Upload
sina-manavi
View
680
Download
2
Tags:
Embed Size (px)
DESCRIPTION
This Presentation involves with Social Media Forensics such as Email Tracing and investigation the Fraud, Scam... etc.. In the next section we covered the Twitter, Facebook, and Linkdin Forensics practically. After the video call and Instant Messaging tools, Skype is chosen because it is one of the top most popular chatting, voice/video calls (free and commercial plans). We demonstrated practically how to extract the chat conversation, contacts, call logs and much more information. Malware distribution is quite common is social media by social engineering techniques. We performed the analysis to how analysis and investigate the malware and social media investigation with malware distribution and social engineering perspective.
Citation preview
EC-Council, Malaysia
Instructor : Sina Manavi
19 August 2014
http://eccouncilacademy.org/home/exposing-hacking-methodology-hackaway-workshop/
Social Media Forensics
Who am I?Are you ready to be hacked? (Demo)Hands on- Password ExtractionDigital ForensicsDumping The FacebookHands-on Scam, Fraud and Email TracingBreak timeFacebook ForensicsSkype ForensicsMalware Analysis
Presentation Overview
Who am I Sina Manavi is Master of Computer Security and digital Forensics. He is interested in digital Forensics ,E-Discovery and First Response.Contact : [email protected]: sinamanavi.wordpress.com
As an Digital Forensics Investigator, authorized access to the user profile either by interview or digging the system. But he is not allowed to hack the system .
Lets begin the session with an hands on
You Have Been Hacked!
http://cybermap.kaspersky.com/
WOW! What should I do now Sir?
Forensics Science
Evidences and Court
Digital Forensics
Forensics Challenges
http://youtu.be/F7pYHN9iC9I
statisticbrain.com says:
http://blog.x1discovery.com/2013/12/10/social-media-case-law-update-november-2013/
Social Media published Law Case:
Get source of Email,Find out who, when, from where has sent the
email to you.
Tor, Fake IP and no foot prints
Hands-on:Email Forensics/Anti Forensics
CrimeHuman Trafficking Scam, FraudInappropriate media sharing Malware distribution through social media
Why Social Media Forensics
Missing PersonInfidelityMalwareScams, Fraud, Human TraffickingChild PornographyIllegal Media Sharing
Why Social Media Forensics ???
Wanna hear from Experts?
Activity Log, or searching using “Graph search”…etc. : My friends who like EC-Council Academy Malaysia
Facebook Archive: includes the whole user activity in FB.But takes time and two authentication step to
download it
Facebook Forensics
Profile Information, Location, PhotosLocations and Geo-LocationsText and links,CheckinsFriends/ Close Friends and familiesAppsPages groupsInterests
Facebook Evidences
Graph Theory Techniques(FB Forensics)
Skype Forensics
Top Chat and free Video and voice call application
Skype users hit milestone 2 billion minutes per day
ChatsContactsIPDevice InfoLast OnlineTransfer DataCall logsEtc
Skype Forensics
Wanna dig Deeper ?
Volatile memoryNon-Volatile Memory
Fire on your Forensics Workstation Machine
Question and Answer