My Forensics Save

Digital Forensics and Incident Response (DFIR)

Project README

BASIC STRATEGY

Crime Triangle Basic Investigative Metodology

• 5W: Who, What, When, Where and Why
• PDCA Cycle: Plan, Do, Check and Act
• Root Cause Analysis (RCA):

  1. Identify and describe the problem clearly
  2. Establish a timeline from the normal situation until
    the problem occurs
  3. Distinguish between the root cause and other causal
    factors (e.g., using event correlation)
  4. Establish a causal graph between the root cause
    and the problem

The criminal investigation must be protected from leaks by following a logical sequence:

  1. Exhaust the data collection and collection activity in open sources (OSINT) or closed sources (CSINT);
  2. Hidden monitoring and tracking measures;
  3. With concrete evidence of the practices investigated and exhaustion of remote possibilities, launch the operation itself with the publication of the investigation. At this stage, search and seizure warrants, temporary or preventive arrest and statements will be taken.


FORENSIC SUITES

FLOSS
Free/Libre and Open Source Software
PROPRIETARY
Cyber-surveillance Industry
• Kali Linux
https://www.kali.org
• Drive Badger
https://drivebadger.com (GitHub)
• SIFT Workstation
https://www.sans.org/tools/sift-workstation
• Parrot Security
https://www.parrotsec.org
• CAINE
https://www.caine-live.net
• CSI Linux
https://csilinux.com
• Avilla Forensics
https://github.com/AvillaDaniel/AvillaForensics
• IPED
https://github.com/sepinf-inc/IPED
• Debian Forensics Package
https://packages.debian.org/unstable/forensics-all
• Mobile Verification Toolkit (MVT)
https://docs.mvt.re/en/latest
• Tsurugi Linux
https://tsurugi-linux.org/

• REMnux
https://remnux.org

• Bitscout
https://github.com/vitaly-kamluk/bitscout

• Eric Zimmerman's tools (Freeware)
https://ericzimmerman.github.io/#!index.md
• Paladin® (Freeware)
https://sumuri.com/software/paladin/
• Forensic Toolkit (FTK)® - Lite (Freeware)
https://www.exterro.com/forensic-toolkit
• Magnet Forensic® - Mobile Extractor (Freeware)
https://www.magnetforensics.com
• Windows® Forensic Environment WinFE (Freeware)
https://www.winfe.net
• NirSoft® (Freeware)
https://www.nirsoft.net
• MiTeC® (Freeware)
https://www.mitec.cz
• Medusa Box® (Easy J-TAG)
https://medusabox.com
╰┈➤Models Features
╰┈➤Aliexpress
• Octoplus Box® (Easy J-TAG)
https://octoplusbox.com
╰┈➤Models Features
╰┈➤Aliexpress
• Cellebrite®
https://cellebrite.com
• NSO Group®
https://www.nsogroup.com
• Cognyte®
https://www.cognyte.com
• Check Point®
https://www.checkpoint.com
• Team Cymru®
https://www.team-cymru.com
• BriefCam®
https://www.briefcam.com/
• Forensic Toolkit (FTK)®
https://www.exterro.com/forensic-toolkit
• Magnet Forensic®
https://www.magnetforensics.com
• Variston®
https://variston.net
• Intellexa®
no refer
• Cytrox®
no refer
• Cy4Gate®
https://www.cy4gate.com/
• PARS Defense®
https://www.parsdefense.com
• Candiru®
https://saito.tech/
• Harpia Tech®
https://harpia.tech
• Visual Cortex®
https://visualcortex.com
• Oxygen Forensic®
https://oxygen-forensic.wedatasolution.com
• MSAB®
https://www.msab.com
• GMDSOFT®
https://www.gmdsoft.com
• Verint Systems®
https://www.verint.com
• Cyber Arm®
https://cyber-arm.com/services
• Cobalt Strike®
https://www.cobaltstrike.com
• Lumi Networks®
https://www.lumi.network
• Clear View AI®
https://www.clearview.ai
• Lockheed Martin®
https://www.lockheedmartin.com/
• MOBILedit®
https://www.mobiledit.com
• Crowd Strike®
https://www.crowdstrike.com
• Binalyze®
https://www.binalyze.com
• LexisNexis®
https://risk.lexisnexis.com
• NetQuest®
https://netquestcorp.com
• Gamma®
https://www.gamma.co.uk
• Memento Labs®
https://mem3nt0.com
• CYSource®
https://www.cysrc.com
• Maltego®
https://www.maltego.com
• Thorn's Safer®
https://www.thorn.org
Browse: https://dimse.info

FORENSIC TOOLS

• Evidence ProjectForensics Tools Catalogue

https://www.dftoolscatalogue.eu

• NIST - Forensics Tools Catalogue

https://toolcatalog.nist.gov

• S&T partners and NIST - Computer Forensic Tool Testing (CFTT)

https://www.dhs.gov/science-and-technology/nist-cftt-reports


Interesting information

• Beyond the Veil of Surveillance: Private Sector Offensive Actors (PSOAs)

• Burn, drown, or smash your phone: Forensics can extract data anyway

• How law enforcement gets around your smartphone’s encryption

• Cellphone data used to solve murder case from 2 years ago, police say

• The Stingray: How Law Enforcement Can Track Your Every Move

• Police are tracking you and your license plates

• SCOTUS: Police Need Search Warrant to Ping cell Phones

• EFF to Michigan Court: Governments Shouldn’t Be Allowed to Use a Drone to Spy on You Without a Warrant

• Motion to Suppress Aerial Surveillance Evidence in U.S. vs Muhammed Momtaz Alazhari

• Researchers Find Way to Steal Encrypted Data - NYT (2008)

• “Reverse Location Search Warrant”: A New Personal Data Hoovering Exercise Brought to You by Google (2019)

• As UN Human Rights Chief Urges Stricter Rules, Snowden Calls for End to Spyware Trade (2021)

• Forensics Journal Comparative analysis of mobile forensic proprietary tools: an application in forensic investigation (2022)



INTERCEPTION PLATFORMS

Comparison between Drive Badger (GitHub) with other lawful interception platforms. Visit: Official sheet or the PDF version in our repo. Credits for the panel: Tomasz Klim.



