Combating Cyber Security Through
Forensic Investigation Tools
S. Venkata Sreeram
II-B.tech
Sri Mittapalli College of Engineering
 Introduction
 Tools of Forensic science
Investigation
 Investigative Process for
Digital Forensic Science
 Investigation Tools
 Cyber Security
 Memory forensics
 Basic security Terminals
 Motion Sensor Technology
 Anti Hacking Software
 Digital image forensics.
INDEX
Tools that forensic science Technicians use
Forensic Investigation
in
Virtual Crimes
Types & Features of Investigation Tools
* Network Miner
Network miner is a forensic investigation tool which was
more popular for forensic which was more popular and
its functionalities and features also very imperative
when compared to other forensic tools.
* Wireshark
Wireshark is a network capture and analyzer tool to see
what’s happening in your network. Wireshark will be
handy to investigate network related incident.
*Autopsy
Autopsy is a GUI-based digital forensic program to analyze
hard drives and smart phones efficiently. Autopsy is used by
thousands of users worldwide to investigate what happened
in the computer.
•Email analysis
•File type detection
•Media playback
•Registry analysis
•Photos recovery from memory card
•Extract web activity from browser
•Show system events in graphical
interface
•Timeline analysis
•Extract data from Android – SMS,
call logs, contacts, etc.
There are many Network Forensic Analysis Tools
(NFAT) currently available. Network Miner is a
powerful tool that has many features that are not as well
implemented in other tools. Among these features are:
Network Miner allows you to parse libcap files or to do
a live packet capture of the network traffic. Network
Miner also allows you to reconstruct FTP, SMB, HTTP,
and TFTP data streams so that you can see a
comprehensive view of what data was being sent over
the network.
NetworkMiner
Libcap Implements the user-space Interfaces to
POSIX 1003. capabilities available in Linux
Kernels.
Wireshark is a free and open source network
protocol analyzer that enables users to interactively
browse the data traffic on a computer network. The
development project was started under the name
Ethereal, but was renamed Wireshark in 2006.
Many networking developers from all around the
world have contributed to this project with network
analysis, troubleshooting, software development and
communication protocols. Wireshark is used in
many educational institutions and other industrial
sectors.
Autopsy is a GUI-based digital forensic program to analyze hard drives and smart phones
efficiently. Autopsy is used by thousands of users worldwide to investigate what happened
in the computer.
Capture data from several different network
interfaces
View the credential data of the connections
Use the DNS info to see what sites people are
accessing
Search for keywords (string, or hex) within the
packets
See all clear text that it monitored
Reconstruct and view files that were transfered
based on the data stream
Create thumbnails of all the images that were sent
over the network for easy monitoring
It is a passive tool.
It doesn't actively target devices on the network
Capture and view frame data about the packets
Passive OS detection.
Features
Citations in Cyber Security
Onion Layered Security Incidents
 Ransomware taking Over
Malicious Insider Attacks
Greater Management awareness
BASIC SECURITY TERMINALS
 COMPUTER SECURITY
 MOBILE SECURITY
 ANTIVIRUS FIREWALL
 SURVEILLANCE CAMERAS
 INLINE PRIVACY
 SECURE PAYMENT
 GLOBAL SECURE SHIELD
Cybersecurity is the practice of protecting
systems, networks, and programs from
digital attacks. These cyberattacks are
usually aimed at accessing, changing, or
destroying sensitive information; extorting
money from users; or interrupting normal
business processes.
Implementing effective cybersecurity
measures is particularly challenging today
because there are more devices than
people, and attackers are becoming more
innovative.
Cyber Security
Phishing
Phishing is the practice of sending fraudulent emails that resemble emails from reputable
sources. The aim is to steal sensitive data like credit card numbers and login information.
It’s the most common type of cyber attack. You can help protect yourself through education
or a technology solution that filters malicious emails.
Ransomware
Ransomware is a type of malicious software. It is designed to extort money by blocking access to files or
the computer system until the ransom is paid. Paying the ransom does not guarantee that the files will be
recovered or the system restored. These Tools can Stop ransomware in its tracks .
Social engineering
Social engineering is a tactic that adversaries use to trick you into revealing sensitive information. They
can solicit a monetary payment or gain access to your confidential data. Social engineering can be
combined with any of the threats listed above to make you more likely to click on links, download
malware, or trust a malicious source.
Malware
Malware is a type of software designed to gain unauthorized access or to cause damage to a computer.
Learn more about malware protection creates some Awareness.
Anti-hacking Software
This free piece of anti-hacking software is designed to
make it extremely difficult for hackers to access your
computer by patching many of the existing Windows
security issues.
Features
•Disables “Run as Administrator”
vulnerabilities.
•Patches user account control for
3rd-party firewall software.
•Cleans your computer privacy.
•Starts start-up scanner.
•Detects and removes keyloggers.
