SlideShare una empresa de Scribd logo
1 de 33
Descargar para leer sin conexión
The Technology World Always has the Sharpest Brains...
There are equally sharp minds, working against you…
Src : Securus First
F O R E N S I C S A S A S E R V I C E D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
EVERY CRIME LEAVES A TRAIL OF EVIDENCE
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
F O R E N S I C S A S A S E R V I C E D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
DISCLAIMER
Different organisations are subject to different laws and regulations. This resource is for educational and
research purposes only. Do not attempt to violate the law with anything contained here.
Neither the author of this material, nor anyone else affiliated in any way, is liable for your actions.
Some information from the internet and some of personal experience; doesn’t want to hurt anybody 
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
ONCE THE DOCUMENTS HAVE
BEEN POSTED ONLINE, THE
GENIE IS OUT OF THE BOTTLE
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
F O R E N S I C S A S A S E R V I C E
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
F O R E N S I C S A S A S E R V I C E
SOME CASE STUDIES
• STUXNET, APT (MALWARE) 2010
• SONY PICTURE (IP THEFT) 2014
• BANGLADESH BANK HACK, COSMOS BANK(BFSI SECTOR) 2016
• MIRAI DYN BOTNET (IOT) 2016
• MP VYAPAM, SUNANDA PUSHKAR, HRITHIK ROSHAN KANGANA, AARUSHI TALWAR, MOVIE LEAKED
PIRACY, HBO GOP, ATM BANKING, IRCTC DATA BREACH, WANNACRY, PETYA, BAD RABBIT…
• STILL IN JURIS
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
F O R E N S I C S A S A S E R V I C E
SO WHAT IS 4N6 ?
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
F O R E N S I C S A S A S E R V I C E
A
B
OR YOU MEAN
• VAPT Skills
• Almost Just Doing Data Recovery
• Working On Tools & Technology
• Malware Analysis
• Password Cracking
• Running Certain Script Programming
• Rooting / Jailbreak Mobile Phones
• Anything else?
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
F O R E N S I C S A S A S E R V I C E
Science for the examination and analysis of digital trace evidence.
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
F O R E N S I C S A S A S E R V I C E
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
F O R E N S I C S A S A S E R V I C E
STANDARDS + TOOLS + ? = FORENSICS
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
F O R E N S I C S A S A S E R V I C E
STANDARDS + TOOLS + INTELLIGENCE = FORENSICS
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
F O R E N S I C S A S A S E R V I C E
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
F O R E N S I C S A S A S E R V I C E
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
F O R E N S I C S A S A S E R V I C E
DIGITAL FORENSICS STANDARDS &
GUIDELINES
• NIST: National Institute of Standard Technology (CFTT, NSRL, CFReDS)
• ISO/IEC 27037: Guidelines for identification, collection, acquisition & preservation of digital evidence
• ISO/IEC 17025: General requirements for the competence of testing and calibration laboratories
• NIJ: National Institute of Justice (Several Standards, National Criminal Justice Reference Service)
• IOCE: International Organization on Computer Evidence
• ASCLD/LAB: American Society of Crime Laboratory Directors/Laboratory Accreditation Board
• ASTM: E2678 standard; Guide for Education & Training
• AES: Audio Engineering Society (Authentication of Analog tape)
• SWGDE & SWGIT: Scientific Working Group on Digital Evidence & Scientific Working Group on Imaging Technology
• ACPO: Association of Chief Police Officers
• DSCI Manual India (Not specific standards but Manual)
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
F O R E N S I C S A S A S E R V I C E
Section 79 A of IT act : Central Government to
notify Examiner of Electronic Evidence
• The Central Government may for the purposes of providing expert opinion on electronic form evidence
before any court or other authority specify by notification in the Official Gazette any Department body or
agency of the Central Government or a State Government as an Examiner of Electronic Evidence.
• The Lab has to follow competence of testing and calibration laboratories as per ISO/ IEC 17025:2005 and
best practices as stated in ISO/IEC 27037:2012, guidelines for identification collection acquisition and
preservation of digital evidence
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
F O R E N S I C S A S A S E R V I C E
1. CFL, Army Cyber Group, DGMO, Signals
2. SFSL-DFS, Madiwala-Bangalore
3. CFSL, Hyderabad
4. DFS, Gandhinagar, Gujarat
5. CF-Data Mining Lab, SFIO-MCA, Delhi
6. FSL, Rohini, Delhi
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
CHAIN OF CUSTODY
