+ All Categories
Home > Documents > ASCL Certified Cyber Crime Investigator

ASCL Certified Cyber Crime Investigator

Date post: 04-Jan-2017
Category:
Upload: vokien
View: 220 times
Download: 0 times
Share this document with a friend
26
ASCL Certified Cyber Crime Investigator CCI+
Transcript
Page 1: ASCL Certified Cyber Crime Investigator

ASCLCertifiedCyberCrimeInvestigator

CCI+

Page 2: ASCL Certified Cyber Crime Investigator

2

Weliveinaworldwhereeverythingseemstobegettinghacked-notjustlaptops,smartphones&websitesbutalsocars,aeroplanes,ships,drones,selfaimingrifles,ships,CCTVcameras,medicaldevices,

bitcoinwallets,smart-watchesandmore...

Page 3: ASCL Certified Cyber Crime Investigator

3

TableofContents1.Introduction.....................................................................................................................................42.TheCCI+program..........................................................................................................................53.CCI+Modules...................................................................................................................................74.ModesoftheCCI+Program.......................................................................................................95.CCI+Activities...............................................................................................................................106.ASCLDigitalLearningPlatform.............................................................................................127.GradingSystem.............................................................................................................................148.AboutAsianSchoolofCyberLaws.......................................................................................159.ContactUs.......................................................................................................................................16Annexure1:SkillsofaCyberCrimeInvestigator...............................................................17Annexure2:DetailsoftheCCI+modules...............................................................................18

Page 4: ASCL Certified Cyber Crime Investigator

4

1.IntroductionThefaceofhackingandcybercrimeischangingbytheday.Inthe“goodolddays”,themotivebehindcyberattackswasapparent–money,espionageorpolitics.ButattackstargetingSonyPicturesEntertainment,theHackingTeamandAshleyMadisondonotshowsuchamotive.HackingTeamisanItaliancompanythatsells"offensiveintrusion&surveillancecapabilities"and"remotecontrolsystems"thatenablegovernmentsandcorporationstomonitorthecommunicationsofinternetusers,deciphertheirencryptedfilesandemails,recordSkypeandotherVOIPcommunications,andremotelyactivatemicrophonesandcameraontargetcomputers.InJuly2015,theHackingTeamsystemswerebreachedand400GBofdata-internale-mails,invoices,andsourcecode-wereleakedtotheworld.InNovember2014,GuardiansofPeace,ahackergroup,breachedthesystemsoffilmstudioSonyPicturesEntertainmentandleakedgigabytesofdataincludingpersonalinformationaboutSonyPicturesemployeesandtheirfamilies,emailsbetweenemployees,informationaboutexecutivesalariesatthecompanyandcopiesofunreleasedSonyfilms.Thereasonbehindtheattack?SonydidnotdropitsfilmTheInterview,acomedyaboutaplottoassassinateNorthKoreanleaderKimJong-un.AshleyMadisonisacommercialwebsitethatenabledextramaritalaffairs.Itstagline–“Lifeisshort.Haveanaffair”.InJuly2015,TheImpactTeamhackedintotheAshleyMadisonsystemsandleakedgigabytesofdata,includinguserdetails.Thereasonbehindtheattack?AshleyMadison’spolicyofnotdeletingusers'personalinformation–includingrealnames,homeaddresses,searchhistoryandcreditcardtransactionrecords.ThebreachandsubsequentdataleakagehasbeenlinkedtosuicidesofsomeAshleyMadisonusers.ThelatestcyberattackstograbglobalheadlinesinvolvehackingtheInternetofThings-Airplanes,ATMmachines,Babymonitors,Biometricdevices,Bitcoinwallets,Cars,CCTVcameras,Drones,Gamingconsoles,Healthtrackers,Medicaldevices,Powerplants,Selfaimingrifles,Smart-watches,Smartphones&more.Inahighlypublicisedevent,twosecurityresearchers“hacked”aJeepCherokeeremotely,usingthecar'sentertainmentsystem,whichconnectedtothemobiledatanetwork.ThisledtoFiatChryslerrecalling1.4millionvehiclesintheUS.TheInternetisincreasinglybeingusedbycriminalorganizations.OneofthemostinfamousexamplesisSilkRoad-anonlineblackmarketbestknownforsellingillegaldrugs.Sinceitoperatedasa“Torhiddenservice”,onlineuserswereabletobrowseitanonymously.SilkRoadisbelievedtohavegeneratedrevenuesofoverabilliondollarsbyfacilitatingtransactionsindrugs,stolencreditcarddetailsandevenmurder-for-hire!SilkRoadfounderRossWilliamUlbrichtwasprosecutedandin2015sentencedtolifeinprisonwithoutpossibilityofparole.

