狠狠撸

狠狠撸Share a Scribd company logo
Forensic
Cyber attack
? Pdf nya bssn
Forensic analysis:
? Network Incident Response
? Email spoofing / phising / anomaly
? Network slowing down at working hour
? Local Incident Response
? PC / Laptop Forensic
? Ransom, Malware, virus
? Mobile Forensic
? stole user credential
? Phone belong to criminals
? Server Incident Response
? Webserver, mail server, voucher server
Step
? Background of when the incident
happen, and what IT department do
after.
? Collecting evidence
? Confirm if this computer was involved
in the data breach and find traces of
malicious activity if present.
? Perform disk analysis
? Perform memory analysis
? Analyse logs, registry
? Examine suspicious artefacts
? Interview with victim of incident
? Create timeline and put the leads
together
? Draw conclusions
? Reporting and follow up actions
? Advise on the course of action
? Create Indicators of Compromise
? Create a report sketch
? Create recommendations of immediate
actions to take
Timeline
19 September 2019
24-25 September 2019
>
>
25 Sept-1 Okt 2019
3-4 Oktober 2019
8 Oktober 2019
SXI CLIENT
Universal
Pack
SXI CLIENT
Vendor lain
Vendor lain
SXI CLIENT
Vendor lain
Universal
Pack
Vendor lain
SXI CLIENT
Universal
Pack
SXI CLIENT
Analisa
Nicolo Asli
CC: Unversalpack.it
SXI CLIENT
To: Bob
CC: Alice
Nicolo Palsu
(Univresalpack.it)
Nicolo Palsu
CC: Univresalpack.it
Nicolo Palsu
(Universalpack.icu)
SXI CLIENT
To: Bob
CC: Alice
Forward dengan akun
Alice
Reply email dari forward Alice, mengganti to
dan CC menjadi Bob dan domain pelaku.
Melakukan forward baru dari
email Alice ke domain baru
Vendor lain
Alice Palsu
CC: Univresalpack.it
Universal pack
Reply email dari forward Alice, mengganti to
dan CC menjadi Bob dan domain pelaku.
Vendor lain
Challenges
? Big HD and memories
? Time consuming
? Incident happen more then 3 days
? Logs retainer only for 7 days back
? The IT guys just
? shutdown the incident PC without consulting first
? Installing antivirus on the incident PC
? No SIEM available
? Very slow PC / laptop
? Everyone shared the same credentials
Cybercrime investigator
? A cybercrime investigator
investigates a number of crimes
that range from recovering file
systems on computers that have
been hacked or damaged to
investigating crimes against
children.
? In addition, cybercrime
investigators also recover data
from computers that can be
used in prosecuting crimes.
? Once the necessary electronic
evidence is gathered, cybercrime
investigators write reports that
will later be used in court.
Cybercrime investigators must
also testify in court.
Jobs
? Analyzing computer systems and networks following incident.
? Gathering computer and network information.
? Gathering evidence.
? Identify and recommend methods for the preservation and presentation of
evidence.
? Recovering data that was either destroyed or damaged.
? Recovering password-protected/encrypted files and hidden information.
? Reconstructing cyberattacks.
? Drafting expert testimony, affidavits, and reports.
? Testifying in court.
Next
? https://www.ashemery.com/dfir.html
? https://freetraining.dfirdiva.com/dfir-ctfs-challenges
? https://or10nlabs.tech/defcon-dfir-ctf-2018/
? https://soji256.medium.com/where-can-you-find-images-that-you-
can-use-to-learn-forensics-141c6c8cdc9e
? https://aboutdfir.com/education/challenges-ctfs/
? https://medium.com/@monliclican/defcon-dfir-ctf-2018-lessons-
learned-890ef781b96c
? https://defcon2019.ctfd.io/
Ad

