Index
Top Cyber Crimes
What is OSINT
Resource For OSINT
Goal - OSINT
Information Gathering
Analysis
Career as a Digital Forensics Investigator
Case Study - Malaysian Airlines Flight MH17
OSINT Process
Confidential Data of GOV
Preventive Measures
www.fomada.com
Presented By Syed Amoz: CEO Fomada
2. Syed Amoz
Co-founder & CEO of Fomada a cybersecurity company
Author of Surviving the hacking world & Become the Cyber Girl
Helped many Educational Organizations & secured them
Worked as a freelance penetration tester for 4 years
Visit www.fomada.com
3. Index
Top Cyber Crimes
What is OSINT
Resource For OSINT
Goal - OSINT
Information Gathering
Analysis
Career as a Digital Forensics Investigator
Case Study - Malaysian Airlines Flight MH17
OSINT Process
Confidential Data of GOV
Preventive Measures
4. Top Cyber
Crimes
Fake ID ( Impersonation )
Picture Morphing
Cyber Extortion
Cyber Defamation
Honey Trap Ransomware
5. Media- print newspapers, magazines, radio, and television
Internet - discussion groups, YouTube, social media websites
(i.e. – Facebook, Twitter, Instagram, etc.)
Public Government Data - public government reports,
telephone directories, press conferences,
Professional Publications - information acquired from journals
,
Information that can be accessed
from publicly available sources
What is OSINT ?
Open Source intelligence (OSINT)
OSINT Sources ?
9. July 2014, Malaysian Airlines Flight MH17,
Crashed At Ukrainian-Russian border
Separatist's claimed to have shot down a
Ukrainian transport aircraft
The country’s president called the
incident an act of terrorism.
Case Study - Malaysian Airlines Flight MH17
Bellingcat used OSINT to expose Russian claims and
counterclaims as fabrications.
Purchased satellite photos from the
same area and time and
demonstrated that the MoD had used
older photos (May and June 2014)
24. Preventive
Measures
Use VPN
Virus total for phishing Links
Post less live Events on Social Media
Follow the Zero Trust Model
Lock Your profile
Use 2FA
Think before allowing service
Choose the Best Alternative
25. Career as a Digital Forensics Investigator
Analyzing computer systems and networks
Gathering evidence
Reconstructing cyberattacks
Gathering computer and network information
collecting intelligence from the surface web, deep web & darknet
Analyzing and synthesizing actionable threat intelligence via open source tools
Conducts analysis of email related internal fraud/misconduct
26. Fun Hacks | Marceline Anderson
Certifcations
CHFI: Computer Hacking Forensic Investigator V9 - EC COUNCIL
Global Information Assurance Certification Forensic Analyst (GCFA) - GICA
CFCE: Certified Forensic Computer Examiner - IACIS