Page 5: ASCL Certified Cyber Crime Investigator

5

2.TheCCI+programTheASCLCertifiedCyberCrimeInvestigatorcoursepreparesyoutohandlecasesinvolvingdigitalevidenceandcybertrails.CyberCrimeInvestigatorsareanintegralpartof

ü InformationSecurityteams,ü IncidentResponseteams,ü FraudControlteams.

Theseteamsarecrucialin:

• eCommercecompanies,• auditfirms,• banks,• ITcompanies,• Governmentagenciesand• manufacturers

CyberCrimeInvestigatorsarealsorequiredby:

• police,• enforcementand• militaryagencies

EligibilityGraduateinanydiscipline.CoursewareCourseware&referencematerialisprovidedinprintedandelectronicform.MentorsupportEachstudentisallottedamentorforguidancethroughthecourse.RealWorldCaseStudiesThecoursefeaturesseveralrealworldcasestudiesandsimulations.

Page 6: ASCL Certified Cyber Crime Investigator

6

TheWildlifeCrimeControlBureau,NewDelhirecentlyannouncedvacancyforacybercrimespecialist.Thejobprofileincludes“webpatrollingfordetectionof

scheduledwildlifearticlesonsaleonInternet”.

Page 7: ASCL Certified Cyber Crime Investigator

7

3.CCI+Modules

1. CyberCrime-GlobalScenario

2. WebTechnologies

3. WebProgramming

4. WebHacking&Investigation

5. SuspectInterviewing

6. Documentation&LegalIssues

7. Phishing

8. VirtualPaymentSystems

9. InvestigatingFinancialCrimes

10. ForensicAccounting

11. FraudInvestigation

12. BitcoinForensics

13. Malware

14. DarkWeb

15. EmailInvestigation

16. InvestigatingServerLogs

17. BrowserForensics

18. Socialmediaforensics

19. Googleecosystem&forensics

20. ForensicTechnologies

21. CyberSecurityFundamentals

22. Cryptography&Steganography

23. PasswordForensics

24. RealWorldCaseStudies

Page 8: ASCL Certified Cyber Crime Investigator

8

TheASCLCertifiedCyberCrimeInvestigatorprogramwaslaunchedinFebruary2002.Inthelast14yearsithas

beencompletedby1000sofparticipants.

TheseincludePoliceOfficers,Lawyers,ITprofessionals,Charteredaccountants,CompanySecretaries,

Tax&otherGovernmentofficials,Militarypersonnel,ManagementProfessionals,CommerceGraduatesandstudents.

Page 9: ASCL Certified Cyber Crime Investigator

9

4.ModesoftheCCI+ProgramCustombatchesavailableonlyforcorporates,policedepartmentsandcolleges.

Page 10: ASCL Certified Cyber Crime Investigator

10

5.CCI+ActivitiesThiscourseisdividedinto24modules.Eachmodulefeaturesmultipleactivities,whichcouldbe:

o ASCLCaseFiles

o Bestpractices

o BookExtracts

o CaseStudies

o Checklists

o COINresource

o Documents

o eBooks

o Forms

o Guidelines

o Handbooks

o Presentations

o ResearchReports

o ResourceGuides

o SpecialReports

o StandardOperatingProcedures

o Templates

o Videos

o Worksheets

Page 11: ASCL Certified Cyber Crime Investigator

11

CollaborativeOnlineInvestigationNetwork(COIN)isaninteractiveplatformempoweringtheworld'senforcementagencies

totacklecybercrime&othercasesinvolvingdigitalevidence.

CCI+studentsgeta1-yearLevel3COINmembership(valuedatRs.12,000).

Page 12: ASCL Certified Cyber Crime Investigator

12

6.ASCLDigitalLearningPlatform

Viewthemodules,totalactivitiesandcompletedactivitiesinthedashboard.

