• No results found

भारतीय ौोिगकी संान मुंबई (IIT Bombay) siva@iitb.ac.in

N/A
N/A
Protected

Academic year: 2022

Share "भारतीय ौोिगकी संान मुंबई (IIT Bombay) siva@iitb.ac.in"

Copied!
66
0
0

Loading.... (view fulltext now)

Full text

(1)

.

... Cyber Crime Investigation

िशवकुमार G. Sivakumar சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई (IIT Bombay) siva@iitb.ac.in

September 28, 2013

• The Good (Web 1.0, 2.0, 3.0) 20%

• The Bad (Threats, Vulnerabilities, Attacks) 50%

• The Ugly? (Defence, Offence, Forensics) 30% (How to Learn)

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(2)

.. The Good side first!

How are you affected?

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(3)

.. Internet (Web 1.0)

Milestones

1 2

3

4 5 6

02 http://www.isc.org/

97 96 95 94 88 93

70s 82

10 1k 80k 1M 4.5M 16M

30M 100M 2k

5 25

90 150

20k 50k 800k

500 200k 1.2M

Academic WWW

(steroids) Java LAN−boom!

(TCP/IP) (DoD funds) Hosts

INTERNET GROWTH

99 Users

Countries Domains WWW sites

Commercial Users

E−commerce 147M

All

Motto: Information AnyTime, AnyWhere, AnyForm, AnyDevice, ...

WebTone like DialTone Basic Hardware (sine qua non!)

Democratized access to information! (Digital Divide)

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(4)

.. Social Networking (Web 2.0)

The OS/system software that empowers users to become producers of knowledge and ensures their right to collaboration/assembly.

Examples: Wikipedia, Flickr, Orkut, Twitter, ....

Mantras: Architecture of participation, Wisdom of crowds, Better as more use - Long tail, Tagging, commenting, blogs, Open access (source/content) for Remix/Mashup

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(5)

.. पूव प (Purva Paksha)

.

...

Web 1.0 may have democratized access to information, but it is like drinking water from a fire hose!

Search engines provide partial solutions, but cannot combine, categorize and infer!

.

...

Web 2.0 may have allowed right to assembly/collaboartion, but

• Proliferated unreliable, contradictory information.

• Facilitated malicious uses including loss of privacy, security.

.

...

What do you want from Web 3.0?

What you want to see/hear when you wakeup?

I have a dream ...

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(6)

.. Semantic Web (Web 3.0)

The application layer tapping the hardware (Web 1.0) and OS (Web 2.0)? Giving us right to knowledge!

Ramana Maharishi

.. . .

. author-of Naan Yaar?

.

Aksharamanamalai

.

Vichara Mani Mala

.

Reality in Forty Verses

.

contemporaries .

.

Kanchi Chan- drasekara Saraswathi

.

Jiddu Kr- ishnamurti

.

Place: Tiru- vannamali, Tamil Nadu

.

Lived

.

30/12/1879 to 14/4/1950

.

Combined, categorized information inferred from various sites, languages. www.dbpedia.org comes close today!

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(7)

.. ानम ्परमम ्ेयम ् (Knowledge is Ultimate Goal)

न चोरहाय न च राजहाय न ातृभाम न च भारकारी

ये कृते वधत एव िनं िवाधनं सवधनधानं

It cannot be stolen by thieves, cannot be taken away by the king, cannot be divided among brothers and does not cause a load. If spent, it always multiplies. The wealth of knowledge is the greatest among all wealths.

கற்றது ைக மண் அளவு

கல்லாதது உலகு அளவு

What has been learned is like a fistful of sand, What remains is like the whole earth!

If I have seen further [than others] it is by standing on the shoulders of giants... Issac Newton िवा ददाित िवनयम

IIT Bombay’s motto is the title of this slide.

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(8)

.. What’s Bad about Computers and Internet?

• “Can’t live with them, can’t live without them!”

• Know Your Enemy (threats/Vulnerabilities)

Can cyber/internet crimes cause events like the following?

• July 2006 Mumbai rains

• 26/11 attack on Mumbai

• Gulf of Mexico oil spill

• Mangalore air crash

• Stop all Mumbai local trains

• Damage BARC nuclear reactor

• Disrupt all Mumbai mobile phones? (Prof. Jhunjhunwala’s example)

• How to protect Critical National Infrastructure?

• Passive Defence

• Counter Intelligence (Technical side)

• Demo from atlas.arbor.net and cert-in.org.in Your questions/suggestions now will be invaluable!

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(9)

.. Security Concerns

Match the following!

Problems Attackers

Highly contagious viruses Unintended blunders Defacing web pages Disgruntled employees or customers Credit card number theft Organized crime

On-line scams Foreign espionage agents Intellectual property theft Hackers driven by technical challenge

Wiping out data Petty criminals

Denial of service Organized terror groups Spam E-mails Information warfare

Reading private files ...

Surveillance ...

• Crackers vs. Hackers

• Note how much resources available to attackers.

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(10)

.. What are Cyber crimes?

. Cybercrime ..

...

Activity in which computers or networks are a tool, a target, or a place of criminal activity. (Categories not exclusive).

• Against People

• Cyber Stalking and Harrassment

• (Child) Pornography

• Phishing, Identity Theft, Nigerian 419

• Against Property

• Cracking

• Virus and Spam

• Software/Entertainment Piracy

• Trade secrets, espionage

• Cyber Terrorism!

• Hactivism! (in some countries!)

• Information Warfare

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(11)

.. Some Examples

Food for thought...

• Vikram Buddhi, Assange, Snowden

• Stuxnet .

...

Stuxnet is a computer worm discovered in June 2010 that is believed to have been created by the U nited States and Israel to attack Iran’s nuclear facilities. Stuxnet initially spreads via Mic rosoft Windows, and targets Siemens industrial control systems.

While it is not the first time th at hackers have targeted industrial systems, it is the first discovered malware that spies on and subverts industrial systems, and the first to include a programmable logic controller (PLC) rootkit.

• Flame (Iran Oil terminals, 2012)

• DarkSeoul

Check out Wikipedia for more.

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(12)

.. Atlas.arbor.net

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(13)

.. Atlas.arbor.net

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(14)

.. Atlas.arbor.net

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(15)

.. Atlas.arbor.net

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(16)

.. Real-time Intelligence- atlas.arbor.net

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(17)

.. Who is scanning?

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(18)

.. Who is hosting phising sites?

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(19)

.. Malicious Servers

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(20)

.. 2013 DBIR

2013 Data Breach Investigations Report (Verizon)

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(21)

.. 2013 DBIR

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(22)

.. Mercenaries for Hire: HiddenLynx

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(23)

.. 2013 DBIR

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(24)

.. cert-in.org.in

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(25)

.. cert-in.org.in

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(26)

.. cert-in.org.in

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(27)

.. cert-in.org.in

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(28)

.. Excellent Training Programs

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(29)

.. Internet Attacks Toolkits (Youtube)

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(30)

.. Internet Attacks Timeline

From training material at http://www.cert-in.org.in/

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(31)

.. Internet Attack Trends

From training material at http://www.cert-in.org.in/

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(32)

.. Partial Landscape

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(33)

.. Defending a Critical National Infrastructure

Recent fibre cut.

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(34)

.. Defending a Critical National Infrastructure

Our Solution

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(35)

.. What is a Computer Network?

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(36)

.. So, what’s Internet?

• A bottom-up collection (interconnection) of networks

• TCP/IP is the only common factor

• Bureaucracy-free, reliable, cheap

• Decentralized, democratic, chaotic

• Internet Society (www.isoc.org)

• Internet Engineering Task Force (www.ietf.org)

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(37)

.. Why is Internet Vulnerable?

Quick overview of how Internet works.

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(38)

.. Denial of Service

Small shop-owner versus Supermarket

Crossmargs

Anamika

• What can the attacker do?

• What has he gained or compromised?

• What defence mechanisms are possible?

• Screening visitors using guards (who looks respectable?)

• VVIP security, but do you want to be isolated?

• what is the Internet equivalent?

DDOS increasingly the biggest worry on Internet. (Pearl Harbour comparison)

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(39)

.. Yahoo DDoS attack

• A real example of network insecurity.

• Caused traffic to Yahoo to zoom to 100s of Mbps

• Broke the capacity of machines at Yahoo and its ISPs

• Internet Control Message Protocol (ICMP) normally used for good purposes.

• Ping used to check “are you alive?”

Ping

Yes

Typically small packet (64 bytes) a host

Ping a Network

Many replies

Used by system administrators to check local network

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(40)

.. Yahoo DDoS attack

MIT network (5000+)

Stanford

Univ3 P1

P2 P3

P1,P2,P3,... Fake broadcast ping from Victim

How many replies does unsupecting victim get?

From whom? (respectable?)

DDOS (distributed denial of service attack) Freely available for "script kiddies’’ to wreak havoc!

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(41)

.. Vulnerabilities

Application Security

• Buggy code

• Buffer Overflows

Host Security

• Server side (multi-user/application)

• Client side (virus)

Transmission Security

A B

C Network Security Secrecy

Integrity

Availability

A B

C

A B

C

A B

C

(Modification) (Fabrication)

(Denial of Service attack)

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(42)

.. Security Requirements

Informal statements (formal is much harder)

• Confidentiality Protection from disclosure to unauthorized persons

• Integrity Assurance that information has not been modified unauthorizedly.

• Authentication Assurance of identity of originator of information.

• Non-Repudiation Originator cannot deny sending the message.

• Availability Not able to use system or communicate when desired.

• Anonymity/Pseudonomity For applications like voting, instructor evaluation.

• Traffic Analysis Should not even know who is communicating with whom. Why?

• Emerging Applications Online Voting, Auctions (more later)

And all this with postcards (IP datagrams)!

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(43)

.. Cryptography and Data Security

sine qua non [without this nothing :-]

• Historically who used first? (L & M)

• Code Language in joint families!

Confidentiality Data Integrity Authentication Non-Repudiation

Encryption

Digital Signature Message

authentication User

Identification

Ciphers Block Stream

Ciphers Hashing Signatures

Pubic-Key Methods Secret Key

Establishment

Key Management

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(44)

.. Symmetric/Private-Key Algorithms

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(45)

.. Asymmetric/Public-Key Algorithms

• Keys are duals (lock with one, unlock with other)

• Cannot infer one from other easily

• How to encrypt? How to sign?

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(46)

.. Security Mechanisms

System Security: “Nothing bad happens to my computers and equipment”

virus, trojan-horse, logic/time-bombs, ...

Network Security:

Authentication Mechanisms “you are who you say you are”

Access Control Firewalls, Proxies “who can do what”

Data Security: “for your eyes only”

• Encryption, Digests, Signatures, ...

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(47)

.. Network Security Mechanism Layers

Application

TCP/Socket

IP

Data Comm.

Application

TCP/Socket

IP

Data Comm.

IPv6, AH, ..

SSL, TLS PGP

S-HTTP, S-MIME

Firewalls

Encryption can be done at any level!

Higher-up: more overhead (for each application) but better control

.

...

Cryptograhphic Protocols underly all security mechanisms. Real Challenge to design good ones for key establishment, mutual authentication etc.

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(48)

.. Exchanging Secrets

. Goal ..

...

A and B to agree on a secret number. But, C can listen to all their conversation.

. Solution?

..

...A tells B: I’ll send you 3 numbers. Let’s use their LCM as the key.

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(49)

.. Exchanging Secrets

. Goal ..

...

A and B to agree on a secret number. But, C can listen to all their conversation.

. Solution?

..

...A tells B: I’ll send you 3 numbers. Let’s use their LCM as the key.

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(50)

.. Mutual Authentication

. Goal ..

...

A and B to verify that both know the same secret number. No third party (intruder or umpire!)

. Solution?

..

...A tells B: I’ll tell you first 2 digits, you tell me the last two...

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(51)

.. Mutual Authentication

. Goal ..

...

A and B to verify that both know the same secret number. No third party (intruder or umpire!)

. Solution?

..

...A tells B: I’ll tell you first 2 digits, you tell me the last two...

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(52)

.. Indian IT Act 2000

• Basic Legal Framework

• Electronic documents, signatures as evidence

• Cyber Crimes & Punishments

• Secn 43: Damage to Computers/Network

• Secn 65: Tampering source code

• Secn 66: “Hacking” (cracking)

• Secn 67: Obscenity (bazee.com!)

• Secn 69: Interception

• Several Initiatives (PKI, CERT-IN, Cyber cells, ...)

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(53)

.. Forensics

From www.forensicswiki.org

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(54)

.. Network Forensics

From en.wikipedia.org/wiki/Networkforensics

Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection. Unlike other areas of digital forensics, network investigations deal with volatile and dynamic information. Network traffic is transmitted and then lost, so network forensics is often a pro-active investigation.

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(55)

.. Certified Forensic Investigator

What are takeaways from such courses?

• Define and describe computer investigations

• Demonstrate correct methods of evidence gathering

• Use and evaluate various operating systems and file systems

• Equip a Forensics Lab with appropriate hardware and software

• Install, configure, and use various command-line and graphical software forensics tools

• Describe and compare various hardware devices employed by computer forensics experts

• Retrieve and analyze data from a suspect’s computer

• Summarize the evidence and write investigative reports

• Utilize the services of expert witnesses

• Recover file images, and categorize the data

• Examine and trace email messages

• Obtain and control digital evidence

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(56)

.. Forensic Tools Testing by NIST

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(57)

.. Forensic Tools Testing by NIST

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(58)

.. Log Files

Squid (proxy server) and Qmail (mail relay) at IIT Bombay

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(59)

.. Sqid Log Sample

One (funny?) case at IIT Bombay a few years back...

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(60)

.. Nmap

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(61)

.. Nmap

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(62)

.. Wireshark

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(63)

.. Wireshark

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(64)

.. Offence is Best Defence?

Honeypots - to attract bees. http://www.honeynet.org/

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(65)

.. War Driving: Google way

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

(66)

.. War Driving: Mumbai Police

िशवकुमार

G. Sivakumar

சிவகுமார்

Computer Science and Engineering

भारतीय ौोिगकी संान मुंबई

(IIT Bombay) siva@iitb.ac.in Cyber Crime Investigation

References

Related documents

Ubiquity of sensing devices, the low cost of data storage, and the commodification of computing have led to high volume, velocity and variety of modern data sets. Modern data sets

िशवकुमार சிவகுமார் भारतीय पौयोिगकी संथान मुंबई.?. Takeaways from

िशवकुमार சிவகுமா भारतीय ूौोिगकी संान मुंबई... Can this happen

Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौ ोिगकी सं ान मुंबई (IIT Bombay) siva@iitb.ac.in Big Data for Central Banking.?.

Sivakumar Computer Science and Engineering IIT Bombay siva@iitb.ac.in... But, C can listen to all

Ubiquity of sensing devices, the low cost of data storage, and the commodification of computing have led to high volume, velocity and variety of modern data sets. Modern data sets

Sivakumar சிவகுமா Computer Science and Engineering भारतीय ूौोिगकी संान मुंबई (IIT Bombay) siva@iitb.ac.in Cyber Crimes and Internet Security...

िशवकुमार சிவகுமார் भारतीय ौोिगकी संान मुंबई.. Hype or Real?. In the Big Data Analytics context consider