Exploit and Spyware Vendor

Zero-day Exploit (2023) Associated Spyware Vendor
CVE-2023-28205 and CVE-2023-28206 (Apple iOS) Variston (BridgeHead)
CVE-2023-2033 (Google Chrome) Intellexa/Cytrox (Predator)
CVE-2023-2136 (Google Chrome) Intellexa/Cytrox (Predator)
CVE-2023-32409 (Apple iOS) Variston (BridgeHead)
CVE-2023-3079 (Google Chrome) Intellexa/Cytrox (Predator)
CVE-2023-41061 and CVE-2023-41064 (Apple iOS) NSO Group (Pegasus)
CVE-2023-41991, CVE-2023-41992, and CVE-2023-41993 (Apple iOS) Intellexa/Cytrox (Predator)
CVE-2023-5217 (Google Chrome) Candiru (DevilsTongue)
CVE-2023-4211 (Arm Mali GPU) Cy4Gate (Epeius)
CVE-2023-33063 (Qualcomm Adreno GPU) Variston (BridgeHead)
CVE-2023-33106 and CVE-2023-33107 (Qualcomm Adreno GPU) Cy4Gate (Epeius)
CVE-2023-42916 and CVE-2023-42917 (Apple iOS) PARS Defense
CVE-2023-7024 (Google Chrome) NSO Group (Pegasus)


NATIONAL CYBER SECURITY AGENCIES

US — CISA
CA — Cyber
Americas — CSIRT
EU — ENISA
UK — NCSC
NL — NCSC
DE — BSI
FR — ANSSI
ES — CCN-CERT
IT — ACN
HU — NKI
CZ — NUKIB
NO — NCSC
IS — INCD
AU — Cyber
NZ — CERT
NZ — NCSC
KR — KISA
JP — Cert
JP — NISC
SG — CSA


${\color{Blue}\textbf{1.PASSIVE FORENSICS}}$

👷🛠️UNDER CONSTRUCTION🚧🏗

1.01 Forensic standards

Visit our repo tree: 2.FORENSIC

Standards

NIST — National Institute of Standards and Technology

Visit: https://www.nist.gov/standards

ISO/IEC — International Electrotechnical Commission

Visit: https://www.iso27001security.com
Official - Information security, cybersecurity and privacy protection — https://www.iso.org/standard/27001

RFC

Best Current Practices (BCP)

Standards

Informational

Experimental / Historic



1.02 Forensic certs & training

1.03 Online forensic tools

• Message Header Analyzer — https://mha.azurewebsites.net<br> • Message Header Analyzer — https://github.com/microsoft/MHA
• PhishTank — https://phishtank.org<br> • Simple Email Reputation — https://emailrep.io<br> • Have I Been Pwned — https://haveibeenpwned.com<br> • DeHashed — https://www.dehashed.com<br> • Whois — https://www.iana.org/whois
• ViewDNS — https://viewdns.info<br> • WhoisMyDNS — https://whoismydns.com<br> • NSLookup — https://www.nslookup.io<br> • My-Addr — https://my-addr.com<br> • Malpedia — https://malpedia.caad.fkie.fraunhofer.de<br> • CVE Details — https://www.cvedetails.com<br> • Exploit Database — https://www.exploit-db.com<br> • FileInfo — https://fileinfo.co<br> • xCyclopedia — https://strontic.github.io/xcyclopedia
• The Windows Binary Index — https://winbindex.m417z.com<br> • Palo Alto Applipedia — https://applipedia.paloaltonetworks.com<br> • Windows Securitiy Logs — https://www.ultimatewindowssecurity.com/securitylog/encyclopedia
• Internet Archive (WayBackMachine) - https://web.archive.org<br> • Archive web content — https://archive.ph<br> • Internet Archive — https://archive.org<br> • HTTrack — https://www.httrack.com<br> • IPVOID — https://www.ipvoid.com<br> • AbuseIPDB — https://www.abuseipdb.com<br> • Grabify IP Logger — https://grabify.link/
• IP Logger — https://iplogger.org<br> • IP Tracker — https://iplogger.org/ip-tracker
• IP location — https://www.iplocation.net<br> • Location Tracker — https://iplogger.org/location-tracker
• URL Checker — https://iplogger.org/url_checker
• MAC Address Lookup — https://iplogger.org/mac-checker
• MAC Vendor — https://macvendors.com<br> • IP API
  — ip-api — https://ip-api.com<br>   — ipify — https://www.ipify.org<br>   — ipapi — https://ipapi.co<br>   — vpnapi — https://vpnapi.io<br>   — ipapi — https://ipapi.com<br> • The ZMap Project — https://zmap.io<br> • WiGLE — https://wigle.net<br> • urlscan.io — https://urlscan.io<br> • Virus Total — https://www.virustotal.com<br> • Hybrid Analysis — https://hybrid-analysis.com<br> • AlienVault OTX — https://otx.alienvault.com<br> • IBM X-Force Exchange — https://exchange.xforce.ibmcloud.com<br> • Cisco Talos — https://talosintelligence.com/reputation_center
• Maltiverse — https://maltiverse.com/collection
• GreyNoise — https://www.greynoise.io<br> • SANS Internet Storm Center — https://isc.sans.edu<br> • Intelligence X — https://intelx.io<br> • MetaDefender Cloud — https://metadefender.opswat.com<br> • RiskIQ Community Edition — https://community.riskiq.com/home
• Pulsedive — https://pulsedive.com<br> • Valhalla YARA Rules — https://valhalla.nextron-systems.com<br> • Binvis — https://binvis.io<br> • JoeSandbox — https://www.joesandbox.com<br> • ANY.RUN — https://any.run<br> • Verexif - https://www.verexif.com/en/
• Any Run — https://app.any.run<br> • Name OSINT — https://namechk.com<br> • Reverse Shell Generator — https://www.revshells.com<br> • Rainbow Tables (Hashes) — https://hashes.com/en/decrypt/hash
• Breach Directory - https://breachdirectory.org<br> • MD5 Decrypt - https://md5decrypt.net/en/Sha1
• File Signatures ("Magic Numbers") — https://en.wikipedia.org/wiki/Magic_number_(programming)
• List of File Signatures — https://en.wikipedia.org/wiki/List_of_file_signatures
• CyberChef — https://gchq.github.io/CyberChef
• explainshell — https://explainshell.com<br> • Epoch Converter — https://www.epochconverter.com<br>

For OSINT tools visit our repository: My-OSINT


1.04 Forensic tools

Forensics Tools Catalogues

Evidence Project - https://www.dftoolscatalogue.eu

NIST - https://toolcatalog.nist.gov

S&T partners and NIST - Computer Forensic Tool Testing (CFTT) - https://www.dhs.gov/science-and-technology/nist-cftt-reports

Some tools

Image and video upscaling programs

ImageJ
Upscalers

Encryption workarounds:

  1. Find the key.
  2. Guess the key.
  3. Compel the key.
  4. Exploit a flaw in the encryption software.
  5. Access plaintext while the device is in use.
  6. Locate another plaintext copy.

