Cyber Security
Cybercrime awareness and Investigation
Introduction
Mehedi Hasan
Master's in Information Systems security
Bangladesh University of Professionals (BUP),
Cell Phone : +8801713000056
Working Area: Electronics and Industrial Security.
Job Experience: 15 Years (Multinational Company)
• Brother International Singapore (Full Time)
• Law Enforcement & Intelligence
• Bangladesh Computer Council (B.C.C) (Guest Trainer)
• Cyber Crime Awareness Foundation (Member)
Professional Training: Singapore, Indonesia, Malaysia, Vietnam,
Thailand, Nepal and India.
Introduction
Case Study
Attacks on Banking Sector
Digital Forensic and Investigations
Social Engineering
Different types of Attack
Information Gathering
4
Introduction
Countermeasure
Chapter Outline
Introduction
Hacking: Unauthorized access in a system
Types of Hacking
• Website Hacking.
• Email Hacking.
• Network Hacking.
• Password Hacking.
• Online Bank Hacking
• Computer Hacking.
Welcome to Cybercrime
Awareness
Who is a Hacker
He is not a Hacker
He is a Hacker
• Not a Criminal
• Not someone who is expert on Microsoft word, excel.
•Think outside of the box.
•Wants to test his limits.
•Has unlimited curiosity.
•Discover s unknown features about technology.
•Dedicated to knowledge
•Highly creative.
Who is Hacker
Hacker Cracker
Lots of Knowledge & Experience Lots of Knowledge & Experience
Good person Bad person
Strong Ethics Poor Ethics
No Crime Involved with crime
Like to fights against criminal They are criminal
Modern Hacker
Networking Programming Operating System
Hacker
Steps Of Hacker
•Step 1: Identify Victim
•Step 2: Information Gathering.
•Step 3: Identify Loophole.
•Step 4: Actual Hack.
•Step 5: Escape without a trace.
Hacking into computer, is just like breaking into a house
Case Study
• Balancing money.
• Mumbai Lady.
• NASA
• Bangladesh Bank.
• American Bank.
• FBI Attack
Balancing money
Mumbai Lady
• A lady live in Mumbai,
India lived in an
apartment.
• Attacker broke into her
computer & switched her
web camera on!
• Biggest cyber crime
involving privacy invasion
in the world!
What will we learn?
• Not teach you how to become a criminal
• Teach you to think like a computer hacker.
• Teach you how computer criminals work.
• Implement solutions against criminals.
• Techniques to protect yourself.
The Anatomy of IP Addresses
• An IP address acts as the unique identity of a computer at
which if can be contacted.
The Anatomy of IP Addresses
Class Range
A 0.0.0.0 to 126.255.255.255
B 128.0.0.0 to 191.255.255.255
C 192.0.0.0 to 223.255.255.255
D 224.0.0.0 to 239.255.255.255
E 240.0.0.0 to 255.255.255.255
Email Spoofing
www.anonymizer.in/fake-mailer/
Email Spoofing is the art of sending a spoofed email from
somebody else’s email account.
SMS Spoofing
http://www.spranked.com,http://www.phonytext.com
SMS Spoofing is the art of sending a spoofed SMS from
somebody else’s mobile phone.
SMS Spoofing
SMS Spoofing
Ransomware
Ransomware is malware for data kidnapping, an exploit in
which the attacker encrypts the victim's data and demands
payment for the decryption key.
Email Spoofing
www.anonymizer.in/fake-mailer/
Email Spoofing is the art of sending a spoofed email from
somebody else’s email account.
Email Spoofing
www.anonymizer.in/fake-mailer/
Email Spoofing is the art of sending a spoofed email from
somebody else’s email account.
Email Spoofing
• Spam Filters with Firewall
• Filtering Software
• User awareness
Investigation
• Users behavior analysis
• Email Header Analysis
• IP Logger
• SMS / Conversation
• Web link sharing
How to find a remote system’s IP address
www.getnotify.com
How to find a remote system’s IP address
www.didtheyreadit.com
How to find a remote system’s IP address
www.politemail.com
Microsoft Outlook Header Analysis
How to find a remote system’s IP address
Email header analysis
How to find a remote system’s IP address
www.mxtoolbox.com
How to find a remote system’s IP address
EmailtrakerPro
How to find a remote system’s IP address
By sending link to victim
How to find a remote system’s IP address
Internet Chat: netstat -n
How to find a remote system’s IP address
www.whatismyipaddress.com
IP Address
• Change the name of the exe file.
• Change the port being used by tor.
• Add bridge relays to tor.
How to unblock Tor?
People Hacking
Whatever you do online, you are leaving a trace behind on some
website, server of system in some part of the world or other.
People hacking is the technique of searching the entire internet
looking for private information about some individual. The
information that you can find out is the following.
• Contact Addresses.
•Date of Birth.
•Email Address.
•Contact Number.
•Place of Work.
•Satellite Photos.
•Work History.
Proxy Workbench
www.pipl.com
Proxy Workbench
www.anywho.com
Steps Of Hacker
•Step 1: Identify Victim
•Step 2: Information Gathering.
•Step 3: Identify Loophole.
•Step 4: Actual Hack.
•Step 5: Escape without a trace.
Identify Loophole
• Port Scanning
• Send email with attach.
• User Analysis
IP Scanning
Proxy Workbench
www.googlemap.com
www.googleearth.com
Steps Of Hacker
•Step 1: Identify Victim
•Step 2: Information Gathering.