Recommended

PPTX
Handling digital crime scene
SKMohamedKasim
?
PPTX
Cyber crime
Niraj Solanke
?
PPTX
Im260 computer hacking powerpoint
carlyxxjo55
?
PPSX
Cyber crime
Mukul Kumar
?
PPT
Working Remotely Vpn Paradigm
pparam02
?
PPTX
Cybercrime in Nigeria - Technology and Society
PELUMI APANTAKU
?
PDF
6414 preparation and planning of the development of a proficiency test in the...
Damir Delija
?
PPTX
DIGITAL FORENSICS_PRESENTATION
Amina Baha
?
PPTX
Cyber forensics ppt
RoshiniVijayakumar1
?
PPTX
Chap 2 computer forensics investigation
Malobe Lottin Cyrille Marcel
?
PPTX
CYBERFORENSICS
Dr. Prashant Vats
?
PPTX
Cyber Hygiene
GAURAV. H .TANDON
?
PPTX
Computer crimes and forensics
Avinash Mavuru
?
PPTX
Business Intelligence and the New Normal of Data Security
Doug Newdick
?
PPT
Hacking
thajmohammed
?
PPT
Chap 1 general introduction to computer forensics
Malobe Lottin Cyrille Marcel
?
PPTX
Introduction to Cyber Forensics Module 1
Anpumathews
?
PPTX
Digital forensics
dentpress
?
PPTX
Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby
?
PPTX
Cyber evidence at crime scene
Applied Forensic Research Sciences
?
PDF
ASCL_Syllabus_Project Report Details
Prakash Prasad ?
?
PDF
Pengenalan Forensik Digital
yprayudi
?
PPT
Secure Computer Forensics and its tools
Kathirvel Ayyaswamy
?
PPTX
Digital forensics
yash sawarkar
?
PDF
IT forensic
Rupesh Verma
?
PPTX
Elaborate_Cyber_Crime_Training_Elaborate_Cyber_Crime_TraininPPT.pptx
utsavkum2710
?
PDF
computerforensicsppt-111006063922-phpapp01.pdf
Gnanavi2
?
PDF
Digital forensic science and its scope manesh t
Manesh T
?

More Related Content

What's hot (12)

PPTX
DIGITAL FORENSICS_PRESENTATION
Amina Baha
?
PPTX
Cyber forensics ppt
RoshiniVijayakumar1
?
PPTX
Chap 2 computer forensics investigation
Malobe Lottin Cyrille Marcel
?
PPTX
CYBERFORENSICS
Dr. Prashant Vats
?
PPTX
Cyber Hygiene
GAURAV. H .TANDON
?
PPTX
Computer crimes and forensics
Avinash Mavuru
?
PPTX
Business Intelligence and the New Normal of Data Security
Doug Newdick
?
PPT
Hacking
thajmohammed
?
PPT
Chap 1 general introduction to computer forensics
Malobe Lottin Cyrille Marcel
?
PPTX
Introduction to Cyber Forensics Module 1
Anpumathews
?
PPTX
Digital forensics
dentpress
?
PPTX
Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby
?
DIGITAL FORENSICS_PRESENTATION
Amina Baha
?
Cyber forensics ppt
RoshiniVijayakumar1
?
Chap 2 computer forensics investigation
Malobe Lottin Cyrille Marcel
?
CYBERFORENSICS
Dr. Prashant Vats
?
Cyber Hygiene
GAURAV. H .TANDON
?
Computer crimes and forensics
Avinash Mavuru
?
Business Intelligence and the New Normal of Data Security
Doug Newdick
?
Hacking
thajmohammed
?
Chap 1 general introduction to computer forensics
Malobe Lottin Cyrille Marcel
?
Introduction to Cyber Forensics Module 1
Anpumathews
?
Digital forensics
dentpress
?
Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby
?

Similar to Forensic (20)

PPTX
Cyber evidence at crime scene
Applied Forensic Research Sciences
?
PDF
ASCL_Syllabus_Project Report Details
Prakash Prasad ?
?
PDF
Pengenalan Forensik Digital
yprayudi
?
PPT
Secure Computer Forensics and its tools
Kathirvel Ayyaswamy
?
PPTX
Digital forensics
yash sawarkar
?
PDF
IT forensic
Rupesh Verma
?
PPTX
Elaborate_Cyber_Crime_Training_Elaborate_Cyber_Crime_TraininPPT.pptx
utsavkum2710
?
PDF
computerforensicsppt-111006063922-phpapp01.pdf
Gnanavi2
?
PDF
Digital forensic science and its scope manesh t
Manesh T
?
PPTX
Cyber crime - and digital device.pptx
AlAsad4
?
PPTX
I want to be a cyber forensic examiner
Neeraj Aarora
?
PDF
Digital forensics
Chandrani Ta
?
PPTX
ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
John Intindolo
?
PPT
Computer Forensic
Tawhidur Rahman
?
PDF
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
Gnanavi2
?
PPT
Lecture 4,5, 6 comp forensics 19 9-2018 basic security
Alchemist095
?
DOCX
Computer Forensics
Shreya Singireddy
?
PPTX
The Scope of Cyber Forensic.pptx
Applied Forensic Research Sciences
?
PPTX
Scope of Cyber forensics
Applied Forensic Research Sciences
?
Cyber evidence at crime scene
Applied Forensic Research Sciences
?
ASCL_Syllabus_Project Report Details
Prakash Prasad ?
?
Pengenalan Forensik Digital
yprayudi
?
Secure Computer Forensics and its tools
Kathirvel Ayyaswamy
?
Digital forensics
yash sawarkar
?
IT forensic
Rupesh Verma
?
Elaborate_Cyber_Crime_Training_Elaborate_Cyber_Crime_TraininPPT.pptx
utsavkum2710
?
computerforensicsppt-111006063922-phpapp01.pdf
Gnanavi2
?
Digital forensic science and its scope manesh t
Manesh T
?
Cyber crime - and digital device.pptx
AlAsad4
?
I want to be a cyber forensic examiner
Neeraj Aarora
?
Digital forensics
Chandrani Ta
?
ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
John Intindolo
?
Computer Forensic
Tawhidur Rahman
?
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
Gnanavi2
?
Lecture 4,5, 6 comp forensics 19 9-2018 basic security
Alchemist095
?
Computer Forensics
Shreya Singireddy
?
The Scope of Cyber Forensic.pptx
Applied Forensic Research Sciences
?
Scope of Cyber forensics
Applied Forensic Research Sciences
?
Ad