Extraction Methods

Encryption:

Seize the encrypted files and decrypt them using a password or key and the appropriate decryption software.
OR
Seize the data while it is in an unencrypted state.

Virtualization: Seize the virtual image file and open it with the correct password.
OR
Log into the virtual machine and seize the data while the virtual machine is turned on and in an unencrypted state.
Relational Database: Seize all the files containing records. Obtain a copy of the database software and rebuild the database.
OR
Log into the database while it is live and employ the application used to create and manage the database as a search tool. Download the data using the method allowed by the application, either in the form of printouts or data files.

1.05 Cryptography

Encryption Workrounds

Visit our repo tree: 3.DOCUMENTS/Encryption

Encryption workarounds:

  1. Find the key.
  2. Guess the key.
  3. Compel the key.
  4. Exploit a flaw in the encryption software.
  5. Access plaintext while the device is in use.
  6. Locate another plaintext copy.

Bruteforce

Read the thread Brute Force Attacks

.

Cryptanalysis

Visit our repo tree: 3.DOCUMENTS/Cryptanalysis

Steganography


1.06 Memory analysis

Volatile memory analysis

• Volatility
https://www.volatilityfoundation.org/releases
• Linux Memory Extractor (LiME)
https://github.com/504ensicsLabs/LiME
• Cobalt Strike in memory
https://andreafortuna.org/2020/11/22/how-to-detect-cobalt-strike-activity-in-memory-forensics/

JTag, Chip-off and ISP forensics

https://www.teeltech.com/ufaqs/what-is-jtag-chip-off-and-isp
https://www.cellebritelearningcenter.com/mod/page/view.php?id=11903
https://www.fletc.gov/jtag-chipoff-smartphones-training-program
https://www.gillware.com/phone-data-recovery-services/jtag-chip-off-forensics
https://www.gillware.com/phone-data-recovery-services/chip-off-forensics-services

Researching support for phones in JTAG software

https://octoplusbox.com
https://medusabox.com
https://www.riffbox.org
https://easy-jtag.com
https://z3x-team.com

1.07 Cryptocurrencies analysis

Cryptocurrencies analysis

https://github.com/OffcierCia/On-Chain-Investigations-Tools-List
https://github.com/aaarghhh/awesome_osint_criypto_web3_stuff
https://blocksherlock.com/home/blockchain-explorers
https://tronscan.org<br> https://etherscan.io<br> https://algoexplorer.io<br> https://explorer.solana.com<br> https://stellar.expert<br> https://snowtrace.io<br> https://flowscan.org<br> https://polygonscan.com<br>

Some tools

https://github.com/demining/CryptoDeepTools
https://github.com/demining/bitcoindigger
https://github.com/demining/Dao-Exploit
https://github.com/immunefi-team/Web3-Security-Library/blob/main/Tools/README.md#blockchain-analysis

Private sector

https://chainalysis.com<br> https://elliptic.co<br> https://ciphertrace.com<br> https://coinmetrics.io<br> https://whitestream.io<br> https://ciphertrace.com<br> https://elementus.io<br> https://trmlabs.com<br> https://bitok.org/investigations


${\color{Red}\textbf{2.ACTIVE FORENSICS}}$

👷🛠️UNDER CONSTRUCTION🚧🏗

2.01 Police hacking

Visit our repo tree:
4.POLICE_HACKING

The Cyber Kill Chain

• MITRE ATT&CK — ICS Techniques
https://attack.mitre.org/techniques/ics

• MITRE ATT&CK — Enterprise Techniques
https://attack.mitre.org/techniques/enterprise/

• MITRE ATT&CK — Mobile Techniques
https://attack.mitre.org/techniques/mobile/

• OWASP MAS - Mobile Application Security
https://mas.owasp.org<br>

• Training

∙ Rootme — https://www.root-me.org<br> ∙ Vulnhub — https://www.vulnhub.com<br> ∙ Hacker101 — https://www.hacker101.com<br> ∙ Crackmes — https://crackmes.one<br> ∙ Attack Defense — https://attackdefense.com<br>