•Blocks PayPal donations and email
PLEASE SHARE WITH US !
Lets Have A Look Forward
through Practical Experience
with Network Miner
and
Wireshark.

Combating cyber security through forensic investigation tools

  • 1.
    Combating Cyber SecurityThrough Forensic Investigation Tools S. Venkata Sreeram II-B.tech Sri Mittapalli College of Engineering
  • 2.
     Introduction  Toolsof Forensic science Investigation  Investigative Process for Digital Forensic Science  Investigation Tools  Cyber Security  Memory forensics  Basic security Terminals  Motion Sensor Technology  Anti Hacking Software  Digital image forensics. INDEX
  • 3.
    Tools that forensicscience Technicians use Forensic Investigation in Virtual Crimes
  • 5.
    Types & Featuresof Investigation Tools * Network Miner Network miner is a forensic investigation tool which was more popular for forensic which was more popular and its functionalities and features also very imperative when compared to other forensic tools. * Wireshark Wireshark is a network capture and analyzer tool to see what’s happening in your network. Wireshark will be handy to investigate network related incident. *Autopsy Autopsy is a GUI-based digital forensic program to analyze hard drives and smart phones efficiently. Autopsy is used by thousands of users worldwide to investigate what happened in the computer. •Email analysis •File type detection •Media playback •Registry analysis •Photos recovery from memory card •Extract web activity from browser •Show system events in graphical interface •Timeline analysis •Extract data from Android – SMS, call logs, contacts, etc.
  • 6.
    There are manyNetwork Forensic Analysis Tools (NFAT) currently available. Network Miner is a powerful tool that has many features that are not as well implemented in other tools. Among these features are: Network Miner allows you to parse libcap files or to do a live packet capture of the network traffic. Network Miner also allows you to reconstruct FTP, SMB, HTTP, and TFTP data streams so that you can see a comprehensive view of what data was being sent over the network. NetworkMiner Libcap Implements the user-space Interfaces to POSIX 1003. capabilities available in Linux Kernels.
  • 7.
    Wireshark is afree and open source network protocol analyzer that enables users to interactively browse the data traffic on a computer network. The development project was started under the name Ethereal, but was renamed Wireshark in 2006. Many networking developers from all around the world have contributed to this project with network analysis, troubleshooting, software development and communication protocols. Wireshark is used in many educational institutions and other industrial sectors.
  • 8.
    Autopsy is aGUI-based digital forensic program to analyze hard drives and smart phones efficiently. Autopsy is used by thousands of users worldwide to investigate what happened in the computer.
  • 9.
    Capture data fromseveral different network interfaces View the credential data of the connections Use the DNS info to see what sites people are accessing Search for keywords (string, or hex) within the packets See all clear text that it monitored Reconstruct and view files that were transfered based on the data stream Create thumbnails of all the images that were sent over the network for easy monitoring It is a passive tool. It doesn't actively target devices on the network Capture and view frame data about the packets Passive OS detection. Features
  • 11.
    Citations in CyberSecurity Onion Layered Security Incidents  Ransomware taking Over Malicious Insider Attacks Greater Management awareness
  • 12.
    BASIC SECURITY TERMINALS COMPUTER SECURITY  MOBILE SECURITY  ANTIVIRUS FIREWALL  SURVEILLANCE CAMERAS  INLINE PRIVACY  SECURE PAYMENT  GLOBAL SECURE SHIELD
  • 14.
    Cybersecurity is thepractice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative. Cyber Security
  • 15.
    Phishing Phishing is thepractice of sending fraudulent emails that resemble emails from reputable sources. The aim is to steal sensitive data like credit card numbers and login information. It’s the most common type of cyber attack. You can help protect yourself through education or a technology solution that filters malicious emails. Ransomware Ransomware is a type of malicious software. It is designed to extort money by blocking access to files or the computer system until the ransom is paid. Paying the ransom does not guarantee that the files will be recovered or the system restored. These Tools can Stop ransomware in its tracks . Social engineering Social engineering is a tactic that adversaries use to trick you into revealing sensitive information. They can solicit a monetary payment or gain access to your confidential data. Social engineering can be combined with any of the threats listed above to make you more likely to click on links, download malware, or trust a malicious source. Malware Malware is a type of software designed to gain unauthorized access or to cause damage to a computer. Learn more about malware protection creates some Awareness.
  • 16.
    Anti-hacking Software This freepiece of anti-hacking software is designed to make it extremely difficult for hackers to access your computer by patching many of the existing Windows security issues. Features •Disables “Run as Administrator” vulnerabilities. •Patches user account control for 3rd-party firewall software. •Cleans your computer privacy. •Starts start-up scanner. •Detects and removes keyloggers. •Blocks PayPal donations and email
  • 18.
  • 19.
    Lets Have ALook Forward through Practical Experience with Network Miner and Wireshark.