Skip to content

Digital Forensics and Incident Response (DFIR)

Notifications You must be signed in to change notification settings

RENANZG/My-Forensics

Repository files navigation

DIGITAL FORENSICS AND INCIDENT RESPONSE (DFIR)

"These programs were never about terrorism: they're about economic spying, social control and diplomatic manipulation. They're about power." (Edward Snowden)


BASIC STRATEGY

Crime Triangle Basic Investigative Metodology

• 5W: Who, What, When, Where and Why
• PDCA Cycle: Plan, Do, Check and Act
• Root Cause Analysis (RCA):

  1. Identify and describe the problem clearly
  2. Establish a timeline from the normal situation until
    the problem occurs
  3. Distinguish between the root cause and other causal
    factors (e.g., using event correlation)
  4. Establish a causal graph between the root cause
    and the problem


The criminal investigation must be protected from leaks by following a logical sequence:

  1. Exhaust the data collection in open sources (OSINT) or closed sources (CSINT, AML Intelligence);
  2. Hidden monitoring and tracking measures (SIGINT, HUMINT...);
  3. With concrete evidence of the practices investigated and exhaustion of remote possibilities, launch the operation itself with the publication of the investigation. At this stage, search and seizure warrants, temporary or preventive arrest and statements will be taken.


FORENSIC SUITES

FLOSS
Free/Libre and Open Source Software
PROPRIETARY
Cyber-surveillance Industry
• Kali Linux
https://kali.org
• Drive Badger
https://drivebadger.com (GitHub)
• SIFT Workstation
https://sans.org/tools/sift-workstation
• Parrot Security
https://parrotsec.org
• CAINE
https://caine-live.net
• CSI Linux
https://csilinux.com
• Avilla Forensics
https://github.com/AvillaDaniel/AvillaForensics
• IPED
https://github.com/sepinf-inc/IPED
• Debian Forensics Package
https://packages.debian.org/unstable/forensics-all
• Mobile Verification Toolkit (MVT)
https://docs.mvt.re/en/latest
• Tsurugi Linux
https://tsurugi-linux.org/

• REMnux
https://remnux.org

• Bitscout
https://github.com/vitaly-kamluk/bitscout

• Eric Zimmerman's tools (Freeware)
https://ericzimmerman.github.io/#!index.md
• Paladin® (Freeware)
https://sumuri.com/software/paladin/
• Forensic Toolkit (FTK)® - Lite (Freeware)
https://exterro.com/forensic-toolkit
• Magnet Forensic® - Mobile Extractor (Freeware)
https://magnetforensics.com
• Windows® Forensic Environment WinFE (Freeware)
https://winfe.net
• NirSoft® (Freeware)
https://nirsoft.net
• MiTeC® (Freeware)
https://mitec.cz
• Medusa Box® (Easy J-TAG)
https://medusabox.com
╰┈➤Models Features
╰┈➤Aliexpress
• Octoplus Box® (Easy J-TAG)
https://octoplusbox.com
╰┈➤Models Features
╰┈➤Aliexpress
• Cellebrite®
https://cellebrite.com
• NSO Group®
https://nsogroup.com
• Cognyte®
https://cognyte.com
• Check Point®
https://checkpoint.com
• Team Cymru®
https://team-cymru.com
• BriefCam®
https://briefcam.com/
• Forensic Toolkit (FTK)®
https://exterro.com/forensic-toolkit
• Magnet Forensic®
https://magnetforensics.com
• Variston®
https://variston.net
• Intellexa®
no refer
• Cytrox®
no refer
• Cy4Gate®
https://cy4gate.com/
• PARS Defense®
https://parsdefense.com
• Candiru®
https://saito.tech/
• Harpia Tech®
https://harpia.tech
• Visual Cortex®
https://visualcortex.com
• Oxygen Forensic®
https://oxygen-forensic.wedatasolution.com
• MSAB®
https://msab.com
• GMDSOFT®
https://gmdsoft.com
• Verint Systems®
https://verint.com
• Cyber Arm®
https://cyber-arm.com/services
• Cobalt Strike®
https://cobaltstrike.com
• Lumi Networks®
https://lumi.network
• Clear View AI®
https://clearview.ai
• Lockheed Martin®
https://lockheedmartin.com/
• MOBILedit®
https://mobiledit.com
• Crowd Strike®
https://crowdstrike.com
• Binalyze®
https://binalyze.com
• LexisNexis®
https://risk.lexisnexis.com
• NetQuest®
https://netquestcorp.com
• Gamma®
https://gamma.co.uk
• Memento Labs®
https://mem3nt0.com
• CYSource®
https://cysrc.com
• Maltego®
https://maltego.com
• Thorn's Safer®
https://thorn.org
Browse: https://dimse.info