• Some Cases


∙ Omerta Digital (FBI Honey Pot?)
https://www.omertadigital.com/
∙ Case: ANON (also stylized as AN0M or ΛNØM)
https://en.wikipedia.org/wiki/ANOM
https://www.vice.com/en/article/n7b4gg/anom-phone-arcaneos-fbi-backdoor
∙ Case: EncroChat
https://en.wikipedia.org/wiki/EncroChat
https://eucrim.eu/news/germany-federal-court-of-justice-confirms-use-of-evidence-in-encrochat-cases
https://xperylab.medium.com/the-dark-phones-encrochat-criminals-are-building-their-own-communication-system-474f3aeef759
∙ Case: Pegasus Spyware (NSO Group)
https://theintercept.com/2021/07/27/pegasus-nso-spyware-security
∙ Case: Verint
https://wikileaks.org/spyfiles/docs/VERINT_2012_AvneTurn_en.html
https://www.reddit.com/r/InfoSecNews/comments/sxxzju/leaktheanalyst_group_leak_critical_data_from/
∙ Case: Phantom Secure
https://en.wikipedia.org/wiki/Phantom_Secure
https://www.vice.com/en/article/v7m4pj/the-network-vincent-ramos-phantom-secure
∙ Case: Sky Global
https://en.wikipedia.org/wiki/Shutdown_of_Sky_Global
∙ Case: Bundestrojaner
https://en.wikipedia.org/wiki/Bundestrojaner
∙ Case: Magic Lantern
https://en.wikipedia.org/wiki/Magic_Lantern_(software)
https://github.com/bibanon/bibanon/blob/0b84bb23794c91c238a5601403898b61b5d193fc/Encyclopedia/History/Events/Pifts.md?plain=1#L125
∙ Case: Cryptophon
https://en.wikipedia.org/wiki/Tron_(hacker)#Cryptophon
∙ Planting Tiny Spy Chips in Hardware Can Cost as Little as $200
https://www.wired.com/story/plant-spy-chips-hardware-supermicro-cheap-proof-of-concept
∙ Installation of beacon implants
https://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant
∙ The tricky issue of spyware with a badge: meet ‘policeware’
https://arstechnica.com/information-technology/2007/07/will-security-firms-avoid-detecting-government-spyware
∙ Analisi della normativa e della giurisprudenza sul captatore informatico e la spiegazione del Caso Exodus
https://www.dirittoconsenso.it/2021/11/11/captatore-informatico-trojan-di-stato
∙ LightEater Demo: Stealing GPG keys/emails in Tails via remote firmware infection
https://www.youtube.com/watch?v=sNYsfUNegEA
∙ KeyGrabber Forensic Keylogger
https://www.youtube.com/watch?v=6JJo8qCYE8M


2.02 Law Enforcement Agency (LEA)

• Rule of Law Benchmarks

*First of all, consult court cases to see how laws are (mis)applied.

Security Bodies
(Judiciary Police)
Administration of Justice
(Criminal Procedural Law)
Intelligence Services
• Conducts criminal investigations, carries out whatever steps it deems appropriate to elucidate the facts, with a view to discovering evidence of the existence of the crime and signs of its authorship.
• Criminal police bodies act as a precautionary measure, such as in the case of preserving evidence or in the case in the case of a flagrant crime.
• Has an obligation to preserve the confidentiality of the
investigation, therefore the right to adversarial proceedings is limited.
• In general, the investigation is already a procedural phase.

• In general, the criminal investigation can be directly initiated by other institutions, such as the Public Prosecutor's Office.
• Full exercise of the right to adversarial proceedings
• Follow due legal process, the criminal procedural law.
• Production of knowledge, with production of intelligence reports, to support decision making.
• Their main objectives are to collect information and provide analyses, as well as anticipate and counteract external threats.
• Compartmentalization princpiple: the production of information is separate from decision making, it ensures no single spy knows everything, meaning if they're captured, spies won’t know enough to compromise a mission.
• In general, intelligence activity does not follow due legal process, intelligence agencies do not conduct criminal proceedings, although they can combat terrorism.
• Related to military activities of national defense and conquest against foreign enemies.

*Informational separation of powers: in Germany, where the Gestapo of National Socialism existed, the separation between intelligence (knowledge) and police (power) was one of the denazification measures imposed by the allies in 1949.

*There is some controversy as to whether intelligence can be considered security.

• International Law

∙ UN — Library of Resources
https://www.unodc.org/e4j/en/resdb/index.html

∙ UN — Course Catalogue
https://www.unodc.org/elearning/en/courses/course-catalogue.html

∙ ICRC - Cyber operations during armed conflicts
https://www.icrc.org/en/war-and-law/conduct-hostilities/cyber-warfare

∙ ICRC - New technologies and IHL
https://www.icrc.org/en/war-and-law/weapons/ihl-and-new-technologies

∙ The Cyber Law Toolkit - The intersection of international law and cyber operations
https://cyberlaw.ccdcoe.org/wiki/Main_Page

∙ Budapest Convention (Cybercrime)
https://www.coe.int/en/web/cybercrime/the-budapest-convention

∙ Octopus Project
https://coe.int/en/web/cybercrime/octopus-project

Public International Law
PUBLIC INTERNATIONAL LAW
LAWS OF WAR LAWS OF PEACE
"Jus ad bellum" "Jus in bello" Occupation and "Jus Post Bellum" Human Rights Law
The international rules pertaining to which extent the use of military force against another state is allowed. The international rules pertaining to how armed conflict must be conducted. The Justice at the end of the war, helps move from conflict to peace.Reasonable peace treaties, civilian population should be protected,
leaders who broke Hague/Geneva laws must face prosecution, cities must be reconstructed.
International Bill on Human Rights. Treaties and Conventions. Covenats and Declarations.

Jus ad bellum

Charter of the United Nations. Chapter VII — Action with respect to Threats to the Peace, Breaches of the Peace, and Acts of Aggression - Article 51

“Nothing in the present Charter shall impair the inherent right of individual or collective self-defence if an armed attack occurs against a Member of the United Nations, until the Security Council has taken measures necessary to maintain international peace and security. Measures taken by Members in the exercise of this right of self-defence shall be immediately reported to the Security Council and shall not in any way affect the authority and responsibility of the Security Council under the present Charter to take at any time such action as it deems necessary in order to maintain or restore international peace and security.”

Jus in Bello

Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts (Protocol I)

“Article 3 of the Geneva Conventions and Article 44 Additional Protocol I
In order to promote the protection of the civilian population from the effects of hostilities, combatants are obliged to distinguish themselves from the civilian population while they are engaged in an attack or in a military operation preparatory to an attack. Recognizing, however, that there are situations in armed conflicts where, owing to the nature of the hostilities an armed combatant cannot so distinguish himself, he shall retain his status as a combatant, provided that, in such situations, he carries his arms openly:

(a) During each military engagement, and

(b) During such time as he is visible to the adversary while he is engaged in a military deployment preceding the launching of an attack in which he is to participate.

(c) Acts which comply with the requirements of this paragraph shall not be considered as perfidious within the meaning of Article 37, paragraph 1."