Page 13: ASCL Certified Cyber Crime Investigator

13

ActivitiesmarkedasCompletedbyyoushowingreen.

ActivitiesnotmarkedasCompletedbyyoushowinblue.

Viewyourprogressineachmodule.

Page 14: ASCL Certified Cyber Crime Investigator

14

7.GradingSystemThegradingsystemforcasestudies,researchprojectandpresentation:GradeA

Excellentperformanceinmasteringofthesubject.Achievementofsuperiorquality.

GradeB

Goodperformancebeyondtheusualrequirementsofthecourse.Achievementofhighquality.

GradeC

Performanceofasatisfactorynature.Achievementdemonstratinganunderstandingofthesubjectsufficientforcontinuedstudyinthediscipline.

GradeD

Minimallyacceptableperformance.Achievementdemonstratingbelowaverageunderstandingofthebasicelementsofthecourse.

GradeF

Achievementatalevelinsufficienttodemonstrateunderstandingofthebasicelementsofthecourse.

Page 15: ASCL Certified Cyber Crime Investigator

15

8.AboutAsianSchoolofCyberLawsBornin1999,AsianSchoolofCyberLawsisaglobalpioneerincyberlaw&cybercrimeinvestigation.WeworkwithGovernments,Corporates,andEnforcement&Militaryagenciesacrosstheworld.WehaveassistedtheGovernmentofIndiainframingdraftrulesandregulationsundertheInformationTechnologyAct.ASCLComputerCrime&AbuseReport(India)istheonlystudyofitskindquotedbytheUnitedNationsinitsE-commerce&DevelopmentReport(2003).WehaveconductedtrainingprogramsonCyberCrimeInvestigation,IncidentResponseandCyberForensicsforseniorGovernmentandPoliceofficialsandcorporatesponsoredprofessionalsfromMalaysia,Japan,SouthKorea,China,Singapore,Malaysia,HongKong,Mauritius,Nepal,UAE,Philippines,USA,UK,ThailandandGhana.WewerepartoftheOrganizingCommitteefortheWorldCongressonInformaticsandLawatSpain(2002),Cuba(2003)andPeru(2004).WemaintaintheGlobalCyberLawDatabase,anonlinerepositoryofcyberrelatedlawsofmajorcountriesaroundtheglobe.LawenforcementpersonnelinIndiaandabroadextensivelyuseourCyberCrimeInvestigationManual.Thiswasoneofthefirstofitskindmanualsintheworld.TimesofIndia(theworld'slargestsellingEnglishnewspaper)hasreferredtoitasabibleforCyberCrimeInvestigators.WehaveconductedtrainingprogramsforvariousnationallevelGovernmentbodiesincludingNationalAcademyofDirectTaxes,NationalPoliceAcademy,NationalInstituteofBankManagement,NationalInsuranceAcademy,VaikunthMehtaNationalInstituteofCooperativeManagementandSecurities&ExchangeBoardofIndia(SEBI).WehaveassistedtheIndianArmy,variousbranchesoftheIndianpoliceandtheCentralBureauofInvestigationinmattersrelatingtocyberinvestigation.In2015,weco-organizedthec4ConferenceonCyberCrimeControl,2015alongwiththeHomeDepartment,Govt.ofMaharashtra,MumbaiPoliceandIITBombay.ThisconferencewasinauguratedbytheHon’bleChiefMinisterofMaharashtraon27thJuly,2015.WehavebuilttheCollaborativeOnlineInvestigationNetwork(COIN)-aninteractiveplatformempoweringtheworld'senforcementagenciestotacklecybercrime&othercasesinvolvingdigitalevidence.COINwaslaunchedbyShriDevendraFadnavis,Hon'bleChiefMinisterofMaharashtraon27thJuly,2015atthec4ConferenceonCyberCrimeControl,2015atMumbai.