FORENSIC TOOLS

• Evidence ProjectForensics Tools Catalogue

• NIST - Forensics Tools Catalogue

• S&T partners and NIST - Computer Forensic Tool Testing (CFTT)


Interesting information

• Beyond the Veil of Surveillance: Private Sector Offensive Actors (PSOAs)

• Burn, drown, or smash your phone: Forensics can extract data anyway

• How law enforcement gets around your smartphone’s encryption

• Cellphone data used to solve murder case from 2 years ago, police say

• The Stingray: How Law Enforcement Can Track Your Every Move

• Police are tracking you and your license plates

• SCOTUS: Police Need Search Warrant to Ping cell Phones

• EFF to Michigan Court: Governments Shouldn’t Be Allowed to Use a Drone to Spy on You Without a Warrant

• Motion to Suppress Aerial Surveillance Evidence in U.S. vs Muhammed Momtaz Alazhari

• Researchers Find Way to Steal Encrypted Data - NYT (2008)

• “Reverse Location Search Warrant”: A New Personal Data Hoovering Exercise Brought to You by Google (2019)

• As UN Human Rights Chief Urges Stricter Rules, Snowden Calls for End to Spyware Trade (2021)

• Forensics Journal Comparative analysis of mobile forensic proprietary tools: an application in forensic investigation (2022)



INTERCEPTION PLATFORMS

Comparison between Drive Badger (GitHub) with other lawful interception platforms. Visit: Official sheet or the PDF version in our repo. Credits for the panel: Tomasz Klim.



Exploit and Spyware Vendor

Zero-day Exploit (2023) Associated Spyware Vendor
CVE-2023-28205 and CVE-2023-28206 (Apple iOS) Variston (BridgeHead)
CVE-2023-2033 (Google Chrome) Intellexa/Cytrox (Predator)
CVE-2023-2136 (Google Chrome) Intellexa/Cytrox (Predator)
CVE-2023-32409 (Apple iOS) Variston (BridgeHead)
CVE-2023-3079 (Google Chrome) Intellexa/Cytrox (Predator)
CVE-2023-41061 and CVE-2023-41064 (Apple iOS) NSO Group (Pegasus)
CVE-2023-41991, CVE-2023-41992, and CVE-2023-41993 (Apple iOS) Intellexa/Cytrox (Predator)
CVE-2023-5217 (Google Chrome) Candiru (DevilsTongue)
CVE-2023-4211 (Arm Mali GPU) Cy4Gate (Epeius)
CVE-2023-33063 (Qualcomm Adreno GPU) Variston (BridgeHead)
CVE-2023-33106 and CVE-2023-33107 (Qualcomm Adreno GPU) Cy4Gate (Epeius)
CVE-2023-42916 and CVE-2023-42917 (Apple iOS) PARS Defense
CVE-2023-7024 (Google Chrome) NSO Group (Pegasus)


NATIONAL CYBER SECURITY AGENCIES

US — CISA
CA — Cyber
Americas — CSIRT
EU — ENISA
UK — NCSC
NL — NCSC
DE — BSI
FR — ANSSI
ES — CCN-CERT
IT — ACN
HU — NKI
CZ — NUKIB
NO — NCSC
IS — INCD
AU — Cyber
NZ — CERT
NZ — NCSC
KR — KISA
JP — Cert
JP — NISC
SG — CSA


