12 - Email and Social Media Investigations

Class: CYBR-405


Notes:

Objectives

Explain Explain the role of e-mail in investigations
Describe Describe client and server roles in e-mail
Describe Describe tasks in investigating e-mail crimes and violations
Explain Explain the use of e-mail server logs
Describe Describe some specialized e-mail forensics tools
Explain Explain how to apply digital forensics methods to investigating social media communications

Notes:

Let's quickly talk about passwords

Password Attacks

Basic

More Sophisticated

No. Passwords MD5 Hash SHA1 Hash
1 123456 e10adc3949ba59abbe56e057f20f883e 7c4a8d09ca3762af61e59520943dc26494f8941b
2 password 5f4dcc3b5aa765d61d8327deb882cf99 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8
3 12345678 25d55ad283aa400af464c76d713c07ad 7c222fb2927d828af22f592134e8932480637c0d
4 qwerty d8578edf8458ce06fbc5bb76a58c5ca4 b1b3773a05c0ed0176787a4f1574ff0075f7521e
5 123456789 25f9e794323b453885f5181f1b624d0b f7c3bc1d808e04732adf679965ccc34ca7ae3441

Hacking the mind is easier than hacking a computer

Notes:

Taking down a company

Notes:

Why is Social Engineering So Dangerous

  1. We are social creatures! We want to be helpful, therefore, you are more than capable of being easily fooled.
  2. Trust! There is no level of trust to avoid conflict.
  3. Information that you view as meaningless, we view as another piece to the puzzle.
  4. Look nice, dress nice and talk nice are valued techniques used to dupe you daily.

There are several methods social engineers use to get people to do things they wouldn't ordinarily do... pretexting

Notes:

Psychological Backdoor

We are all equipped with Psychological backdoors or triggers that are easily taken advantage of by social engineering.

Psychological Backdoor #1 - Because

Psychological Backdoor #2 - Liking

Psychological Backdoor #3 - Confidence

Psychological Backdoor #4 - Just Ask

Exploring the Role of E-mail in Investigations

An increase in e-mail scams and fraud attempts with phishing or spoofing

Phishing e-mails, text, or calls made with the intent to defraud.

Pharming - DNS poisoning takes user to a fake site

Business Email Compromise (BEC)

image-33.png433x190

Sample BEC email

image-5.png432x379

Actual Pharming Attack

image-6.png586

Snail Mail

image-7.png584

Notes:

Exploring the Roles of the Client and Server in E-mail

Name conventions

Tracing corporate e-mails is easier

Many companies are migrating their e-mail services to the cloud

Notes:

How does email know where to go?

Notes:

Investigating E-mail Crimes and Violations

Similar to other types of investigations
Goals

E-mail crimes depend on the city, state, or country

Notes:

Examining E-mail Messages

Access victim's computer or mobile device to recover the evidence
Using the victim's e-mail client

Copying an e-mail message

Investigators should learn how to find e-mail headers

View headers in Outlook

image-8.png513

Headers contain useful information

...

Intelligence Sources

What is OSINT

OSINT is defined as "intelligence produced by collecting, evaluating and analyzing publicly available information with the purpose of answering a specific intelligence question".

Notes:

The Dark Web

image-9.png

OSINT Data Sources

Likes

In 2015, researchers from the University of Cambridge and Stanford University released a study illustrating how Facebook like data can be used to accurately predict a user's personality traits in a very powerful way. Back in 2007, researchers created an online personality test and posted it on Facebook. To take the test, users needed to give the researchers access to their Facebook data. The test went viral and over 80,000 people took the test and provided access. This meant researchers had not only the results of the personality tests, but also access to a vast amount of Facebook data.

The study eventually concluded that with just 10 likes, the algorithm would know you better than a work colleague. With 150 likes, it would know you better than members of your immediate family, and with just 300 likes, it would know you better than your spouse.

Notes:

Types of Search Engines

All crawler based search engines use a crawler or bot or spider for crawling and indexing new content to the search database. There are four basic steps, every crawler based search engines follow before displaying any sites in the search results.

Google Dorking

A term for leveraging specific "operators" in Google to find specific things faster or at all

Some operators:

Notes:

Username Enumeration

Reverse Image Searching

Sites:

Sherlock - usernames

image-10.png

Glo Avery case

Platform Usernames Alias URL Notes
Telegram gloavery https://t.me/ Glo's Candi Shop, suspected narcotics distributor profile
Tik Tok gloavery https://www.tiktok.com/ Subjects TikTok, Identifiable Videos with subjects confirmed location in College Station.
Instagram glo.avery https://www.instagram.com/ Subjects private instagram account. Confirmed match
SnapChat Classiccandi https://www.snapchat.com/add/ The subject has 2 identical SnapChat accounts with matching avatars, both private.
SnapChat gloavery https://www.snapchat.com/add/
Facebook candice.classic Candice ClassicLethbridge https://www.facebook.com/ This account is suspected to be in relation to the subject (family member, probable mother). Note* the Subject and the women in this profile have extremely similar facial features.

Notes: