)
 
Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher
 
Honeypot honeynet
Honeypot honeynetHoneypot honeynet
Honeypot honeynet
 
Mendeley resentation , Sina Manavi
Mendeley resentation  , Sina Manavi Mendeley resentation  , Sina Manavi
Mendeley resentation , Sina Manavi
 

Recently uploaded

Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
David Celestin
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Hung Le
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
ZurliaSoop
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
amilabibi1
 

Recently uploaded (17)

Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait Cityin kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
 
Zone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptxZone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptx
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 

EC-Council Hackway Workshop Presentation- Social Media Forensics

  • 1. EC-Council, Malaysia Instructor : Sina Manavi 19 August 2014 http://eccouncilacademy.org/home/exposing-hacking- methodology-hackaway-workshop/
  • 2.  Who am I?  Are you ready to be hacked? (Demo)  Hands on- Password Extraction  Digital Forensics  Dumping The Facebook  Hands-on Scam, Fraud and Email Tracing  Break time  Facebook Forensics  Skype Forensics  Malware Analysis
  • 3. Who am I Sina Manavi is Master of Computer Security and digital Forensics. He is interested in digital Forensics ,E- Discovery and First Response. Contact : Manavi.Sina@Gmail.com Homepage: sinamanavi.wordpress.com
  • 4.  As an Digital Forensics Investigator, authorized access to the user profile either by interview or digging the system. But he is not allowed to hack the system  .
  • 5.
  • 7.
  • 8.
  • 9.
  • 11.
  • 13.  Get source of Email,  Find out who, when, from where has sent the email to you.  Tor, Fake IP and no foot prints
  • 14.
  • 15.  Crime  Human Trafficking  Scam, Fraud  Inappropriate media sharing  Malware distribution through social media
  • 16.  Missing Person  Infidelity  Malware  Scams, Fraud, Human Trafficking  Child Pornography  Illegal Media Sharing
  • 17.
  • 18.  Activity Log, or searching using “Graph search”…etc. :  My friends who like EC-Council Academy Malaysia  Facebook Archive: includes the whole user activity in FB.  But takes time and two authentication step to download it
  • 19.  Profile Information, Location, Photos  Locations and Geo-Locations  Text and links,Checkins  Friends/ Close Friends and families  Apps  Pages  groups  Interests
  • 20.
  • 21.  Top Chat and free Video and voice call application  Skype users hit milestone 2 billion minutes per day
  • 22.  Chats  Contacts  IP  Device Info  Last Online  Transfer Data  Call logs  Etc
  • 23.
  • 24.  Volatile memory  Non-Volatile Memory

Editor's Notes

  1. Play the video
  2. Gmail Password Extraction
  3. https://www.virustotal.com/
  4. Windows 8: c:usersAdminAppDataRoamingSkype