Page 16: ASCL Certified Cyber Crime Investigator

16

9.ContactUsAsianSchoolofCyberLaws,#410,SupremeHeadquarters,Mumbai-BangaloreHighway,NearAudiShowroom,Baner,Pune-411045(INDIA)Phone:(91)9225548601Phone:(91)9225548602Email:[email protected]:www.asianlaws.org

Page 17: ASCL Certified Cyber Crime Investigator

17

Annexure1:SkillsofaCyberCrimeInvestigatorEssentialskillsforacybercrimeinvestigator:

1. BasicWebProgrammingskills.

2. WorkingknowledgeofWebTechnologies.

3. StrongworkingknowledgeofWebHacking.

4. Effectivesuspectinterviewingskills.

5. Thoroughunderstandingofdocumentation.

6. Soundknowledgeoftherelevantlaw.

7. Practicalknowledgeofphishingtools,techniquesandcounter-measures.

8. StrongknowledgeoftheworkingofVirtualPaymentSystems.

9. Understandingoffinancialinstrumentsandconcepts.

10. Basicunderstandingofforensicaccounting.

11. PracticalknowledgeofFraudInvestigation.

12. PracticalknowledgeofinvestigatingBitcoin&othercrypto-currencies.

13. Strongunderstandingofmalwareincidentprevention&response.

14. ThoroughpracticalknowledgeoftheDarkWeb.

15. Strongpracticalknowledgeofemailinvestigation.

16. ThoroughpracticalknowledgeofServerLoganalysis.

17. Strongpracticalknowledgeofbrowserforensics.

18. ThoroughunderstandingofSocialMediaForensics.

19. ThoroughunderstandingoftheGoogleEcosystem&itsForensics.

20. Strongworkingknowledgeofforensictechnologies.

21. UnderstandingoftheISO/IEC27037standard.

22. Basicworkingknowledgeofcybersecurity.

23. WorkingknowledgeCryptography&Steganography.

24. Strongpracticalknowledgeofpasswordrecovery&forensics.

25. Updatedknowledgeofthelatestcyberattacksaroundtheworld.

TheCCI+courseensuresthatyoudeveloptheseskills.

Page 18: ASCL Certified Cyber Crime Investigator

18

Annexure2:DetailsoftheCCI+modules1.CyberCrime-GlobalScenarioItissaidthatthosewhodonotlearnfromhistoryarecondemnedtorepeatit.Thismoduletracesthemajorcyberattacksincludingthe2007cyberattacksonEstonia,2010cyberattacksonMyanmar,2010Japan-SouthKoreacyberwarfare,2013Singaporecyberattacks,cyberattacksduringtheRusso-GeorgianWartheSonyPicturesEntertainmenthackandmore.ThemodulealsoexaminesconceptsofAdvancedpersistentthreats,Cyberattack,Cyber-collection,Cyberterrorism,Cyberwarfare,Hacktivism,InformationOperationsCondition,cyberattackthreattrends,Network-centricwarfare,NetworkedswarmingwarfareandWebbrigades.Thismodulealsoprofilesorganizations&groupslikeAnonymous,ChaosComputerClub,CultoftheDeadCow,DataInterceptTechnologyUnit,HackingTeam,L0pht,LegionofDoom,LulzSec,MastersofDeception,Milw0rm,PLAUnit61398,Room641A,SyrianElectronicArmy,TailoredAccessOperationsandUnit8200.CyberCrime-GlobalScenarioalsolooksintothekeydevelopments,changesandemergingthreatsincybercrimefromaEuropeanperspective.ThemoduleconcludeswithalookattheevolutionofRussian-speakingCyberMarketinthePost-SovietEraandthemobilecybercriminalundergroundmarketinChina.2.WebProgrammingFromthe1990supto2010,acybercrimeinvestigator’sjobrevolvedheavilyarounddiskandnetworkforensics.Thelastseveralyearshaveseenahugesurgeinecommerceandsmartphoneusage.Andwherethemoneygoes,crimefollows.Themassiveincreaseinwebhackinghasmadeitnecessaryforacybercrimeinvestigatortounderstandthebasicsofwebprogramming–HTML,PHPandMySQL.HTML(HypertextMarkupLanguage)isthelanguageusingwhichmostwebpagesarecreated.AllInternetbrowsersarecapableofunderstandingHTMLcommands.PHPisaverypopular,powerfulandeasytousescriptinglanguage.SomeofthebiggestwebsitesintheworldrunonPHP.MySQListheworld’smostpopularopen-sourcedatabaseanditpowerssomeofthemostpopularwebsitesintheworld.ThismodulecoverswebprogrammingandintroducesstudentstoXAMPP-themostpopularPHPdevelopmentenvironment.XAMPPisfree,availableforWindows,LinuxorMacandmakesiteasytoruninteractivewebsitesonyourlaptop.