Lack of integrity in the process of custody and, absence of appropriate documentation in this regard, will not only be detrimental to the cyber crime investigation, during trial but also, expose the IOs to criminal
liability under Section 72 of the ITAA2008
F O R E N S I C S A S A S E R V I C E
SOME BEST TOOLS
Commercial/Proprietary
• Mobile Forensics : UFED, Oxygen, Santoku
• Composite: EnCase, FTK, NUIX, Belkasoft, CyberCheck, Magnet Axiom, OSForensics
• Writeblocker/Imager : Tableau, Ad Triage, FTK Imager, Encase Imager, DD
Opensource/GPL
• Volatility, Nirsoft, GRR, DFF, Autopsy TSK, Regripper, Caine Distro, Wireshark, JTR, Xplico, Networkminer,
Splunk, Arsenal image mounter, HashMyFiles, SysInternal, Mimikatz, Metasploit, Redline, MobSF, Github
(Tools), OS (DEFT, SIFT, KALI, CAINE)
For more list : https://d3pakblog.wordpress.com/2016/12/27/computer-forensic-tools/
Career: https://d3pakblog.wordpress.com/2017/07/16/forensics-as-career/
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
F O R E N S I C S A S A S E R V I C E
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
CAREER
F O R E N S I C S A S A S E R V I C E
So What Required
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
F O R E N S I C S A S A S E R V I C E
Where to Start
Which degree is Important
Is Programming required
Which Certification
What job Profile
?
What to Study
But I am L33T
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
F O R E N S I C S A S A S E R V I C E
STEPS TO FOLLOW
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
4. Web Application /Network (VAPT)
3. Networking Skills
7. Cyber Crime/Cyber Law
9. Certifications – Add Value
F O R E N S I C S A S A S E R V I C E
5. Foreniscs (CHFI,SANS,Tools Whitepapers/Webinars)
6. Basic Idea of Risk/Compliance/Audit/ Standards
1. DEGREE
2. Mentor + Dedication
8. Hands-On Practices/ Case Studies
10. LinkedIn/ Dream Job
GOOD THINGS OF TECHNOLOGY
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
DEEP-WEB / REDDITLEAD (SOCIAL NETWORKING) MOBILE IOT
IOT / Sync
COOKIES INTELLIGENCE
F O R E N S I C S A S A S E R V I C E
GOOD THINGS OF TECHNOLOGY (Cont.)
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
CTI COMMUNITIES OPEN-SOURCE INTELLIGENCE / GIT
GOOGLE
F O R E N S I C S A S A S E R V I C E
And The best : Social Engineering
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
USE CASE
F O R E N S I C S A S A S E R V I C E
USE CASE : IP Theft
o Employee Resigned
o Joined New Company
o Data theft
o Type of data (pdf, xlsx)
o Browser history cleared
o No data in Recycle bin
o Formatted USB
 Forensics Imaging (Physical If required)
 Timeline
 Machine (Laptop/Desktop) : User info (SID)
 Data Recovery (Specific data formats)
 Mail Check (pst,ost, lotus etc)
 SIEM/DLP logs (Data copied)
 Firewall (3rd party URL data uploaded)
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
Q U E S T I O N AN S W E R
F O R E N S I C S A S A S E R V I C E
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
Cyber Kill Chain
MITRE ATT&CK MATRIX
Recon Weaponise Delivery Exploitation Installation C2
Actions &
Objectives
 Task: Identify the Attackers’ Step by Step Process
 Goal: Disrupting Attackers’ operations
 Motivation
 Preparation
 SE
 OSINT
 Configuration
 Packaging
 Powershell
 Add
 Mechanism
of Delivery
 Infection
Vector
 Phishing
 Technical or
human?
 Applications
affected
 Method &
Characteristics
 Persistence
 Characteristic
s of change
 Self0signed
Driver
 Communication
between victim
& adversary
 VPN
 What the adversary
does when they
have control of the
system
 Data Exfil
 APT
MITRE ATT&CK:
 Active Scanning
 Passive Scanning
 Determine Domain
& IP Address Space
 Analyze Third-Party
IT Footprint
MITRE ATT&CK:
 Malware
 Scripting
 Service
Execution
MITRE ATT&CK:
 Spearphishing
Attachment/Link
 Exploit Public-
Facing
Application
 Supply Chain
Compromise
MITRE ATT&CK:
 Local Job
Scheduling
 Scripting
 Rundll32
MITRE ATT&CK:
 Application
Shimming
 Hooking
 Login Items
MITRE ATT&CK:
 Data
Obfuscation
 Domain
Fronting
 Web Service
MITRE ATT&CK:
 Email Collection
 Data from Local
System/Network
Share
 Surveillance
F O R E N S I C S A S A S E R V I C E
FORENSIC CHALLENGES
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
F O R E N S I C S A S A S E R V I C E
Don’t believe marketing hype
"oh, we spent $$$ in $Vendor product, so we are safe"
Any "tool", regardless of the price, is still a "tool"
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
F O R E N S I C S A S A S E R V I C E
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
DEMOGRAPHIC
F O R E N S I C S A S A S E R V I C E
IMAGE FORENSICS
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
F O R E N S I C S A S A S E R V I C E
D3pak@Protonmail.com
Resources :
D3pakblog.wordpress.com
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
Thank You
F O R E N S I C S A S A S E R V I C E