•Step 3: Identify Loophole.
•Step 4: Actual Hack.
•Step 5: Escape without a trace.
Actual Attack
• Virus
• Trojans
• Malware
• Keylogger
• Phishing
• Exploits
• Social Engineering
Virus
Vital Information Resources Under Siege
A computer virus is a program or piece of code that is loaded
onto your computer without your knowledge and runs against
your wishes. Viruses can also replicate themselves.
Trojans
NETBUS, BACK ORRIFICE, SUB7, GIRLFRIEND and WIN BACKDOOR.
Trojans are RATs or Remote Administration tools that give
an attacker remote control or remote to the victim’s
computer
Trojans
Ardamax Keylogger, Sniperspy, Winspy.
Software Keylogger
Trojans
Hardware Keylogger
Trojans
• Use updated Antivirus
• Scan your system regularly
• Scan flash media/Drive before use.
•
Trojans
Break
Phishing Attacks
Phishing Attacks
Phishing Attacks
Phishing Attacks
Social Engineering Attacks
• Mobile phones were used.
• Do not allow strangers to make calls from your mobile – your
phone could be detonating a bomb.
Types of ATM frauds
Card Stolen
PIN Compromise
Card Skimming
What is ATM Skimming
ATM frauds
Video surveillance
Hidden video camera
Overhead cell phone
camera
Remotely positioned
cameras
PIN pad overlay
ATM frauds
• Choose your ATM machines carefully
•Check the card slot carefully
• Ensure that there are no hidden cameras
• Shield your hand when you enter in your PIN
• Avoid using ATMs in isolated locations
• Always prefer ATM machines near Bank Branch.
Windows Hacking
Online Attack : Cain and Able
Dumps password hashes from the SAM file requires admin access
http://www.oxid.it
Cracking Network Passwords
Brutus
Fantastic Brute Force Password cracking tools
Captcha
Solution Against Brute force attacks
Network Attack
• Man In the meddle attack
• Brut forcing
• Botnet
• DOS and DDOS Attack
DOS Attack
NPING
Command line packet generator
DOS Attack
Cyber terrorism War
Low Orbit lon Cannon (LOIC)
It is an open source network stress tool. But can also be
used as a dDOS attack application.
Http://cisko.fr/
DDOS Attack
DoSHTTP
DOS Attack
Cyber terrorism War
DDOS Attack
Firewall
• They can Prevent Denial-of-Service (DoS) Attacks
• Prevent illegal modification / access of internal data
administered
network
public
Internet
firewall
trusted “good guys” untrusted “bad guys”
Social Engineering
Social Engineering
Social Engineering
Social Engineering
Social Engineering
Social Engineering
Social Engineering
Social Engineering
Social Engineering
CCTV Hacking
• inurl:/view.shtml
• intitle:”Live View / – AXIS” | inurl:view/view.shtml^
• inurl:ViewerFrame?Mode=
• inurl:ViewerFrame?Mode=Refresh
• inurl:axis-cgi/jpg
• intitle:”EvoCam” inurl:”webcam.html”
• intitle:”Live NetSnap Cam-Server feed”
• http://74.94.148.163:8080/ViewerFrame?Mode=Motion
Attacks on Banking Sector
Digital Forensic and Investigations
Social Engineering
Different types of Attack
Information Gathering
83
Introduction
Countermeasure
Chapter Outline
Digital forensic
• Forensic & Digital forensic:
• Forensics is the application of science to solve a legal problem
• Digital Forensics is a part of forensic science (in relation to
computer crime) focusing on the recovery and investigation of
material (essentially data) found in digital devices.
In a word, It is recovery Science
Computer forensic
Identity Finder
Smartphone forensic
Andriller
Digital Forensic
Digital Forensic
• Deleted Files
• Logs
• Special System files (registry etc.)
• Email archves, printer spools
• Adminirtrative setting
• Internet History
• Chat archives
• Encrypted Fiels /Password protected files
Countermeasure
Install Safety software program
• Secure browsing tools.
Cleaner, Antivirus Program, Awareness.
• Data safety tools
Folder Locker, True Crypt, SafeHouse
Explorar, BitLocker.
Investigation and Quarry
Investigation & Detection
http://www.edecision4u.com/PRODUCTS.html
Investigation & Detection
http://www.edecision4u.com/PRODUCTS.html
https://60.251.127.211:13443 Login: rootpass000000
Wireless-
Detective
Real-Time Wireless
Forensics and Lawful
Interception System
E-Detective
Real-Time Network Forensics and
Lawful Interception System
Attacks on Banking Sector
Digital Forensic and Investigations
Social Engineering
Different types of Attack
Information Gathering
93
Introduction
Countermeasure
Chapter Outline
Cyber Crime Awareness
• Password Changing policy.
• Don’t use simple password. (apni123, apni789, apni111,
123456, 098765, 0171300056, apni00056, apniabc)
• Don’t click on un trusted link.
• Spoofing email (Lottery, Girlfriend/boyfriend, Job)
• Remove unknown friend social media.
•Use strong password.
• Do not give your device to un trusted people.
Countermeasure
• Use Antivirus &Regularly scan computer and
external portable devices.
•Always check a website name in the browser
before entering your private information.
•Protect your computer with password.
• Always ask guidance from expert incase of doubt.
.

Workshop on Cyber security and investigation