Page 19: ASCL Certified Cyber Crime Investigator

19

Thismodulealsoexaminesreal-worldcodes–includingaveryinsecureloginsystem(withnoinputsanitization)andanotsoinsecureloginsystem(withsomeinputsanitization).Thishelpsstudentsunderstandtheprogrammingerrorsthatleadtowebsitesgettinghacked.3.WebTechnologiesConsideringthemagnitudeandimpactofwebattacks,itisnecessaryforacybercrimeinvestigatortounderstandsomeofthetechnologiesthatruntheInternetandtheWorldWideWeb.ThismodulebeginswithbasicconceptssuchasIPaddresses,theDomainNameSystemandwebsitecreation&hosting.Themodulemovesontopracticalactivitiesincludinghostingadomain,creatingSFTPusers,settingupcustomMXrecords,settingup,configuring&administeringprivateemailaccounts,MySQLdatabasesandVirtualPrivateServers.ThemodulealsocoversconfiguringSSLforsecurewebsites.Themodulethenmovesontoinstalling,configuring&deployingWordPress-thepopularopen-sourcewebsoftwareusedtocreatewebsites,blogs,andapps.Themodulealsocoversinstalling,configuring&deployingZenCart-afree,user-friendly,opensourceshoppingcartsoftware.TheWebTechnologiesmodulealsoteachesstudentshowtodeploycloudinfrastructure.4.WebHacking&InvestigationSinceamajorityofcybercrimecasesinvolveweb-hackingorweb-attacks,itisessentialforcybercrimeinvestigatorstohaveastrongknowledgeofthetechniquesandtoolsofwebhacking.ThemoduleonWebHacking&InvestigationfocusesprimarilyonsimulatedcasestudiesadaptedfromactualcasesinvestigatedbytheAsianSchoolofCyberLawsteam.TheseASCLCaseFilesrelatetocasesinvolvingFootprinting,BypassingAuthorizationSchema,SQLinjection,CrossSiteScripting(XSS),BrokenAuthentication,SessionHijacking,UnvalidatedRedirects&Forwards,andCrossSiteRequestForgery(CSRF).ThemodulealsocoverstheOWASPTestingGuide-anauthoritativeresourceforWebApplicationSecurityTesting.Thismodulealsolooksatsomeonlinetoolsfordomainandwebanalysis.

Page 20: ASCL Certified Cyber Crime Investigator

20

5.SuspectInterviewingEffectivesuspectinterviewingisanessentialskillforcybercrimeinvestigators.Thismodulebeginswiththedifferencebetweenaninterrogationandaninterview.Itmovesontopreparingforandconductingasuspectinterview.Themodulealsoteachesstudentshowtodetectdeception,documentaninterviewandgetanadmissionfromasuspect.ThemodulealsointroducesstudentstotheUSFBI’sinterviewprotocoltoassistthemindocumentingthecriticalissuesregardingasuspect'sstateofmindatthetimeoftheoffenseandtheconfession.Themodulealsoteachesstudentshowtoconductaninquiryinanorganisation.6.Documentation&LegalIssuesEventhebestinvestigationisworthlessifitisnotsupportedbyaccurateandrelevantdocumentationmadeincompliancewiththelaw.Thismodulecoverscomputerevidenceassessment&digitalforensicdocumentationissuesaswellastherelevantlegalissuesinIndia(usingtheCOINSectionFinder).Itcoversthe7formsprovidedbytheNationalCrimeRecordsBureau,India(includingFirstInformationReport)ItalsoprovidessampleDigitalForensicsAnalysisReport,RequestforServiceForms,Worksheets,ConsenttoSearch.ThemodulealsofeaturesSWGDEBestPracticesforComputerForensics&MobilePhoneForensicsandModelStandardOperationProceduresforComputerForensics.7.PhishingPhishingisoneofthemostpopulartechniquesamongsthackersandfinancialcybercriminals.Thismakesitimportantforacybercrimeinvestigatortounderstandphishingtools,techniquesandcounter-measures.ThismodulebeginswiththevarioustypesofphishingsuchasClonePhishing,SpearPhishing,PhonePhishing,Pharming,Phishingwithmalware&more.ThemodulethenmovesontoPhishingtechniquessuchasEmailSpoofing,WebSpoofing,DNScachepoisoningandDomainhijacking.ThemodulealsocoversPhishingcountermeasuressuchasSenderPolicyFrameworkandDomainKeysIdentifiedMail.

Page 21: ASCL Certified Cyber Crime Investigator

21

8.VirtualPaymentSystemsVirtualPaymentSystemshavetakentheglobalmoneymarketsbystorm.Acybercrimeinvestigatormusthaveastrongunderstandingofhowthesesystemswork.Thismodulecovers30+conceptsincludingAlternativePayments,AutomatedClearingHouse,CreditCards,Cryptocurrency,DebitCards,DigitalCurrency,DigitalWallets,ElectronicFundTransfer,PaymentGateways,RTGS,SWIFT,StoredValueCardsandmore.ThemodulealsocoversATMCardSkimming&PINCapturingandBestPracticesforPreventingCardTrapping.9.InvestigatingFinancialCrimesFinancialcrimesaresomeofthemostinterestingcasesthatcybercrimeinvestigatorsarecalledupontosolve.Thismodulebeginswithfinancialinstrumentssuchasshares,debtinstruments,derivatives,futures,hedging,options,swaps,depositoryreceiptsandmore.Thismodulethenmovesontomorethan30typesoffinancialcrimeincludingadvance-feescam,bankfrauds&carding,chargebackfraud,checkwashing,checkfraud,creditcardfraud,identitytheft,insidertrading,insurancefraud,mortgagefraud,ponzischemes,securitiesfraud,skimming,wirelessidentitytheftandmore.ThismodulecoverscasestudiesinFinancialCrimeincludingtheEnronscandal,FodderScam,Guinnessshare-tradingfraud,HarshadMehta's1992securitiesscam,MadoffinvestmentscandalandtheSatyamscandal.10.ForensicAccountingForensicAccountantsarecalleduponincasesinvolvingeconomicdamagescalculations,bankruptcy,securitiesfraud,taxfraud,moneylaundering,businessvaluationande-discovery.Itisimportantforacybercrimeinvestigatortohaveabasicunderstandingofforensicaccounting.Thismodulebeginswithmorethan40financialconceptslikebalancesheets,bookvalue,cashflowstatement,assets&liabilities,depreciation,EBIT,EBITDA,goodwill,trialbalanceandmore.Thismodulealsocoversconceptslikebanksecrecy,bankinginSwitzerland,Benford'slaw,dataanalysistechniquesforfrauddetection,moneylaundering,offshorebanking,shellcorporations&more.

Page 22: ASCL Certified Cyber Crime Investigator

22

11.FraudInvestigationManytimesacybercrimeinvestigatoriscalledupontohandlefraudinvestigations.Thismoduleusescasestudies&checkliststoexplainFraud(itsextent,patternsandcauses),FraudRiskAssessment&Management,FraudPrevention,Detection&Reporting,Themodulealsodiscussesinternalcontrols,PublicInterestDisclosures,MethodsofBriberyandBriberyRiskAssessment.ThemodulealsocoverstheForeignCorruptPracticesAct(FCPA),aUSlawforcombatingcorruptionaroundtheglobeandtheUKBriberyActwhichcreatesoffencesofofferingorreceivingbribes,briberyofforeignpublicofficialsandoffailuretopreventabribebeingpaidonanorganisation'sbehalf.12.BitcoinForensicsBitcoinis,withoutdoubt,themostfamouscrypto-currency.ItgainedalotofnotorietyduringthecrackdownonSilkRoad,anundergroundonlinemarketplacetradingindrugs,stolenfinancialinformation,weapons&more.Consideringtheuseofbitcoin(andothercryptocurrencies)bycriminals,astrongunderstandingofbitcoinforensicsisessentialforcybercrimeinvestigators.ThismodulestartswithatechnicalanalysisofthearchitectureandoperationoftheBitcoindigitalcurrency.Itthenmovesontoblockchain.infowhichcanbeusedforviewingthelatestbitcointransactions,mostpopularaddressesandmore.ThenextpracticalfocusesonusingBitIodinetofindtransactionsbetweentwoaddressesortwoclusters,address-to-clusterandcluster-to-address,gettingalistofaddressesthatsent/receivedBitcointo/fromaparticularaddressandvisualizingclusterscontrolledbythesameuserorentity,filteringbyamountandtime.Themodulealsolooksatvirtualcurrenciesfromananti-moneylaunderingand“counteringthefinancingofterrorism”pointofview.13.MalwareThismoduleexploresmorethan40malwarerelatedtermsandconceptsincludingadware,backdoor,blendedthreats,browserhijacking,chargeware,codeinjection,computerworms,crimeware,formgrabbing,logicbomb,malvertising,mobilecode,polymorphiccode,roguesecuritysoftware,rootkit,spyware,zerodayandmore.