${\color{Blue}\textbf{1.PASSIVE FORENSICS}}$

👷🛠️UNDER CONSTRUCTION🚧🏗

1.01 Forensic standards

Visit our repo tree: 2.FORENSIC

Standards

NIST — National Institute of Standards and Technology

Visit: https://nist.gov/standards

ASTM International

Subcommittee E30.12 on Digital and Multimedia Evidence
Visit: https://www.astm.org/get-involved/technical-committees/committee-e30/subcommittee-e30/jurisdiction-e3012

The PCI Security Standards Council (PCI SSC)

Visit: https://www.pcisecuritystandards.org

ISO/IEC — International Electrotechnical Commission

Visit: https://iso27001security.com
Official - Information security, cybersecurity and privacy protection — https://iso.org/standard/27001

RFC

Best Current Practices (BCP)

Standards

Informational

Experimental / Historic


1.02 Forensic certs & training

1.03 Online tools
Message Header Analysis
Phishing and Email Reputation
Whois and DNS Lookup
Malware and Vulnerability Databases
Archiving Tools
IP and MAC Address Tools
URL and Virus Scanning
File Analysis and Reverse Engineering
Utilities and Development Tools
OSINT and Breach Checking
Translation and Markdown Tools

For OSINT tools visit our repository: My-OSINT


1.04 Forensic tools

Forensics Tools Catalogues

Evidence Project - https://dftoolscatalogue.eu

NIST - https://toolcatalog.nist.gov

S&T partners and NIST - Computer Forensic Tool Testing (CFTT) - https://dhs.gov/science-and-technology/nist-cftt-reports

Some tools

Image and video enhancement techniques

Ppscayl
ImageJ
Upscalers

Computer-animated movies.

fSpy

Encryption workarounds:

  1. Find the key.
  2. Guess the key.
  3. Compel the key.
  4. Exploit a flaw in the encryption software.
  5. Access plaintext while the device is in use.
  6. Locate another plaintext copy.

Extraction Methods

Encryption:

Seize the encrypted files and decrypt them using a password or key and the appropriate decryption software.
OR
Seize the data while it is in an unencrypted state.

Virtualization: Seize the virtual image file and open it with the correct password.
OR
Log into the virtual machine and seize the data while the virtual machine is turned on and in an unencrypted state.
Relational Database: Seize all the files containing records. Obtain a copy of the database software and rebuild the database.
OR
Log into the database while it is live and employ the application used to create and manage the database as a search tool. Download the data using the method allowed by the application, either in the form of printouts or data files.

1.05 Cryptography

Encryption Workrounds

Visit our repo tree: 3.DOCUMENTS/Encryption

Encryption workarounds:

  1. Find the key.
  2. Guess the key.
  3. Compel the key.
  4. Exploit a flaw in the encryption software.
  5. Access plaintext while the device is in use.
  6. Locate another plaintext copy.

Bruteforce

Read the thread Brute Force Attacks

Cryptanalysis

Visit our repo tree: 03_DOCUMENTS/Cryptanalysis

Steganography


1.06 Memory analysis

Volatile memory analysis

• Volatility
https://volatilityfoundation.org/releases
• Linux Memory Extractor (LiME)
https://github.com/504ensicsLabs/LiME
• Memory Analysis<br https://www.memoryanalysis.net/amf
• Cobalt Strike in memory
https://andreafortuna.org/2020/11/22/how-to-detect-cobalt-strike-activity-in-memory-forensics/

JTag, Chip-off and ISP forensics

https://teeltech.com/ufaqs/what-is-jtag-chip-off-and-isp
https://cellebritelearningcenter.com/mod/page/view.php?id=11903
https://fletc.gov/jtag-chipoff-smartphones-training-program
https://gillware.com/phone-data-recovery-services/jtag-chip-off-forensics
https://gillware.com/phone-data-recovery-services/chip-off-forensics-services

Researching support for phones in JTAG software

https://octoplusbox.com
https://medusabox.com
https://riffbox.org
https://easy-jtag.com
https://z3x-team.com

