EC-Council Hackway Workshop Presentation- Social Media Forensics

25
EC-Council, Malaysia Instructor : Sina Manavi 19 August 2014 http://eccouncilacademy.org/home/exposing- hacking-methodology-hackaway-workshop/ Social Media Forensics

description

This Presentation involves with Social Media Forensics such as Email Tracing and investigation the Fraud, Scam... etc.. In the next section we covered the Twitter, Facebook, and Linkdin Forensics practically. After the video call and Instant Messaging tools, Skype is chosen because it is one of the top most popular chatting, voice/video calls (free and commercial plans). We demonstrated practically how to extract the chat conversation, contacts, call logs and much more information. Malware distribution is quite common is social media by social engineering techniques. We performed the analysis to how analysis and investigate the malware and social media investigation with malware distribution and social engineering perspective.

Transcript of EC-Council Hackway Workshop Presentation- Social Media Forensics

Page 1: EC-Council Hackway Workshop Presentation- Social Media Forensics

EC-Council, Malaysia

Instructor : Sina Manavi

19 August 2014

http://eccouncilacademy.org/home/exposing-hacking-methodology-hackaway-workshop/

Social Media Forensics

Page 2: EC-Council Hackway Workshop Presentation- Social Media Forensics

Who am I?Are you ready to be hacked? (Demo)Hands on- Password ExtractionDigital ForensicsDumping The FacebookHands-on Scam, Fraud and Email TracingBreak timeFacebook ForensicsSkype ForensicsMalware Analysis

Presentation Overview

Page 3: EC-Council Hackway Workshop Presentation- Social Media Forensics

Who am I Sina Manavi is Master of Computer Security and digital Forensics. He is interested in digital Forensics ,E-Discovery and First Response.Contact : [email protected]: sinamanavi.wordpress.com

Page 4: EC-Council Hackway Workshop Presentation- Social Media Forensics

As an Digital Forensics Investigator, authorized access to the user profile either by interview or digging the system. But he is not allowed to hack the system .

Lets begin the session with an hands on

Page 5: EC-Council Hackway Workshop Presentation- Social Media Forensics

You Have Been Hacked!

Page 6: EC-Council Hackway Workshop Presentation- Social Media Forensics

http://cybermap.kaspersky.com/

WOW! What should I do now Sir?

Page 7: EC-Council Hackway Workshop Presentation- Social Media Forensics

Forensics Science

Page 8: EC-Council Hackway Workshop Presentation- Social Media Forensics

Evidences and Court

Page 9: EC-Council Hackway Workshop Presentation- Social Media Forensics

Digital Forensics

Page 10: EC-Council Hackway Workshop Presentation- Social Media Forensics

Forensics Challenges

http://youtu.be/F7pYHN9iC9I

Page 11: EC-Council Hackway Workshop Presentation- Social Media Forensics

statisticbrain.com says:

Page 12: EC-Council Hackway Workshop Presentation- Social Media Forensics

http://blog.x1discovery.com/2013/12/10/social-media-case-law-update-november-2013/

Social Media published Law Case:

Page 13: EC-Council Hackway Workshop Presentation- Social Media Forensics

Get source of Email,Find out who, when, from where has sent the

email to you.

Tor, Fake IP and no foot prints

Hands-on:Email Forensics/Anti Forensics

Page 14: EC-Council Hackway Workshop Presentation- Social Media Forensics
Page 15: EC-Council Hackway Workshop Presentation- Social Media Forensics

CrimeHuman Trafficking Scam, FraudInappropriate media sharing Malware distribution through social media

Why Social Media Forensics

Page 16: EC-Council Hackway Workshop Presentation- Social Media Forensics

Missing PersonInfidelityMalwareScams, Fraud, Human TraffickingChild PornographyIllegal Media Sharing

Why Social Media Forensics ???

Page 17: EC-Council Hackway Workshop Presentation- Social Media Forensics

Wanna hear from Experts?

Page 18: EC-Council Hackway Workshop Presentation- Social Media Forensics

Activity Log, or searching using “Graph search”…etc. : My friends who like EC-Council Academy Malaysia

Facebook Archive: includes the whole user activity in FB.But takes time and two authentication step to

download it

Facebook Forensics

Page 19: EC-Council Hackway Workshop Presentation- Social Media Forensics

Profile Information, Location, PhotosLocations and Geo-LocationsText and links,CheckinsFriends/ Close Friends and familiesAppsPages groupsInterests

Facebook Evidences

Page 20: EC-Council Hackway Workshop Presentation- Social Media Forensics

Graph Theory Techniques(FB Forensics)

Page 21: EC-Council Hackway Workshop Presentation- Social Media Forensics

Skype Forensics

Top Chat and free Video and voice call application

Skype users hit milestone 2 billion minutes per day

Page 22: EC-Council Hackway Workshop Presentation- Social Media Forensics

ChatsContactsIPDevice InfoLast OnlineTransfer DataCall logsEtc

Skype Forensics

Page 23: EC-Council Hackway Workshop Presentation- Social Media Forensics

Wanna dig Deeper ?

Page 24: EC-Council Hackway Workshop Presentation- Social Media Forensics

Volatile memoryNon-Volatile Memory

Fire on your Forensics Workstation Machine

Page 25: EC-Council Hackway Workshop Presentation- Social Media Forensics

Question and Answer