Más contenido relacionado

La actualidad más candente

Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
newbie2019
 

La actualidad más candente (20)

Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Data Loss Threats and Mitigations
Data Loss Threats and MitigationsData Loss Threats and Mitigations
Data Loss Threats and Mitigations
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital Forensics
 
Incident response process
Incident response processIncident response process
Incident response process
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
Introduction to e-Discovery
Introduction to e-Discovery Introduction to e-Discovery
Introduction to e-Discovery
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Internet of Things Forensics
Internet of Things ForensicsInternet of Things Forensics
Internet of Things Forensics
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
 
Network forensic
Network forensicNetwork forensic
Network forensic
 
Operational Security
Operational SecurityOperational Security
Operational Security
 

Similar a Cyber Forensics

Luiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitchLuiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitch
Yury Chemerkin
 
Harness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleHarness the Power of Big Data with Oracle
Harness the Power of Big Data with Oracle
Sai Janakiram Penumuru
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
IBM Security
 

Similar a Cyber Forensics (20)

Cyber Threat Intel : Overview
Cyber Threat Intel : OverviewCyber Threat Intel : Overview
Cyber Threat Intel : Overview
 
Dark Web Forensics
Dark Web Forensics Dark Web Forensics
Dark Web Forensics
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
Luiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitchLuiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitch
 
Splunk App for Stream - Einblicke in Ihren Netzwerkverkehr
Splunk App for Stream - Einblicke in Ihren NetzwerkverkehrSplunk App for Stream - Einblicke in Ihren Netzwerkverkehr
Splunk App for Stream - Einblicke in Ihren Netzwerkverkehr
 
Harness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleHarness the Power of Big Data with Oracle
Harness the Power of Big Data with Oracle
 
Securitarian
SecuritarianSecuritarian
Securitarian
 
SplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary sessionSplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary session
 
Gov & Education Day 2015 - User Behavior Analytics
Gov & Education Day 2015 - User Behavior AnalyticsGov & Education Day 2015 - User Behavior Analytics
Gov & Education Day 2015 - User Behavior Analytics
 
Data in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonData in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathon
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
 
Encryption in industrial control systems; Is the juice worth the squeeze?
Encryption in industrial control systems; Is the juice worth the squeeze?Encryption in industrial control systems; Is the juice worth the squeeze?
Encryption in industrial control systems; Is the juice worth the squeeze?
 
