How to become a cyber-forensics expert



                                              
1

Cyber Forensics (or ‘Digital Forensics’) deals with evidence found on computers and digital storage media that’s related to crime scene investigations. If the idea of tracing back a crime to unravel the truth gets your adrenaline pumping, this is the job for you. While the skills required to collect digital evidence and data may  be difficult to acquire, once you’ve mastered them, you can proudly call yourself the Sherlock Holmes of cybercrime. Though on the façade, digital forensics may appear different from real-world forensics, the sciences are quite similar at the conceptual level. 

Information retrieval

Gathering evidence without contaminating the scene is a key part of the process. If you contaminate the source of evidence, the rest of the case is on an unsure track already. Which is why it is of foremost importance that evidence media − called “exhibit” in legal terminology − is examined with care. This means that the investigator must take a raw image of the media because doing so might reveal the tracks of the crime. If the original image doesn’t match this duplicate image at a later stage of analysis, forensics experts will know. The devil is in the details, so let us break down for you how information retrieval works:

2


• Data storage

This part involves maintaining a file structure index and allocating actual data somewhere else. Technically, a B-Tree is maintained for storing the directory structure on each partition (letting users know which file and folder is inside which file/folder). The space for this B-Tree index is normally preallocated.
When you normally delete a file, it’s sent to your Trash/Recycle Bin which is just another folder maintained exclusively by your operating system. When you delete the file from your recycle bin, it remains on your computer because the only thing the operating system deletes is the entry from the folder structure (the B-Tree Index); the data remains in place. This leaves the window to retrieve deleted data open. This is the window that data-recovery tools use. Undoubtedly, data retrieval in crime scene investigation is of higher importance than mere recovery of photos, thus the demand for highly skilled recruits.

3

Mac OS X lets you remove the files in Trash securely without a third-party tool (just press Command key to show the option)

• Physical storage: 

Data stored on a hard disk is stored as a sequence of bits, and each bit is physically stored by altering the magnetic value of a very tiny point on the disk. As imperfect as the world is, the magnetic value on the disk doesn’t reflect a perfect binary value. For example, if the original state of a bit was at perfect 0, firing an electromagnetic pulse corresponding to 1 will cause the value to come to 0.92. Now, if you fire an electromagnetic signal to set that value to 0, it would come to a state that would probably indicate a value of 0.1 and then again you fire the pulse to set the bit to 1. This time, it goes to 0.95. 
                                                              
4


Now, these values are fairly away from 0.5 and are easy to be determined as 1 or 0. However, if you notice the numbers above, a particular bit value can represent fair number of value overwrites on the same place. The accuracy of guessing the right value after x number of overwrites decreases as x increases. There are tools that do this fairly well. For one of these tools to work, they would need the exact magnetic value on the disk platter for each bit.
Not a lot of  thought is required to conclude that to safely erase data from a disk. You’d need to overwrite the same disk portion where the data was stored, multiple times. The more random these values and more the number of overwrites, the lower the chance of correctly guessing the original value. The process of copying the bit-level detail of magnetic values on the disk is called “imaging”. This is done by taking a snapshot of the entire disk/partition and saving it as a file. There are tools available for this process and a typical imaging session takes a lot of time because of the excruciating level of detail required. Speaking technically, imaging must always be done on the evidence-disk (the disk on which the evidence of crime is suspected to be present) in the read-only mode.

Information/Data interpretation

Once the disk image has been taken, the next task is to understand what the data means. This step involves many tools and in-depth comprehension of the way
different pieces of software interact with each other to trace back the circumstances of the felony. You may also be required to understand the operation of the OS and/ or certain applications, which might have been used to commit the crime. While data interpretation is a complex process, we’ll lightly touch upon it to give you an idea of the work involved in this step: 

1. Know the OS:

Data logged by operating systems sometimes plays a key role in determining what happened. Depending on the OS, the investigation areas might drastically change. Take Windows, for example; it stores a decent log of things that you try to do on the system.Activities such as installing an application and failed network login attempts are logged, and they can give a boost to an investigator’s perception of what happened. Sometimes, one has to look into the registry to ascertain the tools that were used or their settings (many tools on Windows store their settings in registry).

2. Fish for hidden file content:

                                                                       
5


The data stored on the disk makes up the largest part of the investigation. A number of times you may have to look at a stockpile of files that may appear useless to their original user, but will eventually prove quite useful. Autosave information saved by Microsoft Word or backup files generated when editing files by Linux OS are some of the mildest examples. The good as well as bad thing about these files is that they’re not visible to a user and normally just left on the disk by the OS or the program that creates them. In case they’re deleted, the normal deletion method is used. This would be the same as deleting a file from Trash or Recycle Bin, which means they can be eventually recovered.
3. Rely on tools to assist you:
At this point, you’re probably wondering how you’ll be able to read a Word document’s auto-save backup file. If you try to read the file in its raw form, your brain is bound to cheat you. That’s because it isn’t a plain text file. Registry is one of the creators of such a file. Interpreting the file will be impossible if you rely on our brains alone. You’ll need tools that can interpret the data you found on the disk. A simple example, here – MS Word can open a Word file recovered from a disk. Tools, formats and rights For dealing with data, you’ll need appropriate tools at each step. For example, if you want to extract the disk image from an evidence disk, there are many tools that can help you get the image. To create an image as well there are multiple tools available, from free and well known tools such as the ‘dd’ command on Linux to a complete set of forensic tools such as EnCase. Oftentimes, a single tool can’t be relied upon and one might need to, say, create an image using different tools. 

6

File formats are crucial largely because they’re involved at almost every level of the investigation process. From extracting images to reading the data, one needs to deal with an extremely vast set of formats. Hypothetically, if you took the disk image using EnCase, then you would need EnCase to read the format in which the image file was stored. Assuming that your evidence disk was taken from an iMac machine, you’d need a way to read the HFS+ file system used by Mac OS X. Once the data is extracted, you’d again need software to read the data. If it’s a .dwg file, only AutoCAD would be able to open that file. You’d have to deal with a plethora of formats all the way. Lastly, you can’t simply start off with a forensic investigation and not have the required rights. you need to be a part of the police force or an investigative agency authorised to handle the case. And of course, you must have the right to use the software/tools involved.
Careers in Cyber Forensics

7

It’s by the virtue of the career opportunities that the attractiveness of a discipline is determined. Though not a popular field, Digital Forensics has opportunities in both the private and public sector. Interestingly, there are positions in both sectors where one needs to use this knowledge to destroy data, as well as recover it.
• Revenue Department: 

Organisations dealing with money directly, both private and public need to trace financial crimes. This involves digging the data graves on the disk and creating the
timeline of who did what and in what order – challenging, interesting and intellectually rewarding.

• Malware Analysis:

Companies trying to create anti-viruses often need to inspect the patterns of data destruction as well trace malwares that may have deleted themselves after their mission was complete. Forensics experts are certainly a necessity here. 

• Government and Police:

Crime investigations conducted by intelligence agencies, police and cyber security cells often require a forensics expert to help them walk a tightrope without falling off. With time, as electronic media takes over our lives, forensics is supposed to take over a large share of crime and thus, investigative processes.

• Private Auditing Companies: 

There are companies that dedicate themselves to the job of Forensics Consultation needed by other entities. You guessed it right. These are private detectives.

• Trainer: 

There certainly is a lack of talent in this field. Trainers are required at all of the prior mentioned organisations. And as it happens in many cases, being a trainer on rare and intellectually challenging cases is quite rewarding. 

That being said, Cyber Forensics is an ever-changing landscape. New types of storage media and software are introduced all the time, ensuring new challenges to overcome keeping those in the field on their toes. You can rest assured that the environment will keep you updated on the latest in technology and in touch with a very wide array of technology.
Read more

How to Trace Any IP Address

Trace_IP

After you obtain this IP address, it is necessary to trace it back to the source. So, in this post I will show you how to trace any IP address back to its source.

How to Trace the IP Address Back to the Source?

In fact, tracing an IP address back to its location is a lot simpler than what many people imagine. There exists many online tools using which you can accomplish this job. One of my favorite site is IP2Location.com.
Just go to  http://www.ip2location.com/demo.aspx and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address:
  • Country in which the IP is located
  • City to which the IP address belongs to
  • Latitude/Longitude of the IP’s location
  • Zip Code of the region to which the IP belongs to
  • Time Zone associated with the IP
  • Name of the ISP to which the IP address belong to
  • Internet Speed of the computer associated with the IP
  • Weather Station associated with the region of the IP
  • Domain name associated with the IP address
A sample snapshot of the results from ip2location.com is given below:
ip2location_results1
You can also visually trace route any IP address back to its location. For this, just visit http://www.yougetsignal.com/tools/visual-tracert/ and enter the IP you want to trace in the dialog box and hit the “Proxy Trace” button. Wait for few seconds and the visual trace route tool displays the path Internet packetstraverse to reach a specified destination. Hope this helps. Please pass your comments.
Read more

How To Create Your Own VPN

Don't buy a VPN, Instead Make your own



Don't waste your money on a VPN. They're expensive, slow and you don't know if they're truely not logging you. Just make your own. This takes less than 5 minutes to do and is very easy. I did this a few days ago and actually forgot it was on, the speeds are very close. Here's proof...



My Speed without a VPN


My Speed with a VPN


VPN Speed when I bought from a commercial VPN Provider : 


t's extremely simple to set up. First, buy a cheap vps from a data center. I have worked with a lot of data centers and found that you get what you pay for. Cheap hosts often put way too people on a single server and have low internet speeds. My VPS provider of choice is RamNode or Digital Ocean, however you can use whoever you want (but remember, less cost usually means less speeds). You need around 96mb ram (64mb ram won't cut it!) and 0.5GB disk space (as you need to install an OS as well) minimum, so keep that in mind if you buy a non-ramnode VPS. 

If you chose to go with Ramnode, the VPS you need is $16 per year with the coupon code IRC33, which is much lower than all VPN providers' ( All VPN Providers charge $5 [minimum] per month so, that totals to $60 Per Year, where as using Ramnode, You are spending $16 per year) . The VPS you want is either of the OpenVZ/SVZ servers. You can chose if you want a better processor and an SSD for 10GB storage space, or a lesser processor with SSD-cached storage for 50GB storage space. Either will result in the same speeds. Chose then one you want and chose "View Plans". Chose the location closest to you, then buy the 128MB CVZ-E5 option (it says $24 but that's before the IRC33 code, which gives 33% off recurring). Hit order now, and buy it like any other WHCMS system. When you're choosing the operating system, chose "Debian 7.0 32 bit" (not 64bit because that uses slightly more ram, and is useless unless you have more than 4GB ram) Once you pay, you'll get an email that looks like this:

Log into the Ramnode SolusVM control panel and chose your server. Click "Boot" if it's not online already, and scroll down to the bottom. Turn the "TUN/ATP" box to On, so it looks like this:


Your server may reboot.

Download PuTTY and put the IP address (in the email) in the host name, then "22" in the port. Log in with the username "root" and the password supplied in the email. 

Run the following commands in the order I put them here. Wait for the old command to end, obviously. You can right-click in putty to paste:
 wget http://swupdate.openvpn.org/as/openvpn-as-1.8.4-Ubuntu10.i386.debdpkg -i openvpn-as-1.8.4-Ubuntu10.i386.debpasswd openvpn (change the pass to whatever you want)

Go to [your ip]:943/admin and ignore the SSL warning. Login with the username "openvpn" and the password you entered in the previous command. Click agree. Turn the server on if it's not on yet.

Download and install the openvpn client. Put your IP in the host box, then the username and password you used in the admin page as the login. That's it, you're done!

The only downside to this is that you have 500GB bandwith per month before you're charged an extra $4 per 1TB bandwith you use. I've never run into this issue. 


Read more

How to steal SSL Encrypted Passwords on WiFi Using Backtrack 5 & Ettercap


I am simply teaching how Arp Spoof and Ettercap work.


What does ettercap do?

Well it does a lot of things but today we are going to show how a hacker can steal SSL encrypted passwords over wifi! SSL encrypted sites are like Gmail, Yahoo, Paypal etc! Anything with https:// in front of it. 

How does it do this you ask? Confused

It works by ARP Spoofing your Victims IP and when the site they visit tries to serve an SSL Cert ettercap injects it's own fake cert and captures the password! Brilliant! 

1. Let's get started!

 First scroll to your dolphin file browser. It is the little icon in the bottom that looks like a file cabnet.

Click on the root folder 

Then open the etc folder and scroll down until you find a file called "etter.conf"

scroll down until you see this:

#---------------
#     Linux
#---------------
# if you use ipchains:
   #redir_command_on = "ipchains -A input -i %iface -p tcp -s 0/0 -d 0/0 %port -j REDIRECT %rport"
   #redir_command_off = "ipchains -D input -i %iface -p tcp -s 0/0 -d 0/0 %port -j REDIRECT %rport"
# if you use iptables:
   redir_command_on = "iptables -t nat -A PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"
   redir_command_off = "iptables -t nat -D PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"

Now we need to remove 2 # symbols to allow the Redir command to work in iptables. Make yours looks like this:


Change this: 
# if you use iptables:
   #redir_command_on = "iptables -t nat -A PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"
   #redir_command_off = "iptables -t nat -D PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"

To This:
# if you use iptables:
   redir_command_on = "iptables -t nat -A PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"
   redir_command_off = "iptables -t nat -D PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"

Great now the two # symbols are deleted just close and save!

2. Let's Open Ettercap!

Click the backtrack logo on the bottom left -> backtrack tab -> privilege escalation -> protocol analysis-> network sniffers -> ettercap-gtk



3. Now click Sniff and select unified sniffing.





4. Select your Network interface. In my case it is wlan0 my wifi but yours may be diferent!




5. Now click the Host tab and Scan for hosts.




6. Now click the host tab and select the host list option.

7. Now it's time to select your targets from the host list! Select your router mine was 192.168.1.1 and add it to host 2.
Next select your victim mine was 192.168.1.6 and add it to host 1.




8. Next go to the Mitm tab and select arp poisoning and check the box for remote sniffing and click ok!




9. Click the Start button and then the Start Sniffing option.


NOTE THIS TUTORIAL IS FOR EDUCATIONAL PURPOSES ONLY!!!

Read more

Jailbreaking PS3
















►►►Read First◄◄◄ * WATCH IN 1080p* !

Hey guys and welcome to my new video. Today i want to show you how to jailbreak your Sony playstation 3 ( PS3 ) . This does not work on the Playstation 4 ( PS4 ) . 

Currently there is no Jailbreak for the PS4 , and only PS3´s with a OFW of 3.55 or below are jailbreakable.

Also the new super slim is currently NOT jailbreakable.

Download Links:

CFW & OFW :

http://www.tortuga-cove.com/forums/vi...

CFW comparison :

http://www.ps3hax.net/showthread.php?...
http://www.ps3hax.net/showthread.php?...
http://www.ps3hax.net/forumdisplay.ph...

PS3 hacking guide :

http://www.youtube.com/watch?v=by0QGE...

Written Tutorial :

Q: What can a jailbroken Playstation 3 system do?
A: When a PS3 is jailbroken, it allows the use of installing package files, which can range from Emulators or programs that allow you to install free games from a black market marketplace. You can also mod games such as Call of Duty , download free movies with the removal of Cinavia, which disallowed the downloading of movies onto the system after 3.10 , and run FTP clients, and much more!

Q: Can I jailbreak 4.50?
A: You can in a sense. You must downgrade first, and in order to downgrade you must have had a console on 3.55 at one time. Super slims cannot be jailbroken.
Q: I have the E3 Installed an downgraded, what's the next step to get online?
A: To get online you use a spoof, which in retrospect, makes your system think it's on the current version, but isn't.

One common question I find on here time and again is "Can I jailbreak my PS3?" The answer is simple. You MUST be on version 3.55, and you MUST have 2 PS3 consoles, just to make this easier on yourself. Some PS3 slim models will not be able to be downgraded, so please refer to the Next Steps part, and check the compatibility there. To check your current version, on the XMB Main screen navigate to Settings-System Settings-System Info. The "System Version" is where your current version will be. Consoles that have not at one time been on 3.55 cannot be jailbroken either. So, if you bought a PS3 from Walmart and it came out of the box on 3.60, your out of luck. You may also check the requirements here.

The USB Step:

In order to jailbreak, download the CFW, and plug in your USB flash drive. In your flash drive, right-click and format your flash drive to FAT32. Once that is done, go into your USB, and create a new folder. Name this folder "PS3" without the quotations. Inside the PS3 folder, create a folder called "Update" without the quotations. In this folder, you should place the PS3UPDATE.PUP, which is found in the download for the Kmeaw 3.55 download. You can now safely eject your USB, and plug it into your PS3.

Source: 

http://www.se7ensins.com/forums/threa...

●▬▬▬▬▬▬▬▬▬▬▬▬▬●

Just follow the steps shown in the Video :- )
Read more

Pages