You are on page 1of 4

DAY-1 DIGITAL FORENSICS

Cyber Security
CATEGORY OF CYBER CRIMES
NEED SCHEMES
1. Case study in Mumbai (loan-application)
2. Morphing of photos- loan app suicide case
3. User of the account (forensic investigation-law forensic dept-
track back the person)
4. JDJUA- reverse applications

GREED SCHEMES
1. Crypto Currency- caught in crypto, victim
2. Fishing site (fake website of the actual website)
3. Law enforcements can track down the ip address

LUST SCHEMES
1. PORN websites
1,10,000 Facebook users fell prey to it
2. Sextortion-fake messages
3. Senior Indian Air Force Officer-cyber cell in karachi

THREAT SCHEMES
1. Electricity Scams- giving access via link
2. Blocking of debit and atm cards
3. CDR- call data record
4. IPDR- IP data records (finding out a fake acc)

CASE STUDY
 Missing girl- girl ran away, through her sim card they
tracked her down
 Using Odium
 URL- myactivity.google.com
 Tracking location
TOOLS
Data theft cases, ransom ware cases
1. FTK IMAGER
2. AUTOPSY

PREVENTIVE MEASURES
1. Never work on the original application or device, work with
clones.

File create image

Case number CR002


Evidence Number PD001
Unique Description Theft Case
Examiner Soha Aziz Khan
Notes

NEXT
IMAGE DESTINATION FOLDER- (select destination folder)

Image destination folder


(Where you want to save it)

Click start (shows progress)

Check snaps and work accordingly

Image summary

Check snaps and work accordingly

Read thru the details displayed

NIRSOFT WEBSITE

Browsinghistory-tool
Wireless key- tool

HOW TO RECOVER DELETED DATA FROM PHONES


1. EaseUS
2. Dr.fone.wondershare
LINEX tools

nas.io/cybersecuredindia

bugbunty programs- tryhackme.com

bugcrowd
hacker1

portSwigger ---website

You might also like