Digital tech trends
Digital tech trendsDigital tech trends
Digital tech trends
 
2004 05 intelligence processing seminar
2004 05 intelligence processing seminar2004 05 intelligence processing seminar
2004 05 intelligence processing seminar
 
Big Data Re-Told
Big Data Re-ToldBig Data Re-Told
Big Data Re-Told
 
Recent developments in data analytics and big data
Recent developments in data analytics and big dataRecent developments in data analytics and big data
Recent developments in data analytics and big data
 
Cyber security course near me | Cyber security institute near me.pdf
Cyber security course near me | Cyber security institute near me.pdfCyber security course near me | Cyber security institute near me.pdf
Cyber security course near me | Cyber security institute near me.pdf
 
Cyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdfCyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdf
 
cyber forensic courses in kerala,kochi..
cyber forensic courses in kerala,kochi..cyber forensic courses in kerala,kochi..
cyber forensic courses in kerala,kochi..
 
Cyber security course in kerala | C|HFI | Blitz Academy
Cyber security course in kerala | C|HFI | Blitz AcademyCyber security course in kerala | C|HFI | Blitz Academy
Cyber security course in kerala | C|HFI | Blitz Academy
 

Más de Deepak Kumar (D3)

Más de Deepak Kumar (D3) (20)

Cyber of things 2.0
Cyber of things 2.0Cyber of things 2.0
Cyber of things 2.0
 
THINK
THINKTHINK
THINK
 
Cyber Security Tips
Cyber Security TipsCyber Security Tips
Cyber Security Tips
 
CISSP INFORGRAPH MINDMAP
CISSP INFORGRAPH MINDMAPCISSP INFORGRAPH MINDMAP
CISSP INFORGRAPH MINDMAP
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber Crime
 
21st Century Cyber Forensics
21st Century Cyber Forensics21st Century Cyber Forensics
21st Century Cyber Forensics
 
Phishing
PhishingPhishing
Phishing
 
IoT
IoTIoT
IoT
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Ransomware
Ransomware Ransomware
Ransomware
 
Success Mantra
Success MantraSuccess Mantra
Success Mantra
 
Facebook Security Tips
Facebook Security TipsFacebook Security Tips
Facebook Security Tips
 
DDOS
DDOS DDOS
DDOS
 
Registry Registrar Registrant
Registry Registrar RegistrantRegistry Registrar Registrant
Registry Registrar Registrant
 
Whatsapp
WhatsappWhatsapp
Whatsapp
 
How to social/official network
How to social/official networkHow to social/official network
How to social/official network
 
Sexting
SextingSexting
Sexting
 
Phishing Scam
Phishing ScamPhishing Scam
Phishing Scam
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Último (20)