Recently uploaded (20)

PPTX
PROCESS FOR CREATION OF BUSINESS PARTNER IN SAP
AhmadAli716831
?
PPTX
最新版美国特拉华大学毕业证(鲍顿别濒毕业证书)原版定制
taqyea
?
PDF
B M Mostofa Kamal Al-Azad [Document & Localization Expert]
Mostofa Kamal Al-Azad
?
PPTX
Q1 English3 Week5 PPT-MATATAG@edumaymay.pptx
JenniferCawaling1
?
PPTX
原版一样(础狈鲍毕业证书)澳洲澳大利亚国立大学毕业证在线购买
Taqyea
?
PPTX
Azure_Landing_Zone_Best_Practices_Visuals.pptx
fredsonbarbosa1
?
PDF
Clive Dickens RedTech Public Copy - Collaborate or Die
Clive Dickens
?
PPTX
Pitch PitchPitchPitchPitchPitchPitch.pptx
157551
?
PDF
Global Networking Trends, presented at the India ISP Conclave 2025
APNIC
?
PPTX
BitRecover OST to PST Converter Software
antoniogosling01
?
PPTX
IAREUOUSTPIDWHY$)CHARACTERARERWUEEJJSKWNSND
notgachabite123
?
PPTX
最新版加拿大奎斯特大学毕业证(蚕鲍颁毕业证书)原版定制
taqyed
?
PDF
BroadLink Cloud Service introduction.pdf
DevendraDwivdi1
?
PDF
DDoS in India, presented at INNOG 8 by Dave Phelan
APNIC
?
PDF
Logging and Automated Alerting Webinar.pdf
ControlCase
?
PPTX
BASICS OF SAP _ ALL ABOUT SAP _WHY SAP OVER ANY OTHER ERP SYSTEM
AhmadAli716831
?
PDF
ChatGPT A.I. Powered Chatbot and Popularization.pdf
StanleySamson1
?
PDF
狠狠撸s: Eco Economic Epochs for The World Game (s) pdf
Steven McGee
?
PPTX
history of internet in nepal Class-8 (sparsha).pptx
SPARSH508080
?
PPTX
原版澳洲斯文本科技大学毕业证(厂鲍罢毕业证书)如何办理
taqyed
?
PROCESS FOR CREATION OF BUSINESS PARTNER IN SAP
AhmadAli716831
?
最新版美国特拉华大学毕业证(鲍顿别濒毕业证书)原版定制
taqyea
?
B M Mostofa Kamal Al-Azad [Document & Localization Expert]
Mostofa Kamal Al-Azad
?
Q1 English3 Week5 PPT-MATATAG@edumaymay.pptx
JenniferCawaling1
?
原版一样(础狈鲍毕业证书)澳洲澳大利亚国立大学毕业证在线购买
Taqyea
?
Azure_Landing_Zone_Best_Practices_Visuals.pptx
fredsonbarbosa1
?
Clive Dickens RedTech Public Copy - Collaborate or Die
Clive Dickens
?
Pitch PitchPitchPitchPitchPitchPitch.pptx
157551
?
Global Networking Trends, presented at the India ISP Conclave 2025
APNIC
?
BitRecover OST to PST Converter Software
antoniogosling01
?
IAREUOUSTPIDWHY$)CHARACTERARERWUEEJJSKWNSND
notgachabite123
?
最新版加拿大奎斯特大学毕业证(蚕鲍颁毕业证书)原版定制
taqyed
?
BroadLink Cloud Service introduction.pdf
DevendraDwivdi1
?
DDoS in India, presented at INNOG 8 by Dave Phelan
APNIC
?
Logging and Automated Alerting Webinar.pdf
ControlCase
?
BASICS OF SAP _ ALL ABOUT SAP _WHY SAP OVER ANY OTHER ERP SYSTEM
AhmadAli716831
?
ChatGPT A.I. Powered Chatbot and Popularization.pdf
StanleySamson1
?
狠狠撸s: Eco Economic Epochs for The World Game (s) pdf
Steven McGee
?
history of internet in nepal Class-8 (sparsha).pptx
SPARSH508080
?
原版澳洲斯文本科技大学毕业证(厂鲍罢毕业证书)如何办理
taqyed
?
Ad

Forensic

  • 3. Forensic analysis: ? Network Incident Response ? Email spoofing / phising / anomaly ? Network slowing down at working hour ? Local Incident Response ? PC / Laptop Forensic ? Ransom, Malware, virus ? Mobile Forensic ? stole user credential ? Phone belong to criminals ? Server Incident Response ? Webserver, mail server, voucher server
  • 4. Step ? Background of when the incident happen, and what IT department do after. ? Collecting evidence ? Confirm if this computer was involved in the data breach and find traces of malicious activity if present. ? Perform disk analysis ? Perform memory analysis ? Analyse logs, registry ? Examine suspicious artefacts ? Interview with victim of incident ? Create timeline and put the leads together ? Draw conclusions ? Reporting and follow up actions ? Advise on the course of action ? Create Indicators of Compromise ? Create a report sketch ? Create recommendations of immediate actions to take
  • 5. Timeline 19 September 2019 24-25 September 2019 > > 25 Sept-1 Okt 2019 3-4 Oktober 2019 8 Oktober 2019 SXI CLIENT Universal Pack SXI CLIENT Vendor lain Vendor lain SXI CLIENT Vendor lain Universal Pack Vendor lain SXI CLIENT Universal Pack SXI CLIENT
  • 6. Analisa Nicolo Asli CC: Unversalpack.it SXI CLIENT To: Bob CC: Alice Nicolo Palsu (Univresalpack.it) Nicolo Palsu CC: Univresalpack.it Nicolo Palsu (Universalpack.icu) SXI CLIENT To: Bob CC: Alice Forward dengan akun Alice Reply email dari forward Alice, mengganti to dan CC menjadi Bob dan domain pelaku. Melakukan forward baru dari email Alice ke domain baru Vendor lain Alice Palsu CC: Univresalpack.it Universal pack Reply email dari forward Alice, mengganti to dan CC menjadi Bob dan domain pelaku. Vendor lain
  • 7. Challenges ? Big HD and memories ? Time consuming ? Incident happen more then 3 days ? Logs retainer only for 7 days back ? The IT guys just ? shutdown the incident PC without consulting first ? Installing antivirus on the incident PC ? No SIEM available ? Very slow PC / laptop ? Everyone shared the same credentials
  • 8. Cybercrime investigator ? A cybercrime investigator investigates a number of crimes that range from recovering file systems on computers that have been hacked or damaged to investigating crimes against children. ? In addition, cybercrime investigators also recover data from computers that can be used in prosecuting crimes. ? Once the necessary electronic evidence is gathered, cybercrime investigators write reports that will later be used in court. Cybercrime investigators must also testify in court.
  • 9. Jobs ? Analyzing computer systems and networks following incident. ? Gathering computer and network information. ? Gathering evidence. ? Identify and recommend methods for the preservation and presentation of evidence. ? Recovering data that was either destroyed or damaged. ? Recovering password-protected/encrypted files and hidden information. ? Reconstructing cyberattacks. ? Drafting expert testimony, affidavits, and reports. ? Testifying in court.
  • 10. Next ? https://www.ashemery.com/dfir.html ? https://freetraining.dfirdiva.com/dfir-ctfs-challenges ? https://or10nlabs.tech/defcon-dfir-ctf-2018/ ? https://soji256.medium.com/where-can-you-find-images-that-you- can-use-to-learn-forensics-141c6c8cdc9e ? https://aboutdfir.com/education/challenges-ctfs/ ? https://medium.com/@monliclican/defcon-dfir-ctf-2018-lessons- learned-890ef781b96c ? https://defcon2019.ctfd.io/