1.07 Cryptocurrencies analysis

Cryptocurrencies analysis

https://github.com/OffcierCia/On-Chain-Investigations-Tools-List
https://github.com/aaarghhh/awesome_osint_criypto_web3_stuff
https://blocksherlock.com/home/blockchain-explorers
https://tronscan.org
https://etherscan.io
https://algoexplorer.io
https://explorer.solana.com
https://stellar.expert
https://snowtrace.io
https://flowscan.org
https://polygonscan.com

Some tools

https://github.com/demining/CryptoDeepTools
https://github.com/demining/bitcoindigger
https://github.com/graphsense
https://github.com/demining/Dao-Exploit
https://github.com/immunefi-team/Web3-Security-Library/blob/main/Tools/README.md#blockchain-analysis

Private sector

https://chainalysis.com
https://elliptic.co
https://ciphertrace.com
https://coinmetrics.io
https://whitestream.io
https://elementus.io
https://trmlabs.com
https://bitok.org/investigations


${\color{Red}\textbf{2.ACTIVE FORENSICS}}$

👷🛠️UNDER CONSTRUCTION🚧🏗

2.01 Police hacking

Visit our repo tree:
04_POLICE_HACKING

The Cyber Kill Chain

• MITRE ATT&CK — ICS Techniques
https://attack.mitre.org/techniques/ics

• MITRE ATT&CK — Enterprise Techniques
https://attack.mitre.org/techniques/enterprise/

• MITRE ATT&CK — Mobile Techniques
https://attack.mitre.org/techniques/mobile/

• OWASP MAS - Mobile Application Security
https://mas.owasp.org

• Metasploit - Penetration testing framework
https://metasploit.com

• Training

∙ Rootme — https://root-me.org
∙ Vulnhub — https://vulnhub.com
∙ Hacker101 — https://hacker101.com
∙ Crackmes — https://crackmes.one
∙ Attack Defense — https://attackdefense.com


2.02 Law Enforcement Agency (LEA)

• Rule of Law Benchmarks

*First of all, consult court cases to see how laws are (mis)applied.

GE Constitution &#127465
https://gesetze-im-internet.de/englisch_gg/index.html

US Constitution &#127482
https://constitution.congress.gov

• Difference between legal regimes or multi-level chains of statutory references

We are still reflecting on this point.

Security Bodies
(Judiciary Police)
Administration of Justice
(Criminal Procedural Law)
Intelligence Services
• Conducts criminal investigations, carries out whatever steps it deems appropriate to elucidate the facts, with a view to discovering evidence of the existence of the crime and signs of its authorship.
• Criminal police bodies act as a precautionary measure, such as in the case of preserving evidence or in the case of a flagrant crime.
• Has an obligation to preserve the confidentiality of the
investigation, therefore the right to adversarial proceedings is limited.
• In general, the investigation is already a procedural phase.

• In general, the criminal investigation can be directly initiated by other institutions, such as the Public Prosecutor's Office.
• Full exercise of the right to adversarial proceedings
• Follow due legal process, the criminal procedural law.
• Production of knowledge, with production of intelligence reports, to support decision making.
• Their main objectives are to collect information and provide analyses, as well as anticipate and counteract external threats.
• Compartmentalization princpiple: the production of information is separate from decision making, it ensures no single spy knows everything, meaning if they're captured, spies won’t know enough to compromise a mission.
• In general, intelligence activity does not follow due legal process, intelligence agencies do not conduct criminal proceedings, although they can combat terrorism.
• Related to military activities of national defense and conquest against foreign enemies.

*Informational separation of powers: in Germany, where the Gestapo of National Socialism existed, the separation between intelligence (knowledge) and police (power) was one of the denazification measures imposed by the allies in 1949.

*There is some controversy as to whether intelligence can be considered security.

• International Law

∙ UN — Library of Resources
https://unodc.org/e4j/en/resdb/index.html

∙ UN — Course Catalogue
https://unodc.org/elearning/en/courses/course-catalogue.html

∙ ICRC - Cyber operations during armed conflicts
https://icrc.org/en/war-and-law/conduct-hostilities/cyber-warfare

∙ ICRC - New technologies and IHL
https://icrc.org/en/war-and-law/weapons/ihl-and-new-technologies

∙ The Cyber Law Toolkit - The intersection of international law and cyber operations
https://cyberlaw.ccdcoe.org/wiki/Main_Page

∙ Budapest Convention (Cybercrime)
https://coe.int/en/web/cybercrime/the-budapest-convention

∙ Octopus Project
https://coe.int/en/web/cybercrime/octopus-project

Public International Law
PUBLIC INTERNATIONAL LAW
LAWS OF WAR LAWS OF PEACE
"Jus ad bellum" "Jus in bello" Occupation and "Jus Post Bellum" Human Rights Law
The international rules pertaining to which extent the use of military force against another state is allowed. The international rules pertaining to how armed conflict must be conducted. The Justice at the end of the war, helps move from conflict to peace.Reasonable peace treaties, civilian population should be protected,
leaders who broke Hague/Geneva laws must face prosecution, cities must be reconstructed.
International Bill on Human Rights. Treaties and Conventions. Covenats and Declarations.

Jus ad bellum

Charter of the United Nations. Chapter VII — Action with respect to Threats to the Peace, Breaches of the Peace, and Acts of Aggression - Article 51

“Nothing in the present Charter shall impair the inherent right of individual or collective self-defence if an armed attack occurs against a Member of the United Nations, until the Security Council has taken measures necessary to maintain international peace and security. Measures taken by Members in the exercise of this right of self-defence shall be immediately reported to the Security Council and shall not in any way affect the authority and responsibility of the Security Council under the present Charter to take at any time such action as it deems necessary in order to maintain or restore international peace and security.”

Jus in Bello

Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts (Protocol I)

“Article 3 of the Geneva Conventions and Article 44 Additional Protocol I
In order to promote the protection of the civilian population from the effects of hostilities, combatants are obliged to distinguish themselves from the civilian population while they are engaged in an attack or in a military operation preparatory to an attack. Recognizing, however, that there are situations in armed conflicts where, owing to the nature of the hostilities an armed combatant cannot so distinguish himself, he shall retain his status as a combatant, provided that, in such situations, he carries his arms openly:

(a) During each military engagement, and

(b) During such time as he is visible to the adversary while he is engaged in a military deployment preceding the launching of an attack in which he is to participate.

(c) Acts which comply with the requirements of this paragraph shall not be considered as perfidious within the meaning of Article 37, paragraph 1."

References:
UN - https://legal.un.org/repertory/art1.shtml
ICRC - https://icrc.org/en/document/what-are-jus-ad-bellum-and-jus-bello-0
ICRC - https://ihl-databases.icrc.org/en/ihl-treaties/api-1977?activeTab=undefined
ICRC - https://casebook.icrc.org/a_to_z/glossary/direct-participation-hostilities

• Council of Europe — Cybercrime

∙ Cybercrime — https://coe.int/cybercrime
∙ GLACY+ — https://coe.int/en/web/cybercrime/glacyplus
∙ iPROCEEDS-2 — https://coe.int/en/web/cybercrime/iproceeds-2
∙ Octopus Project — https://coe.int/en/web/cybercrime/octopus-project
∙ CyberSouth — https://coe.int/en/web/cybercrime/cybersouth
∙ CyberEast — https://coe.int/en/web/cybercrime/cybereast

• Publications

• Investigatory Powers — Criminal Law

Americas

∙ US — Federal Rules — Criminal Procedure — Overview — Link
∙ US — Federal Rules — Criminal Procedure — Rule 41 — Search and Seizure — Link

On a Network
in a Single
District
On a Network in Multiple Districts On a Network with Data Stored Internationally Unknown Where the Data is Stored (Cloud)
Search under Rule 41; consider noting in affidavit the possibility of other locations Multiple search warrants for each district with data or §2703 Warrant served on service provider Use legal process required in country hosting the data, or consider accessing data remotely with a search warrant under Rule 41 Search under Rule 41 for subject computers, and concurrently search under §2703 served on service provider
European Union

∙ EU — Criminal procedural laws across the European Union – A comparative analysis — Link
∙ NL - National Coordinator for Security and Counterterrorism - https://english.nctv.nl
∙ GE — German Criminal Code (Strafgesetzbuch — StGB) — Link
∙ GE — German Code of Criminal Procedure (Strafprozeßordnung — StPO) — Link
∙ GE — German Code of Criminal Procedure - StPO, Section 100a - Telecommunications surveillance — Link
∙ GE — Law on the Federal Criminal Police Office and cooperation between the federal and state governments in criminal police matters (Federal Criminal Police Office Act - BKAG) - § 49 Covert intervention in information technology systems — Link

∙ UK — Crime, justice and law — Law and practice — Link
∙ UK — Public General Acts — Investigatory Powers Act 2016 — Link

Court Cases

∙ UNODC — Case Law Database — https://sherloc.unodc.org/cld/v3/sherloc/cldb/index.html?lng=en

∙ UNODC — Cyber Organized Crime — https://unodc.org/e4j/en/cybercrime/module-13/additional-teaching-tools.html

Americas

∙ US Cases — https://courtlistener.com/opinion
∙ US Federal Cases — https://pacer.uscourts.gov/find-case
∙ US Dod - Computer Crime and Intellectual Property Section (CCIPS) - https://justice.gov/criminal/criminal-ccips
∙ US FBI - Internet Crime Complaint Center (IC3) - https://ic3.gov
∙ Computer Crime Research Center - https://crime-research.org

European Union

∙ EUR-Lex https://eur-lex.europa.eu/homepage.html
∙ European Court of Justice https://curia.europa.eu
∙ EU Common Portal of Case Law — https://network-presidents.eu/cpcl
∙ Casetext (Thomson Reuters) - https://casetext.com
∙ Council of Europe - COE Cybercrime - https://coe.int/en/web/cybercrime
∙ Council of Europe - Octopus Cybercrime Community - Materials - https://coe.int/en/web/octopus/training

architecture

The Five, Nine, & Fourteen Eyes surveillance alliance includes the following countries:

Countries Five Eyes Nine Eyes Fourteen Eyes Other
United Kingdom ✔️ ✔️ ✔️
United States ✔️ ✔️ ✔️
Australia ✔️ ✔️ ✔️
Canada ✔️ ✔️ ✔️
New Zealand ✔️ ✔️ ✔️
Denmark ✔️ ✔️
Netherlands ✔️ ✔️
France ✔️ ✔️
Norway ✔️
Germany ✔️
Belgium ✔️
Spain ✔️
Sweden ✔️
Italy ✔️
Israel ✔️
Japan ✔️
Singapore ✔️
South Korea ✔️

"Apart from these methods of cooperation, there are a number of equally secretive bilateral and multilateral agreements in other regions of the globe – such as the Club of Berne (an intelligence-sharing arrangement among the EU intelligence services) and the Shanghai Cooperation Organizations (an affiliation among the People’s Republic of China (‘China’), India, Kazakhstan, Kyrgyzstan, Pakistan, the Russian Federation (‘Russia’), Tajikistan and Uzbekistan) – together with intelligence exchange arrangements within a group of states comprising Russia, Iraq, Iran and Syria to facilitate the fight against the Islamic State."

(Ref.: WATT, Eliza. State Sponsored Cyber Surveillance: The Right to Privacy of Communications and International Law. Edward Elgar Publishing, 2021.)


2.03 Liability for Contents

TorrentFreak

https://torrentfreak.com
https://torrentfreak.com/category/lawsuits
https://torrentfreak.com/category/law-politics

TorrentFreak - Newsletter

https://torrentfreak.com/subscriptions
https://t.me/torrentfreaks
https://defcon.social/@torrentfreak
https://torrentfreak.com/feed

Where are torrents permitted? (2024)

World map with torrenting countries
2.04 Tor Fingerprint

Tor Fingerprint

• TOR Fingerprinting — https://blog.torproject.org/browser-fingerprinting-introduction-and-challenges-ahead
• Attacks on Tor — https://github.com/Attacks-on-Tor/Attacks-on-Tor
• EFF Test — https://coveryourtracks.eff.org/learn


2.05 Forensics Footprints

Forensics Footprints

https://github.com/PaulNorman01/Forensia


2.06 Supply Chain Attack

Supply Chain Attack

https://reproducible-builds.org
https://github.com/SAP/risk-explorer-for-software-supply-chains
https://github.com/ossillate-inc/packj


2.07 APT & Cybercriminal Campagin Collections

APT & Cybercriminal Campagin Collections

https://attack.mitre.org/groups
https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections


2.08 Man In The Middle (MitM)

Man In The Middle (MitM)

https://github.com/frostbits-security/MITM-cheatsheet
https://github.com/mitmproxy/mitmproxy
https://mitmproxy.org
https://github.com/andreafortuna/MITMInjector
https://github.com/KoreLogicSecurity/wmkick
https://github.com/jakev/mitm-helper-wifi
https://github.com/jakev/mitm-helper-vpn


2.09 Network Analysis (SIGINT)

Network Analysis

• Snort — https://github.com/snort3
• Wireshark — https://wireshark.org
• NMAP — https://nmap.org

Live System Based

Security Onion

Network Security Toolkit


2.10 Metadata

Metadata

∙ ExifTool — https://github.com/exiftool/exiftool
∙ PhotoDNA — https://anishathalye.com/inverting-photodna
∙ Geo-tags — https://tool.geoimgr.com


2.11 Reverse Engineering

Reverse Engineering

https://github.com/alphaSeclab/awesome-reverse-engineering

Ghidra

https://ghidra-sre.org


2.12 Social Engineeringg

Social Engineering



${\color{Yellow}\textbf{PHONE SNIFFING}}$

• DEFCON Safe Mode - Cooper Quintin - Detecting Fake 4G Base Stations in Real-Time https://youtube.com/watch?v=siCk4pGGcqA
• SRLabs - Warn you about threats like fake base stations (IMSI Catchers)
https://github.com/srlabs/snoopsnitch
• Android IMSI-Catcher Detector (suspended)
https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector
• Telecom Exploits - Signalling System 7 (SS7)
https://github.com/SigPloiter/SigPloit
• Telecom Exploits - HLR Lookups
https://github.com/SigPloiter/HLR-Lookups

Phone Surveillance Exposed
NAME MEANING
IMEI International Mobile Equipment Identity
IMSI International Mobile Subscriber Identity
MCC Mobile Country Code
MNC Mobile Network Code
MSIN Mobile Subscription Identification Number
ICCID Integrated Circuit Card Identifier
MSID Mobile Station ID
GSM Global System for Mobile Communications
SIM Card Subscriber Identity Module Card
SMS Short Message/Messaging Service
SDR Software-Defined Radio

Useful Websites

— OpenCellID — Link
— Cell Tower Locator (Cell2GPS) — Link
— Cell Phone Trackers — Link
— International Numbering Plans — Link
— GSM World Coverage Map and GSM Country List — Link
— Imei Info — https://imei.info
— GSMArena Phones Ref.- https://gsmarena.com
— Phonescoop Phones Ref.- https://phonescoop.com
— Cell Towers — https://opencellid.org

Information & Explanations

— IMSI-catcher — Link
— GSM frequency bands — Link
— List of software-defined radios — Link

Useful Apps

— Mobile Software
— AIMSICD — Link
— SnoopSnitch — Link
— Desktop Software
— GsmEvil 2 — Link
— IMSI-catcher — Link

Equipment

GSM 900 / GSM 1800 MHz are used in most parts of the world: Europe, Asia, Australia, Middle East, Africa.
GSM 850 / GSM 1900 MHz are used in the United States, Canada, Mexico and most countries of S. America.

