EC-Council Hackway Workshop Presentation- Social Media Forensics

2,316 views
2,121 views

Published on

This Presentation involves with Social Media Forensics such as Email Tracing and investigation the Fraud, Scam... etc.. In the next section we covered the Twitter, Facebook, and Linkdin Forensics practically. After the video call and Instant Messaging tools, Skype is chosen because it is one of the top most popular chatting, voice/video calls (free and commercial plans). We demonstrated practically how to extract the chat conversation, contacts, call logs and much more information. Malware distribution is quite common is social media by social engineering techniques. We performed the analysis to how analysis and investigate the malware and social media investigation with malware distribution and social engineering perspective.

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,316
On SlideShare
0
From Embeds
0
Number of Embeds
1,325
Actions
Shares
0
Downloads
86
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • Play the video
  • Gmail Password Extraction
  • https://www.virustotal.com/
  • Windows 8: c:usersAdminAppDataRoamingSkype
  • EC-Council Hackway Workshop Presentation- Social Media Forensics

    1. 1. EC-Council, Malaysia Instructor : Sina Manavi 19 August 2014 http://eccouncilacademy.org/home/exposing-hacking- methodology-hackaway-workshop/
    2. 2.  Who am I?  Are you ready to be hacked? (Demo)  Hands on- Password Extraction  Digital Forensics  Dumping The Facebook  Hands-on Scam, Fraud and Email Tracing  Break time  Facebook Forensics  Skype Forensics  Malware Analysis
    3. 3. Who am I Sina Manavi is Master of Computer Security and digital Forensics. He is interested in digital Forensics ,E- Discovery and First Response. Contact : Manavi.Sina@Gmail.com Homepage: sinamanavi.wordpress.com
    4. 4.  As an Digital Forensics Investigator, authorized access to the user profile either by interview or digging the system. But he is not allowed to hack the system  .
    5. 5. http://cybermap.kaspersky.com/
    6. 6.  http://youtu.be/F7pYHN9iC9I
    7. 7. http://blog.x1discovery.com/2013/12/10/social-media-case-law-update-november-2013/
    8. 8.  Get source of Email,  Find out who, when, from where has sent the email to you.  Tor, Fake IP and no foot prints
    9. 9.  Crime  Human Trafficking  Scam, Fraud  Inappropriate media sharing  Malware distribution through social media
    10. 10.  Missing Person  Infidelity  Malware  Scams, Fraud, Human Trafficking  Child Pornography  Illegal Media Sharing
    11. 11.  Activity Log, or searching using “Graph search”…etc. :  My friends who like EC-Council Academy Malaysia  Facebook Archive: includes the whole user activity in FB.  But takes time and two authentication step to download it
    12. 12.  Profile Information, Location, Photos  Locations and Geo-Locations  Text and links,Checkins  Friends/ Close Friends and families  Apps  Pages  groups  Interests
    13. 13.  Top Chat and free Video and voice call application  Skype users hit milestone 2 billion minutes per day
    14. 14.  Chats  Contacts  IP  Device Info  Last Online  Transfer Data  Call logs  Etc
    15. 15.  Volatile memory  Non-Volatile Memory

    ×