Professional Documents
Culture Documents
Day 1
Day 1
Cyber Security
CATEGORY OF CYBER CRIMES
NEED SCHEMES
1. Case study in Mumbai (loan-application)
2. Morphing of photos- loan app suicide case
3. User of the account (forensic investigation-law forensic dept-
track back the person)
4. JDJUA- reverse applications
GREED SCHEMES
1. Crypto Currency- caught in crypto, victim
2. Fishing site (fake website of the actual website)
3. Law enforcements can track down the ip address
LUST SCHEMES
1. PORN websites
1,10,000 Facebook users fell prey to it
2. Sextortion-fake messages
3. Senior Indian Air Force Officer-cyber cell in karachi
THREAT SCHEMES
1. Electricity Scams- giving access via link
2. Blocking of debit and atm cards
3. CDR- call data record
4. IPDR- IP data records (finding out a fake acc)
CASE STUDY
Missing girl- girl ran away, through her sim card they
tracked her down
Using Odium
URL- myactivity.google.com
Tracking location
TOOLS
Data theft cases, ransom ware cases
1. FTK IMAGER
2. AUTOPSY
PREVENTIVE MEASURES
1. Never work on the original application or device, work with
clones.
NEXT
IMAGE DESTINATION FOLDER- (select destination folder)
Image summary
NIRSOFT WEBSITE
Browsinghistory-tool
Wireless key- tool
nas.io/cybersecuredindia
bugcrowd
hacker1
portSwigger ---website