References:
UN - https://legal.un.org/repertory/art1.shtml
ICRC - https://www.icrc.org/en/document/what-are-jus-ad-bellum-and-jus-bello-0
ICRC - https://ihl-databases.icrc.org/en/ihl-treaties/api-1977?activeTab=undefined
ICRC - https://casebook.icrc.org/a_to_z/glossary/direct-participation-hostilities

• Council of Europe — Cybercrime

∙ Cybercrime — https://www.coe.int/cybercrime
∙ GLACY+ — https://coe.int/en/web/cybercrime/glacyplus
∙ iPROCEEDS-2 — https://coe.int/en/web/cybercrime/iproceeds-2
∙ Octopus Project — https://coe.int/en/web/cybercrime/octopus-project
∙ CyberSouth — https://coe.int/en/web/cybercrime/cybersouth
∙ CyberEast — https://coe.int/en/web/cybercrime/cybereast

• Publications

• Investigatory Powers — Criminal Law

Americas

∙ US — Federal Rules — Criminal Procedure — Overview — Link
∙ US — Federal Rules — Criminal Procedure — Rule 41 — Search and Seizure — Link

On a Network
in a Single
District
On a Network in Multiple Districts On a Network with Data Stored Internationally Unknown Where the Data is Stored (Cloud)
Search under Rule 41; consider noting in affidavit the possibility of other locations Multiple search warrants for each district with data or §2703 Warrant served on service provider Use legal process required in country hosting the data, or consider accessing data remotely with a search warrant under Rule 41 Search under Rule 41 for subject computers, and concurrently search under §2703 served on service provider
Union European

∙ UE — Criminal procedural laws across the European Union – A comparative analysis — Link
∙ UK — Crime, justice and law — Law and practice — Link
∙ UK — Public General Acts — Investigatory Powers Act 2016 — Link
∙ GE — German Criminal Code (Strafgesetzbuch — StGB) — Link
∙ GE — German Code of Criminal Procedure (Strafprozeßordnung — StPO) — Link
∙ GE — German Code of Criminal Procedure - StPO, Section 100a - Telecommunications surveillance — Link
∙ GE — Law on the Federal Criminal Police Office and cooperation between the federal and state governments in criminal police matters (Federal Criminal Police Office Act - BKAG) - § 49 Covert intervention in information technology systems — Link

Court Cases

∙ UNODC — Case Law Database — https://sherloc.unodc.org/cld/v3/sherloc/cldb/index.html?lng=en
∙ UNODC — Cyber Organized Crime — https://www.unodc.org/e4j/en/cybercrime/module-13/additional-teaching-tools.html

Americas

∙ US Federal Cases — https://pacer.uscourts.gov/find-case
∙ US Dod - Computer Crime and Intellectual Property Section (CCIPS) - https://www.justice.gov/criminal/criminal-ccips
∙ US FBI - Internet Crime Complaint Center (IC3) - https://www.ic3.gov<br> ∙ Computer Crime Research Center - https://www.crime-research.org<br>

Union European

∙ EUR-Lex https://eur-lex.europa.eu/homepage.html
∙ EU Common Portal of Case Law — https://network-presidents.eu/cpcl
∙ Casetext (Thomson Reuters) - https://casetext.com<br> ∙ Council of Europe - COE Cybercrime - https://www.coe.int/en/web/cybercrime
∙ Council of Europe - Octopus Cybercrime Community - Materials - https://www.coe.int/en/web/octopus/training

architecture

The Five, Nine, & Fourteen Eyes surveillance alliance includes the following countries:

Countries Five Eyes Nine Eyes Fourteen Eyes Other
United Kingdom ✔️ ✔️ ✔️
United States ✔️ ✔️ ✔️
Australia ✔️ ✔️ ✔️
Canada ✔️ ✔️ ✔️
New Zealand ✔️ ✔️ ✔️
Denmark ✔️ ✔️
Netherlands ✔️ ✔️
France ✔️ ✔️
Norway ✔️
Germany ✔️
Belgium ✔️
Spain ✔️
Sweden ✔️
Italy ✔️
Israel ✔️
Japan ✔️
Singapore ✔️
South Korea ✔️

"Apart from these methods of cooperation, there are a number of equally secretive bilateral and multilateral agreements in other regions of the globe – such as the Club of Berne (an intelligence-sharing arrangement among the EU intelligence services) and the Shanghai Cooperation Organizations (an affiliation among the People’s Republic of China (‘China’), India, Kazakhstan, Kyrgyzstan, Pakistan, the Russian Federation (‘Russia’), Tajikistan and Uzbekistan) – together with intelligence exchange arrangements within a group of states comprising Russia, Iraq, Iran and Syria to facilitate the fight against the Islamic State."

(Ref.: WATT, Eliza. State Sponsored Cyber Surveillance: The Right to Privacy of Communications and International Law. Edward Elgar Publishing, 2021.)


2.03 Liability for Contents

TorrentFreak

https://torrentfreak.com
https://torrentfreak.com/category/lawsuits
https://torrentfreak.com/category/law-politics

TorrentFreak - Newsletter

https://torrentfreak.com/subscriptions
https://t.me/torrentfreaks
https://defcon.social/@torrentfreak
https://torrentfreak.com/feed

2.04 Tor Fingerprint

Tor Fingerprint

∙ TOR Fingerprinting — https://blog.torproject.org/browser-fingerprinting-introduction-and-challenges-ahead
∙ Attacks on Tor — https://github.com/Attacks-on-Tor/Attacks-on-Tor
∙ EFF Test — https://coveryourtracks.eff.org/learn

Hacker Cases



2.05 Forensics Footprints

Forensics Footprints

https://github.com/PaulNorman01/Forensia


2.06 Supply Chain Attack

Supply Chain Attack

• https://reproducible-builds.org
• https://github.com/SAP/risk-explorer-for-software-supply-chains
• https://github.com/ossillate-inc/packj

2.07 APT & Cybercriminal Campagin Collections

APT & Cybercriminal Campagin Collections

https://attack.mitre.org/groups
https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections


2.08 Man In The Middle (MitM)

Man In The Middle (MitM)

• https://github.com/frostbits-security/MITM-cheatsheet
• https://github.com/mitmproxy/mitmproxy
• https://mitmproxy.org
• https://github.com/andreafortuna/MITMInjector
• https://github.com/KoreLogicSecurity/wmkick
• https://github.com/jakev/mitm-helper-wifi
• https://github.com/jakev/mitm-helper-vpn

2.09 Network Analysis (SIGINT)

Network Analysis

• Snort — https://github.com/snort3
• Wireshark — https://www.wireshark.org<br> • NMAP — https://nmap.org<br>

Live System Based

Security Onion

Network Security Toolkit


2.10 Metadata

Metadata

∙ ExifTool — https://github.com/exiftool/exiftool
∙ PhotoDNA — https://anishathalye.com/inverting-photodna
∙ Geo-tags — https://tool.geoimgr.com<br>


2.11 Reverse Engineering

Reverse Engineering

https://github.com/alphaSeclab/awesome-reverse-engineering

Ghidra

https://ghidra-sre.org<br>


2.12 Social Engineeringg (HUMINT)

Social Engineering



${\color{Yellow}\textbf{PHONE SNIFFING}}$

• DEFCON Safe Mode - Cooper Quintin - Detecting Fake 4G Base Stations in Real-Time https://www.youtube.com/watch?v=siCk4pGGcqA
• SRLabs - Warn you about threats like fake base stations (IMSI Catchers)
https://github.com/srlabs/snoopsnitch
• Android IMSI-Catcher Detector (suspended)
https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector
• Telecom Exploits - Signalling System 7 (SS7)
https://github.com/SigPloiter/SigPloit
• Telecom Exploits - HLR Lookups
https://github.com/SigPloiter/HLR-Lookups

Phone Surveillance Exposed
NAME MEANING
IMEI International Mobile Equipment Identity
IMSI International Mobile Subscriber Identity
MCC Mobile Country Code
MNC Mobile Network Code
MSIN Mobile Subscription Identification Number
ICCID Integrated Circuit Card Identifier
MSID Mobile Station ID
GSM Global System for Mobile Communications
SIM Card Subscriber Identity Module Card
SMS Short Message/Messaging Service
SDR Software-Defined Radio

Useful Websites

— OpenCellID — Link
— Cell Tower Locator (Cell2GPS) — Link
— Cell Phone Trackers — Link
— International Numbering Plans — Link
— GSM World Coverage Map and GSM Country List — Link
— Imei Info — https://www.imei.info<br> — GSMArena Phones Ref.- https://www.gsmarena.com — Phonescoop Phones Ref.- https://www.phonescoop.com — Cell Towers — https://opencellid.org<br>

Information & Explanations

— IMSI-catcher — Link
— GSM frequency bands — Link
— List of software-defined radios — Link

Useful Apps

— Mobile Software
— AIMSICD — Link
— SnoopSnitch — Link
— Desktop Software
— GsmEvil 2 — Link
— IMSI-catcher — Link

Equipment

GSM 900 / GSM 1800 MHz are used in most parts of the world: Europe, Asia, Australia, Middle East, Africa.
GSM 850 / GSM 1900 MHz are used in the United States, Canada, Mexico and most countries of S. America.

— SDR
— RTL-SDR (65MHz-2.3GHz) — Link
— Antenna
— Antenna — Link

Equipment

— Catching IMSI Catchers — Link

GSM Sniffing Install/Setup Guide

Install

$ sudo apt install python3-numpy python3-scipy python3-scapy gr-gsm
$ git clone https://github.com/Oros42/IMSI-catcher && cd IMSI-catcher
$ sudo grgsm_livemon && python3 simple_IMSI-catcher.py --sniff

GSM Install Error? Try this!

$ sudo apt-get install -y \
cmake \
autoconf \
libtool \
pkg-config \
build-essential \
docutils \
libcppunit-dev \
swig \
doxygen \
liblog4cpp5-dev \
gnuradio-dev \
gr-osmosdr \
libosmocore-dev \
liborc-0.4-dev \
swig

$ gnuradio-config-info -v

Tips

$ sudo grgsm_scanner -l  # List your SDR connected.
$ sudo grgsm_scanner     # Scan for cell towers near you.
$ sudo grgsm_livemon     # Live radio scanning.


${\color{Green}\textbf{BRUTE FORCE ATTACKS}}$

Brute Force Attacks

The speed at which your password is cracked depends on the entropy of your password and the power of the computer.

Computer programs used for brute force attacks can check anywhere from 10,000 to 1 billion passwords per second. A Pentium 100 can try 10.000 passwords a second. A supercomputer can try 1.000.000.000 per second.

Complex sheet:

Simplified sheet:

Types of brute force attacks

Simple Brute Force Attack

The attacker relies on trying out commonly used, weak passwords such as 123456, qwerty, admin, changeme, qazwsxedc etc.

Dictionary attack

Software that can make thousands of guesses every second using dictionary databases, hence the name of the attack.

Hybrid Brute Force Attack

A hybrid attack is utilized once the attacker already knows the username of its prey.

Reverse Brute Force Attack

A reverse brute force attack requires the attacker to know the password beforehand and then attempt to guess the username.

Credential stuffing

Hackers can get entire databases of stolen login credentials and then try to apply them to the account they’re trying to access. This kind of attack can be especially devastating if the attacked user reuses passwords across multiple accounts.

Rainbow Table Attack

A rainbow table attack is a method of password cracking that employs rainbow tables to break the password hashes in a database. Websites or apps don’t store passwords in plain text; instead, they encrypt passwords with hashes. Once the password is used for logging in, it is immediately converted to a hash. The next time the user logs in using their passwords, the server checks whether the password matches the previously created hash. If the two hashes match, the user is then authenticated. The tables used to store password hashes are known as rainbow tables.

Multi Factor Authenticator (MFA) or Two-factor Authenticator (2FA)

Set up MFA whenever possible, It's an extra layer of security that requires additional steps to verify the user's identity.

Encryption workarounds:

  1. Find the key.
  2. Guess the key.
  3. Compel the key.
  4. Exploit a flaw in the encryption software.
  5. Access plaintext while the device is in use.
  6. Locate another plaintext copy.


Sites of Interest

General Publications

• CVE Alerting Platform
https://github.com/opencve/opencve
• The Hacker News — Newsletter
https://thehackernews.com/#email-outer
• Black Hat
https://blackhat.com<br> • ZDnet
https://www.zdnet.com<br> • Bleeping Computer
https://www.bleepingcomputer.com<br> • Wired News
https://www.wired.com<br> • The Register
https://www.theregister.com<br> • Secure List by Kaspersky — Newsletter
https://securelist.com<br> • Forensic Focus — Newsletter
https://www.forensicfocus.com<br> • SANS Institute — Newsletter
https://www.sans.org>
• Debian Security Announce
https://lists.debian.org/debian-security-announce • Cert Coordination Center
https://www.cert.org<br> • DoD Instructions Cybersecurity
https://www.esd.whs.mil/dd/
• Computer World
https://computerworld.com<br> • InfoWorld
https://www.infoworld.com<br> • InformationWeek
https://www.informationweek.com<br> • TechRepublic
https://www.techrepublic.com<br> • Sophos
https://sophos.com<br> • TechWorld
https://www.techworld.com<br> • Infosec Institute
https://resources.infosecinstitute.com<br> • Government Executive Magazine
https://govexec.com<br> • E Security Planet
https://www.esecurityplanet.com<br> • Help Net Security
https://www.helpnetsecurity.com<br> • Information Security Magazine
https://searchsecurity.techtarget.com<br> • Network World Fusion
https://www.nwfusion.com<br> • Federal Computer Week Security News
https://fcw.com/Home.aspx
• Government Computer News IT Security
https://gcn.com/Home.aspx
• IA Technology Analysis Center
https://iac.dtic.mil/csiac
• Overseas Security Advisory Council
https://www.osac.gov<br> • SANS Internet Storm Center
https://isc.sans.edu<br> • Search Security
https://searchsecurity.techtarget.com<br> • News Factor
https://www.newsfactor.com<br> • Security Focus
https://www.securityfocus.com/news
• New Scientist
https://www.newscientist.com/section/news
• Silicon Valley
https://www.siliconvalley.com<br> • TechWeb
https://www.techweb.com<br> • USA Today
https://www.usatoday.com/tech
• The Intercept
https://theintercept.com<br> • Reuters
https://www.reuters.com/news
• Aljazeera
https://www.aljazeera.com<br> • Gulf News
https://gulfnews.com<br> • China Official Publications
https://english.www.gov.cn<br> • North Korea Official Publications
http://www.kcna.kp/en
• Israel Official Publications
https://www.gov.il/en
• Iran Official Publications
https://irangov.ir/en

Forensic Publications

• Make a Google Scholar search from an interesting subject that you want to follow up on.

• Search paramters example:

police hacking intext:ilegal intext:abusive intext:law

• You could set keywords alerts: https://scholar.google.com/scholar_alerts?view_op=list_alerts


Open access journals

https://en.wikipedia.org/wiki/List_of_academic_databases_and_search_engines
https://en.wikipedia.org/wiki/Lists_of_academic_journals
https://en.wikipedia.org/wiki/List_of_open-access_journals


• Science Direct — Forensic Science International: Digital Investigation
https://www.sciencedirect.com/journal/forensic-science-international-digital-investigation
• Science Direct — Computer Law & Security Review
https://www.sciencedirect.com/journal/computer-law-and-security-review
• Forensic Science — Application of science to criminal and civil laws
https://www.forensicscijournal.com<br> • University of London - SAS Open Journals - Digital Evidence and Electronic Signature Law Review
https://journals.sas.ac.uk/deeslr/
• IEEE Intelligence and Security Informatics (IEEE-ISI)
https://ieee-isi.org<br> • USENIX Conferences
https://www.usenix.org/conferences
• International Journal of Intelligence and CounterIntelligence
https://www.tandfonline.com/journals/ujic20
• Information Security Journal: A Global Perspective
https://www.tandfonline.com/journals/uiss20
• Policing and Society — An International Journal of Research and Policy
https://www.tandfonline.com/journals/gpas20
• Police Practice and Research — An International Journal
https://www.tandfonline.com/journals/gppr20
• Journal of Applied Security Research
https://www.tandfonline.com/journals/wasr20
• Information Systems Security
https://www.tandfonline.com/journals/uiss19
• Journal of Computer Information Systems
https://www.tandfonline.com/journals/ucis20
• Australian Journal of Forensic Sciences
https://www.tandfonline.com/journals/tajf20
• Advancing Technology, Research and Collaboration
https://www.acm.org/conferences
• The APWG Symposium on Electronic Crime Research (APWG eCrime)
https://ecrimeresearch.org<br> • Communications in Computer and Information Science — Springer
https://www.springer.com/series/7899
IEEE Open Journal of Circuits and Systems
IEEE Open Journal of the Communications Society
IEEE Open Journal of the Computer Society
IEEE Open Journal of Signal Processing

Law Publications

• German Law Research - Harvard Law School Library Research Services
https://guides.library.harvard.edu/GermanLaw
• The German Law Journal (open-access) - Cambridge University Press
https://www.cambridge.org/core/journals/german-law-journal
• Foreign Law Translations - The University of Texas at Austin
https://law.utexas.edu/transnational/foreign-law-translations
• The Center for Security and Emerging Technology (CSET) - Georgetown University's Walsh School of Foreign Service
https://cset.georgetown.edu<br> • European Journal of Criminology
https://journals.sagepub.com/home/euc
• European Journal of Law and Technology
https://ejlt.org/index.php/ejlt

https://www.sciencedirect.com/journal/computer-fraud-and-security
• Digital Evidence and Electronic Signature Law Review
https://journals.sas.ac.uk/deeslr/issue/view/596

https://www.tandfonline.com/journals/cirl20

https://openyls.law.yale.edu<br> •
https://dltr.law.duke.edu<br> •
https://scholarlycommons.law.northwestern.edu/njtip/
• Ohio State Technology Law Journal (Moritz College of Law)
https://kb.osu.edu/communities/a3767fe3-6fcd-5776-bbe7-44d144fb641a

https://scholar.smu.edu/smulr
• AIDP-IAPL Publications
https://www.penal.org/en/aidp-iapl-publications