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 

Cyber Forensics

  • 1. The Technology World Always has the Sharpest Brains... There are equally sharp minds, working against you… Src : Securus First F O R E N S I C S A S A S E R V I C E D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE
  • 2. EVERY CRIME LEAVES A TRAIL OF EVIDENCE D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE
  • 3. F O R E N S I C S A S A S E R V I C E D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE
  • 4. DISCLAIMER Different organisations are subject to different laws and regulations. This resource is for educational and research purposes only. Do not attempt to violate the law with anything contained here. Neither the author of this material, nor anyone else affiliated in any way, is liable for your actions. Some information from the internet and some of personal experience; doesn’t want to hurt anybody  D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE
  • 5. ONCE THE DOCUMENTS HAVE BEEN POSTED ONLINE, THE GENIE IS OUT OF THE BOTTLE D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE F O R E N S I C S A S A S E R V I C E
  • 6. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE F O R E N S I C S A S A S E R V I C E
  • 7. SOME CASE STUDIES • STUXNET, APT (MALWARE) 2010 • SONY PICTURE (IP THEFT) 2014 • BANGLADESH BANK HACK, COSMOS BANK(BFSI SECTOR) 2016 • MIRAI DYN BOTNET (IOT) 2016 • MP VYAPAM, SUNANDA PUSHKAR, HRITHIK ROSHAN KANGANA, AARUSHI TALWAR, MOVIE LEAKED PIRACY, HBO GOP, ATM BANKING, IRCTC DATA BREACH, WANNACRY, PETYA, BAD RABBIT… • STILL IN JURIS D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE F O R E N S I C S A S A S E R V I C E
  • 8. SO WHAT IS 4N6 ? D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE F O R E N S I C S A S A S E R V I C E A B
  • 9. OR YOU MEAN • VAPT Skills • Almost Just Doing Data Recovery • Working On Tools & Technology • Malware Analysis • Password Cracking • Running Certain Script Programming • Rooting / Jailbreak Mobile Phones • Anything else? D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE F O R E N S I C S A S A S E R V I C E
  • 10. Science for the examination and analysis of digital trace evidence. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE F O R E N S I C S A S A S E R V I C E
  • 11. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE F O R E N S I C S A S A S E R V I C E
  • 12. STANDARDS + TOOLS + ? = FORENSICS D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE F O R E N S I C S A S A S E R V I C E
  • 13. STANDARDS + TOOLS + INTELLIGENCE = FORENSICS D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE F O R E N S I C S A S A S E R V I C E
  • 14. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE F O R E N S I C S A S A S E R V I C E
  • 15. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE F O R E N S I C S A S A S E R V I C E
  • 16. DIGITAL FORENSICS STANDARDS & GUIDELINES • NIST: National Institute of Standard Technology (CFTT, NSRL, CFReDS) • ISO/IEC 27037: Guidelines for identification, collection, acquisition & preservation of digital evidence • ISO/IEC 17025: General requirements for the competence of testing and calibration laboratories • NIJ: National Institute of Justice (Several Standards, National Criminal Justice Reference Service) • IOCE: International Organization on Computer Evidence • ASCLD/LAB: American Society of Crime Laboratory Directors/Laboratory Accreditation Board • ASTM: E2678 standard; Guide for Education & Training • AES: Audio Engineering Society (Authentication of Analog tape) • SWGDE & SWGIT: Scientific Working Group on Digital Evidence & Scientific Working Group on Imaging Technology • ACPO: Association of Chief Police Officers • DSCI Manual India (Not specific standards but Manual) D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE F O R E N S I C S A S A S E R V I C E
  • 17. Section 79 A of IT act : Central Government to notify Examiner of Electronic Evidence • The Central Government may for the purposes of providing expert opinion on electronic form evidence before any court or other authority specify by notification in the Official Gazette any Department body or agency of the Central Government or a State Government as an Examiner of Electronic Evidence. • The Lab has to follow competence of testing and calibration laboratories as per ISO/ IEC 17025:2005 and best practices as stated in ISO/IEC 27037:2012, guidelines for identification collection acquisition and preservation of digital evidence D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE F O R E N S I C S A S A S E R V I C E 1. CFL, Army Cyber Group, DGMO, Signals 2. SFSL-DFS, Madiwala-Bangalore 3. CFSL, Hyderabad 4. DFS, Gandhinagar, Gujarat 5. CF-Data Mining Lab, SFIO-MCA, Delhi 6. FSL, Rohini, Delhi