Page 23: ASCL Certified Cyber Crime Investigator

23

Themodulealsofocusesonmalwareincidentpreventionandmalwareincidentresponse.Thismodulealsodiscussessomeonlinetoolsformalwareanalysis.14.DarkWebTheWorldWideWebthatthevastmajorityofnetizensuseisalsoreferredtoastheclearnet–sinceitprimarilyisunencryptedinnature.Thenthereisthedeepweb–thepartoftheclearnet,whichisnotindexedbysearchengines.Deepwebincludesdatastoredinpassword-protectedpagesanddatabases.Thedarkwebisasmallpartofthedeepweb.Thedeepwebconsistsofdarknetsincludingpeer-to-peernetworks,Freenet,I2P,andTor.TheTordarkwebisalsocalledonionland,sinceitstopleveldomainsuffixis.onionanditusesthetrafficanonymizationtechniqueofonionrouting.Consideringthepopularityofthedarkwebamongsttheorganizedcriminalsgroups,acybercrimeinvestigatormusthaveathoroughworkingknowledgeofthedarkweb.Thismodulebeginswiththeterminologyandjargonofthedarkweb.Itthenmovesontorelevanttechnologieslikeairdrop,alternateDNSroot,anonymousp2p,anonymousremailer,B.A.T.M.A.N,bitmessage,distributedhashtables,freenet,garlicrouting,Toranditshiddenservices,shellcode,Tails,Toxandmore.TheDarkWebmodulethenmovesontodarkwebmarket-places(likeAgora,Alphabay,AssassinationMarkets,SilkRoad)andtopleveldomains(like.bit,.onionand.tor).15.EmailInvestigationDespitethepopularityofinstantmessengers(suchasWhatsapp)andsocialmedia,emailremainsoneofthemostpopularmethodsofonlinecommunicationintheworld.Thismakesitessentialforacybercrimeinvestigatortohaveastrongknowledgeofemailtracking&tracing.Thismodulebeginswiththecomponents,protocols&formatsofemailsandthenmovesontoemailheaderanalysis&emailaccounttracking.ThemodulealsofeaturesanemailcrimerelatedcasestudyfromAsianSchoolofCyberLaws.ThemodulealsocoversCommonInternetMessageHeaders,relevantCOINchecklistsandvariousonlinetoolsforemailinvestigation.

Page 24: ASCL Certified Cyber Crime Investigator

24

16.InvestigatingServerLogsInalargenumberofcybercrimecases,theinvestigationbeginswithananalysisofserverlogs.Itisessentialforacybercrimeinvestigatortohaveasoundworkingknowledgeofserverloganalysis.ThismodulebeginswithadetailedanalysisofFTPserverlogandWebserverloganalysis.ThemodulealsofeaturestwoASCLCaseFiles-CyberSabotageandWebDefacement.17.BrowserForensicsInmanycasesofcybercrime,valuableevidencecanbeobtainedfromwebbrowsers.Thismakesitimportantforacybercrimeinvestigatortohaveastrongpracticalknowledgeofbrowserforensics.Theseevidencepointsincludehistory,bookmarks,creditcardinformation&contactinformationstoredinautofill,savedpasswords,filesinthedownloadlocation.Browserforensicsalsoinvolvesanalysisofcloudprintersandotherconnecteddevices,extensions,cookiesandsitedata,locationsettingsandexceptions,mediasettings(likecameraandmicrophonepermissions)&exceptions,unsandboxedplug-inaccess&exceptions,automaticdownloadsandexceptionsandmore.ThismodulefeaturesCOINcheckpoints,info-blocksandwarningsforforensicsonthemostpopularweb-browsers-GoogleChrome,MozillaFirefoxandSafari.18.SocialmediaforensicsIt’sprobablynotincorrecttosaythatalmosteveryInternetuserispartofatleastonesocialmediaplatform.Thismakessocialmediaforensicsandessentialskillforacybercrimeinvestigator.ThismodulefeaturesCOINcheckpoints,info-blocksandwarningsforforensicsofpopularsocialmediaplatformslikeFacebook,Instagram,LinkedIn,Pinterest,Twitter,Snapchat,WeChatandTumblr.19.Googleecosystem&forensicsGoogleisn’tjustasearchengineanymore.TheGoogleecosystemisallaroundus–Gmail,YouTube,Googlegroups,Googlesites,Googleplus,Googlekeepandsomuchmore.ThismakesGoogleforensicsamusthaveskillforcybercrimeinvestigators.ThismodulefeaturesCOINcheckpoints,info-blocksandwarningsforforensicsofGoogleHistory,GoogleDashboard,GoogleBookmarks,YouTube,Locationreporting&history,GoogleCalendar,GoogleCloudPrint,GoogleDrive,GoogleSites,GoogleKeep,GoogleGroupsandGooglePlus.

