Your SlideShare is downloading. ×
0
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media Forensics
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

EC-Council Hackway Workshop Presentation- Social Media Forensics

1,518

Published on

This Presentation involves with Social Media Forensics such as Email Tracing and investigation the Fraud, Scam... etc.. In the next section we covered the Twitter, Facebook, and Linkdin Forensics …

This Presentation involves with Social Media Forensics such as Email Tracing and investigation the Fraud, Scam... etc.. In the next section we covered the Twitter, Facebook, and Linkdin Forensics practically. After the video call and Instant Messaging tools, Skype is chosen because it is one of the top most popular chatting, voice/video calls (free and commercial plans). We demonstrated practically how to extract the chat conversation, contacts, call logs and much more information. Malware distribution is quite common is social media by social engineering techniques. We performed the analysis to how analysis and investigate the malware and social media investigation with malware distribution and social engineering perspective.

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,518
On Slideshare
0
From Embeds
0
Number of Embeds
8
Actions
Shares
0
Downloads
57
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Play the video
  • Gmail Password Extraction
  • https://www.virustotal.com/
  • Windows 8: c:usersAdminAppDataRoamingSkype
  • Transcript

    • 1. EC-Council, Malaysia Instructor : Sina Manavi 19 August 2014 http://eccouncilacademy.org/home/exposing-hacking- methodology-hackaway-workshop/
    • 2.  Who am I?  Are you ready to be hacked? (Demo)  Hands on- Password Extraction  Digital Forensics  Dumping The Facebook  Hands-on Scam, Fraud and Email Tracing  Break time  Facebook Forensics  Skype Forensics  Malware Analysis
    • 3. Who am I Sina Manavi is Master of Computer Security and digital Forensics. He is interested in digital Forensics ,E- Discovery and First Response. Contact : Manavi.Sina@Gmail.com Homepage: sinamanavi.wordpress.com
    • 4.  As an Digital Forensics Investigator, authorized access to the user profile either by interview or digging the system. But he is not allowed to hack the system  .
    • 5. http://cybermap.kaspersky.com/
    • 6.  http://youtu.be/F7pYHN9iC9I
    • 7. http://blog.x1discovery.com/2013/12/10/social-media-case-law-update-november-2013/
    • 8.  Get source of Email,  Find out who, when, from where has sent the email to you.  Tor, Fake IP and no foot prints
    • 9.  Crime  Human Trafficking  Scam, Fraud  Inappropriate media sharing  Malware distribution through social media
    • 10.  Missing Person  Infidelity  Malware  Scams, Fraud, Human Trafficking  Child Pornography  Illegal Media Sharing
    • 11.  Activity Log, or searching using “Graph search”…etc. :  My friends who like EC-Council Academy Malaysia  Facebook Archive: includes the whole user activity in FB.  But takes time and two authentication step to download it
    • 12.  Profile Information, Location, Photos  Locations and Geo-Locations  Text and links,Checkins  Friends/ Close Friends and families  Apps  Pages  groups  Interests
    • 13.  Top Chat and free Video and voice call application  Skype users hit milestone 2 billion minutes per day
    • 14.  Chats  Contacts  IP  Device Info  Last Online  Transfer Data  Call logs  Etc
    • 15.  Volatile memory  Non-Volatile Memory

    ×