• Necessary and Proportionate - https://www.necessaryandproportionate.org<br> • Privacy International - https://www.privacyinternational.org<br> • EFF - https://www.eff.org<br> • EPIC - https://epic.org/issues/surveillance-oversight
• S&S - https://ojs.library.queensu.ca/index.php/surveillance-and-society/index
• Citizenlab - https://citizenlab.ca<br> • BBW - https://bigbrotherwatch.org.uk<br> • Bugged Planet - http://buggedplanet.info<br> • CIS - https://cyberlaw.stanford.edu<br> • The Berkman Klein Center for Internet & Society at Harvard University - https://cyber.harvard.edu<br> • Carnegie Endowment for International Peace
https://carnegieendowment.org/publications/interactive/cybernorms
• Bad Internet Bills - https://www.badinternetbills.com<br> • Software Freedom Law Center - https://softwarefreedom.org<br> • Techdirt - https://www.techdirt.com<br> • Intelligence Oversight - https://www.intelligence-oversight.org • UN Internet Governance Forum - https://www.intgovforum.org<br> • The IT Law Wiki - https://itlaw.fandom.com<br> • Computer Crime Research Center - https://www.crime-research.org<br> • Internet Crime Complaint Center (IC3) - https://www.ic3.gov/Home/AnnualReports
• ETSI - https://www.etsi.org/committees
• The Bureau of Investigative Journalism - https://www.thebureauinvestigates.com<br>

https://www.fbi.gov<br> https://www.justice.gov/news
https://www.justice.gov/criminal/cybercrime
https://www.coe.int/en/web/cybercrime
https://www.sherloc.unodc.org<br> https://www.enisa.europa.eu<br> https://csrc.nist.gov<br>

https://www.computerweekly.com<br> https://www.vice.com/en/section/tech
https://copsincyberspace.wordpress.com<br>

Intelligence, Conflict, and Warfare Publications

• The NATO Cooperative Cyber Defence Centre of Excellence
https://ccdcoe.org<br> • Taylor & Francis - Intelligence and National Security - Open access articles
https://www.tandfonline.com/action/showOpenAccess?journalCode=fint20
• The Journal of Intelligence, Conflict, and Warfare
https://journals.lib.sfu.ca/index.php/jicw/issue/archive
• DCAF - Geneva Centre for Security Sector Governance
https://www.dcaf.ch/resources?type=publications
• CIA.gov - Center for the study of intelligence
https://www.cia.gov/resources/csi/studies-in-intelligence
• E-International Relations - Open access scholarly books
https://www.e-ir.info/publications
• Springer Open
https://www.springeropen.com<br> • International Security
https://direct.mit.edu/isec
• Carnegie Endowment for International Peace
https://carnegieendowment.org<br> • RIEAS
https://rieas.gr<br>


YouTube Conferences https://www.youtube.com/@BlackHatOfficialYT
https://www.youtube.com/@DEFCONConference
https://www.youtube.com/@mediacccde
https://www.youtube.com/@DFRWS
https://www.youtube.com/@SANSForensics
https://www.youtube.com/@SANSOffensiveOperations
https://www.youtube.com/@RSAConference
https://www.youtube.com/@USENIXEnigmaConference
https://www.youtube.com/@DebConfVideos
https://www.youtube.com/@hitbsecconf
https://www.youtube.com/@44contv
https://www.youtube.com/@OffensiveCon
https://www.youtube.com/@secwestnet
https://www.youtube.com/@EkopartyConference
https://www.youtube.com/@reconmtl
https://www.youtube.com/@TROOPERScon
https://www.youtube.com/@MCH2022NL
https://www.youtube.com/@mentalOutlaw
https://www.youtube.com/@Seytonic
https://www.youtube.com/@DoingFedTime
https://www.youtube.com/@UsenixOrg

Others
• Computer Incident Response Center for Civil Society - https://www.civicert.org
https://eforensicsmag.com
https://0x00sec.org
https://csrc.nist.gov/projects
https://nvd.nist.gov
https://www.cisa.gov/news-events/cybersecurity-advisories
https://www.nsa.gov/Press-Room/Press-Releases-Statements
https://www.nsa.gov/ia/mitigation_guidance/security_configuration_guides/index.shtml
https://malware.lu
https://securelist.com
https://www.eucybernet.eu
https://oval.mitre.org
https://www.w3.org/Security/Faq/www-security-faq.html
https://www.nowsecure.com
https://www.htcia.org
https://www.digitalcitizensalliance.org/get-informed/digital-citizens-investigative-reports
https://www.reddit.com/r/InfoSecNews
https://www.reddit.com/r/digitalforensics
https://www.reddit.com/r/computerforensics
https://www.reddit.com/r/antiforensics
https://www.reddit.com/r/Smartphoneforensics
https://www.reddit.com/r/privacy
https://www.reddit.com/r/restorethefourth
https://github.com/yeahhub/Hacking-Security-Ebooks
https://github.com/InfoSecIITR/reading-material

REFERENCES

https://dfrws.org/presentation
https://issworldtraining.com
https://sciencedirect.com/journal/forensic-science-international-digital-investigation
https://sciencedirect.com/journal/computer-law-and-security-review
https://github.com/MISP/misp-training
https://github.com/ail-project/ail-training
https://isc2.org/Certifications/CISSP
https://github.com/connectans/awesome-CISSP-CCSP
https://github.com/jefferywmoore/CISSP-Study-Resources
https://github.com/Syslifters/OffSec-Reporting
https://attack.mitre.org
https://forensicfocus.com
https://ecrimeresearch.org
https://drivebadger.com
https://cellebritelearningcenter.com
https://public.cyber.mil
https://github.com/Cugu/awesome-forensics
https://github.com/shadawck/awesome-anti-forensic
https://github.com/Ignitetechnologies/Mindmap
https://github.com/asiamina/A-Course-on-Digital-Forensics
https://github.com/mikeroyal/Digital-Forensics-Guide
https://github.com/forensicswiki/wiki
https://github.com/Digital-Forensics-Discord-Server/LawEnforcementResources
https://github.com/Digital-Forensics-Discord-Server/TheHitchhikersGuidetoDFIRExperiencesFromBeginnersandExperts
https://github.com/Hack-with-Github/Awesome-Hacking
https://github.com/enaqx/awesome-pentest
https://github.com/onlurking/awesome-infosec
https://github.com/504ensicsLabs

Back to Top ⬆

Open Source Agenda is not affiliated with "My Forensics" Project. README Source: RENANZG/My-Forensics