— SDR
— RTL-SDR (65MHz-2.3GHz) — Link
— Antenna
— Antenna — Link

Equipment

— Catching IMSI Catchers — Link

GSM Sniffing Install/Setup Guide

Install

$ sudo apt install python3-numpy python3-scipy python3-scapy gr-gsm
$ git clone https://github.com/Oros42/IMSI-catcher && cd IMSI-catcher
$ sudo grgsm_livemon && python3 simple_IMSI-catcher.py --sniff

GSM Install Error? Try this!

$ sudo apt-get install -y \
cmake \
autoconf \
libtool \
pkg-config \
build-essential \
docutils \
libcppunit-dev \
swig \
doxygen \
liblog4cpp5-dev \
gnuradio-dev \
gr-osmosdr \
libosmocore-dev \
liborc-0.4-dev \
swig

$ gnuradio-config-info -v

Tips

$ sudo grgsm_scanner -l  # List your SDR connected.
$ sudo grgsm_scanner     # Scan for cell towers near you.
$ sudo grgsm_livemon     # Live radio scanning.


${\color{Green}\textbf{BRUTE FORCE ATTACKS}}$

Brute Force Attacks

The speed at which your password is cracked depends on the entropy of your password and the power of the computer.

Computer programs used for brute force attacks can check anywhere from 10,000 to 1 billion passwords per second. A Pentium 100 can try 10.000 passwords a second. A supercomputer can try 1.000.000.000 per second.

Complex sheet:

Simplified sheet:

Types of brute force attacks

Simple Brute Force Attack

The attacker relies on trying out commonly used, weak passwords such as 123456, qwerty, admin, changeme, qazwsxedc etc.

Dictionary attack

Software that can make thousands of guesses every second using dictionary databases, hence the name of the attack.

Hybrid Brute Force Attack

A hybrid attack is utilized once the attacker already knows the username of its prey.

Reverse Brute Force Attack

A reverse brute force attack requires the attacker to know the password beforehand and then attempt to guess the username.

Credential stuffing

Hackers can get entire databases of stolen login credentials and then try to apply them to the account they’re trying to access. This kind of attack can be especially devastating if the attacked user reuses passwords across multiple accounts.

Rainbow Table Attack

A rainbow table attack is a method of password cracking that employs rainbow tables to break the password hashes in a database. Websites or apps don’t store passwords in plain text; instead, they encrypt passwords with hashes. Once the password is used for logging in, it is immediately converted to a hash. The next time the user logs in using their passwords, the server checks whether the password matches the previously created hash. If the two hashes match, the user is then authenticated. The tables used to store password hashes are known as rainbow tables.

Multi Factor Authenticator (MFA) or Two-factor Authenticator (2FA)

Set up MFA whenever possible, It's an extra layer of security that requires additional steps to verify the user's identity.

Encryption workarounds:

  1. Find the key.
  2. Guess the key.
  3. Compel the key.
  4. Exploit a flaw in the encryption software.
  5. Access plaintext while the device is in use.
  6. Locate another plaintext copy.


Forensic Publications

Make a Google Scholar search on an interesting subject you want to follow up on.

Search parameters example:

police hacking intext:illegal intext:abusive intext:law

You could set keyword alerts: Google Scholar Alerts


Open Access Journals

Non-Profit Research Initiatives


Forensic Science Journals and Publications


Sites of Interest

Law Publications

German Law Research

Law and Technology Research

Journals and Publications
Research Centers and Institutes
Organizations and Resources

Others

Criminology and Security Journals
Security and Cybercrime Resources

Libraries

Libraries

Fahrenheit 451

Take care with scams!

Take care with scams!

Take care with scams!

General Libraries

Book Search Engines

Computer and Programmer Resources

Scientific Journals/Technical Manuals

Audio Books

Other Resources


Activism, Nonprofit Initiatives and Private Initiatives

Intelligence, Conflict and Warfare Publications

Intelligence, Conflict, and Warfare Publications

English-Language Materials from Specific Countries


YouTube Conferences

Digital Forensics and Incident Response:

Security Conferences:

General Tech Conferences:

Miscellaneous Tech and Cybersecurity:


References

Back to Top ⬆