  • 18. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE CHAIN OF CUSTODY Lack of integrity in the process of custody and, absence of appropriate documentation in this regard, will not only be detrimental to the cyber crime investigation, during trial but also, expose the IOs to criminal liability under Section 72 of the ITAA2008 F O R E N S I C S A S A S E R V I C E
  • 19. SOME BEST TOOLS Commercial/Proprietary • Mobile Forensics : UFED, Oxygen, Santoku • Composite: EnCase, FTK, NUIX, Belkasoft, CyberCheck, Magnet Axiom, OSForensics • Writeblocker/Imager : Tableau, Ad Triage, FTK Imager, Encase Imager, DD Opensource/GPL • Volatility, Nirsoft, GRR, DFF, Autopsy TSK, Regripper, Caine Distro, Wireshark, JTR, Xplico, Networkminer, Splunk, Arsenal image mounter, HashMyFiles, SysInternal, Mimikatz, Metasploit, Redline, MobSF, Github (Tools), OS (DEFT, SIFT, KALI, CAINE) For more list : https://d3pakblog.wordpress.com/2016/12/27/computer-forensic-tools/ Career: https://d3pakblog.wordpress.com/2017/07/16/forensics-as-career/ D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE F O R E N S I C S A S A S E R V I C E
  • 20. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE CAREER F O R E N S I C S A S A S E R V I C E
  • 21. So What Required D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE F O R E N S I C S A S A S E R V I C E Where to Start Which degree is Important Is Programming required Which Certification What job Profile ? What to Study But I am L33T
  • 22. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE F O R E N S I C S A S A S E R V I C E
  • 23. STEPS TO FOLLOW D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE 4. Web Application /Network (VAPT) 3. Networking Skills 7. Cyber Crime/Cyber Law 9. Certifications – Add Value F O R E N S I C S A S A S E R V I C E 5. Foreniscs (CHFI,SANS,Tools Whitepapers/Webinars) 6. Basic Idea of Risk/Compliance/Audit/ Standards 1. DEGREE 2. Mentor + Dedication 8. Hands-On Practices/ Case Studies 10. LinkedIn/ Dream Job
  • 24. GOOD THINGS OF TECHNOLOGY D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE DEEP-WEB / REDDITLEAD (SOCIAL NETWORKING) MOBILE IOT IOT / Sync COOKIES INTELLIGENCE F O R E N S I C S A S A S E R V I C E
  • 25. GOOD THINGS OF TECHNOLOGY (Cont.) D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE CTI COMMUNITIES OPEN-SOURCE INTELLIGENCE / GIT GOOGLE F O R E N S I C S A S A S E R V I C E And The best : Social Engineering
  • 26. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE USE CASE F O R E N S I C S A S A S E R V I C E
  • 27. USE CASE : IP Theft o Employee Resigned o Joined New Company o Data theft o Type of data (pdf, xlsx) o Browser history cleared o No data in Recycle bin o Formatted USB  Forensics Imaging (Physical If required)  Timeline  Machine (Laptop/Desktop) : User info (SID)  Data Recovery (Specific data formats)  Mail Check (pst,ost, lotus etc)  SIEM/DLP logs (Data copied)  Firewall (3rd party URL data uploaded) D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE Q U E S T I O N AN S W E R F O R E N S I C S A S A S E R V I C E
  • 28. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE Cyber Kill Chain MITRE ATT&CK MATRIX Recon Weaponise Delivery Exploitation Installation C2 Actions & Objectives  Task: Identify the Attackers’ Step by Step Process  Goal: Disrupting Attackers’ operations  Motivation  Preparation  SE  OSINT  Configuration  Packaging  Powershell  Add  Mechanism of Delivery  Infection Vector  Phishing  Technical or human?  Applications affected  Method & Characteristics  Persistence  Characteristic s of change  Self0signed Driver  Communication between victim & adversary  VPN  What the adversary does when they have control of the system  Data Exfil  APT MITRE ATT&CK:  Active Scanning  Passive Scanning  Determine Domain & IP Address Space  Analyze Third-Party IT Footprint MITRE ATT&CK:  Malware  Scripting  Service Execution MITRE ATT&CK:  Spearphishing Attachment/Link  Exploit Public- Facing Application  Supply Chain Compromise MITRE ATT&CK:  Local Job Scheduling  Scripting  Rundll32 MITRE ATT&CK:  Application Shimming  Hooking  Login Items MITRE ATT&CK:  Data Obfuscation  Domain Fronting  Web Service MITRE ATT&CK:  Email Collection  Data from Local System/Network Share  Surveillance F O R E N S I C S A S A S E R V I C E
  • 29. FORENSIC CHALLENGES D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE F O R E N S I C S A S A S E R V I C E
  • 30. Don’t believe marketing hype "oh, we spent $$$ in $Vendor product, so we are safe" Any "tool", regardless of the price, is still a "tool" D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE F O R E N S I C S A S A S E R V I C E
  • 31. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE DEMOGRAPHIC F O R E N S I C S A S A S E R V I C E
  • 32. IMAGE FORENSICS D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE F O R E N S I C S A S A S E R V I C E
  • 33. D3pak@Protonmail.com Resources : D3pakblog.wordpress.com D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE Thank You F O R E N S I C S A S A S E R V I C E