Page 25: ASCL Certified Cyber Crime Investigator

25

20.ForensicTechnologiesItisessentialforacybercrimeinvestigatortohaveastrongworkingknowledgeofforensictechnologiesandcyberforensicconcepts.Thismodulebeginswitha40-minutevideoexplainingthetechnicalconceptsofcyberforensics.ThismodulealsofeaturesCOINcheckpoints,info-blocksandwarningsforcomputerforensics,phoneforensics,portableGPSforensicsandmacforensics.ThehighlightofthismoduleisthecoverageofISO/IEC27037-themostimportantglobalstandardforidentification,collection,acquisitionandpreservationofpotentialdigitalevidence.ThisisdonethroughCOINcheckpoints,info-blocksandwarnings.21.CyberSecurityAbasicworkingknowledgeofcybersecurityisessentialforeveryoneandmoresoforcybercrimeinvestigators.Thismoduleintroducesthe9aspectsofinformationsecurity.ItthenmovesontothebasicsofApplicationSecurity,CloudComputingSecurity,ComputerSecurity,CyberSecurityStandards,DataSecurity,DatabaseSecurity,InformationSecurity,InternetSecurity,MobileSecurity,andNetworkSecurity.Themodulealsocoversstrategiesofaworld-classCybersecurityOperationsCenter.22.Cryptography&SteganographyManypeopleusecryptographyandsteganography.Andtheseincludecriminalsandterrorists.Henceaworkingknowledgeoftheseisusefulforcybercrimeinvestigators.Thismoduleintroduceshowcryptographyworksanddiscussesconceptssuchaskeys,symmetriccryptography,asymmetriccryptography,hashfunctions,digitalsignaturesanddigitalsignaturecertificates.Italsolooksatpracticalissuessuchasobtainingadigitalsignaturecertificate,digitallysigningemailsanddigitallysigningworddocuments.ThismodulealsoanalysesaDigitalSignatureFraudcasefromtheASCLCaseFiles.ThismoduleintroducestheconceptofSteganographyandSteganalysisandfeatures3toolsforsteganography–Camouflage,SNOWandS-tools.

Page 26: ASCL Certified Cyber Crime Investigator

26

23.PasswordForensicsInmanycasesitisfoundthatpotentialevidenceislockedupinpasswordprotectedfiles.Thismakesitessentialforcybercrimeinvestigatorstohaveastrongpracticalknowledgeofpasswordrecovery&forensics.Thismodulefocusesonbreakingfile&operatingsystempasswordsandbreakingencryption&hashes.ThismodulediscussespasswordrecoverytechniquesincludingInstantPasswordExtraction,"Fake"PasswordCreation,ResettingthePassword,BruteForceAttack,DictionaryAttack,KnownPlainTextAttackandGuaranteedRecovery.ItalsodiscussessomeofthepopularonlineandofflinepasswordrecoverytoolsfromElcomsoft,Passwareandothers.ThismodulealsofeaturesthePasswordMeterfortestingthestrengthofpasswords.24.RealWorldCaseStudiesThisisadynamicmodulethatisprimarilydeliveredthroughcasestudiesfromtheASCLCaseFilesaswellasthrough“virtualcoffeesessions”whichdiscussthelatestcybercrimecasesfromaroundtheworld.


Recommended