Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Class notes

Hacking

Rating
-
Sold
-
Pages
39
Uploaded on
10-03-2024
Written in
2023/2024

The following techniques are proceeding by cybercrime investigation to solve the case. Step 1: The investigation is to assess the crime. You need to know what exactly happened. This is a great part to ask the rudimentary questions: ―Who, what, where, why, how, and when?‖ This will give you the opportunity to gather surface-level information that will help you prioritize your resources and time in the right direction. Step 2: After you answer all the questions you can above, you should have an idea of what tools you need to use to find the evidence. Step 3: Next, you will need to follow the proper procedure to collect the evidence. The proper procedure is usually already established by a proper investigating supervisor or department officer. Step 4: After the assessment of the evidence, you are ready to decide what it would take to commit this crime or show evidence. For example, financial crimes would require analysing email transfers, and artefact detection. Step 5: Therefore you would perform discovery to find these traces. You would also decide where on a computer or mobile device where this might be hiding and focus your tools to extract the evidence on that software or mobile app. Once you assess and collect the memory and files from a device you can move on to the next step, Evidence Examination. Step 6: As a planet-spanning network, the Internet offers criminals multiple hiding places in the real world as well as in the network itself. Step 7: However, just as individuals walking on the ground leave marks that a skilled tracker can follow, cybercriminals leave clues as to their identity and location, despite their best efforts to cover their tracks. Step 8: In order to follow such clues across national boundaries, though, international cybercrime treaties must be ratified. Step 9: Schemes to defraud abound on the Internet. Among the most famous is the or ―419,‖ scam; the number is a reference to the section of Nigerian law that the scam violates.

Show more Read less
Institution
Course

Content preview

1. INTRODUCTION

The following techniques are proceeding by cybercrime investigation to solve the case.

Step 1: The investigation is to assess the crime. You need to know what exactly happened.
This is a great part to ask the rudimentary questions: ―Who, what, where, why, how, and
when?‖ This will give you the opportunity to gather surface-level information that will help
you prioritize your resources and time in the right direction.

Step 2: After you answer all the questions you can above, you should have an idea of what
tools you need to use to find the evidence.

Step 3: Next, you will need to follow the proper procedure to collect the evidence. The
proper procedure is usually already established by a proper investigating supervisor or
department officer.

Step 4: After the assessment of the evidence, you are ready to decide what it would take to
commit this crime or show evidence. For example, financial crimes would require analysing
email transfers, and artefact detection.

Step 5: Therefore you would perform discovery to find these traces. You would also decide
where on a computer or mobile device where this might be hiding and focus your tools to
extract the evidence on that software or mobile app. Once you assess and collect the memory
and files from a device you can move on to the next step, Evidence Examination.

Step 6: As a planet-spanning network, the Internet offers criminals multiple hiding places in
the real world as well as in the network itself.

Step 7: However, just as individuals walking on the ground leave marks that a skilled tracker
can follow, cybercriminals leave clues as to their identity and location, despite their best
efforts to cover their tracks.

Step 8: In order to follow such clues across national boundaries, though, international
cybercrime treaties must be ratified.

Step 9: Schemes to defraud abound on the Internet. Among the most famous is the or ―419,‖
scam; the number is a reference to the section of Nigerian law that the scam violates.

Step 10: Although this con has been used with both fax and traditional mail, it has been given
new life by the internet. In the scheme, an individual receives an e-mail asserting that the




1

,sender requires help in transferring a large sum of money out of Nigeria or another distant
country.

Step 11: Usually, this money is in the form of an asset that is going to be sold, such as oil, or
a large amount of cash that requires ―laundering‖ to conceal its source; the variations are
endless, and new specifics are constantly being developed.

Step 12: The message asks the recipient to cover some cost of moving the funds out of the
country in return for receiving a much larger sum of money in the near future. Should the
recipient respond with a check or money order, he is told that complications have developed;
more money is required. Over time, victims can lose thousands of dollars that are utterly
unrecoverable.



Data Work Flow Diagram -



Suspect Link Scan the URL




Identify IP




Requesting to
Details IP domain




Details of
the victim




Identify the
FIR victim




2

, 2. HDFC CLONE LINK FRAUD

2.1 Nikto:

Nikto is a free software command-line vulnerability scanner that scans web servers
for dangerous files/CGIs, outdated server software and other problems. It performs generic
and server type specific checks. It also captures and prints any cookies received.

This tool is used to find the vulnerabilities available in the domain with some
template-oriented strikes, Analysis of headers of a request, crafted request and etc.

https://tinyurl.com/3kzb6s29 website only has the missing headers vulnerability.

SUSPECT CREATED LINK: (https://tinyurl.com/3kzb6s29)




Figure 2.1 Vulnerability details of website using Nikto tool




3

, 2.2 Whatweb Tool Use:

WhatWeb identifies websites. It recognises web technologies including content management
systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and
embedded devices.

WhatWeb has over 900 plugins, each to recognise something different. It also
identifies version numbers, email addresses, account IDs, web framework modules, SQL
errors, and more.




Figure 2.2 whatweb




4

Written for

Institution
Course

Document information

Uploaded on
March 10, 2024
Number of pages
39
Written in
2023/2024
Type
Class notes
Professor(s)
Andrew
Contains
All classes

Subjects

$8.69
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
mabalmabal64

Get to know the seller

Seller avatar
mabalmabal64 Bharathiar University
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
2 year
Number of followers
0
Documents
1
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions