DIGITAL / CYBER FORENSIC & COMPROMISE ASSESSMENT
Rapidiously repurpose leading edge growth strategies with just in time web readiness service Objectively communicate timely meta services for synergistic initiatives functionalities.
Workshop Objective
• Understand the need of compromise assessment
• Gain visibility of malicious activity, identify and
confirm the breach.
• Develop ability to foresee and assess upcoming
cyber challenges
• Collect evidence for an effective response with law
enforcement, partners and customers.
• Improve internal capacity for incident detection,
containment & mitigation
Introduction to Cyber Forensic
Demonstration of Email Spoofing
Cyber Investigation Against Mobile Devices
Next Gen Cyber Blunders by Experts
Advance Level compromise assessment
Role of an Individual during compromise assessment
Demonstrating a scenario of compromise assessment
Demonstration to find attacks who are currently in the 
environment or had been active
INTRODUCTION TO CYBER FORENSIC
Cyber forensics, e-discovery (electronic evidence discovery), digital forensics, computer forensics, all relevant, 
each meaning relatively the same thing, and depending on whom you speak with, each meaning something very 
different, yet none has emerged as a de facto standard. 
The term specifically used for collecting, examining, Analyzing & reporting of data from the device.
INTRODUCTION TO COMPROMISE ASSESSMENT
Compromise assessment is a proactive approach for evaluation of systems to detect threat that have evaded 
existing controls.
A compromise can be defined in three states:
• Applications – Applications become one of the weakest link in compromise the systems, lack of application 
level security controls may lead towards compromise. For e.g.(SQL, Apache, IIS, torrent, WinRAR, Acrobat) etc.
• Operating System – Operating systems are another way of compromising the accessibility of the system by 
triggering up a OS level vulnerability. For e.g. (Windows, Linux, Solaris) etc.
• Network – Networks connects applications and operating system by means of IP addresses and ports 
numbers. Network side become vulnerable if not properly organized by a known professional which may leads 
towards compromise state. Network attacks which may leads towards compromise are included but not 
limited to ARP Spoofing, DNS Spoofing, IP Flooding, IP Spoofing, DHCP Starvation) etc
EMAIL SPOOFING
Email spoofing is a popular tactic used in phishing and spam campaigns because people are more likely to open 
an email when they think it has been sent by a legitimate or familiar source. The goal of email spoofing is to get 
recipients to open and reply to the email seems urgent in by its content and requires some financial or 
confidential data from the user.
According to the survey conducted by E&Y the statistics shows that 22% of the attacks comes by running a 
phishing campaign against the organization.
													Email spoofing is a popular tactic used in phishing and spam campaigns because people are more likely to open 
an email when they think it has been sent by a legitimate or familiar source. The goal of email spoofing is to get 
recipients to open and reply to the email seems urgent in by its content and requires some financial or 
confidential data from the user.
EMAIL SPOOFING PREVENTION
A spoofed email message is modified to appear as if it originates from a sender other than the actual sender of 
the message. To stop email spoofing, following are the key step which requires special considering when securing 
from email spoofing.
Reference.: https://www.comparitech.com/vpn/cybersecurity-cyber-crime-statistics-facts-trends/
Using Sender ID to counter from spoofing attack;
Creating Sender Policy Framework (SPF) record entry: Sender Policy Framework – or SPF as it is commonly known 
– is a solution created in an attempt to validate the source of an email message received by a mail system. 
SPF policies work by adding a TXT record to your email domain’s DNS (domain name server) that identifies the 
authorized mail servers for sending email for this domain
An example record: 
v=spf1 include:mail.example.com -allA spoofed email message is modified to appear as if it originates from a sender other than the actual sender of 
the message. To stop email spoofing, following are the key step which requires special considering when securing 
from email spoofing.
Configuring Domain Message Authentication Reporting and Conformance (DMARK) record – DMARC not only 
advises the receipt to quarantine or reject the email message on failure, but also asks for a report of the message 
to be sent to a reporting address. This is a great step for gaining some insight into spam/malspam campaigns 
spoofing your organization.
An example record:
V=DMARC1; p=none; rua=mailto:report.rua@example.com; 
ruf=mailto:report.ruf@example.com A spoofed email message is modified to appear as if it originates from a sender other than the actual sender of 
the message. To stop email spoofing, following are the key step which requires special considering when securing 
from email spoofing.
Domain Keys Identified Mail (DKIM) – DKIM this is used to publish the signer’s public key, which the recipient mail 
server then uses to verify that the content signed by the digital signature is included in the email message 
headers.
An example DKIM record:
V=DKIM1; k=rsa; p=PUBLICKEY
CYBER INVESTIGATIONS AGAINST MOBILE DEVICES
Mobile device is become one of key threat which user is are carrying with them. Its not like a hand grenade but it 
is not less then a hand grenade the difference is that a hand grenade can physically harm and this threat can 
logically harm user by stealing the privacy of the users data.
Cybercriminals targeting mobile devices most frequently use apps to break in, as seen in 79% of mobile-focused 
attacks in 2019 and 76% of those in 2020 so far, Pradeo Labs researchers found MOBILE PHONE USERS STATISTICS IN PAKSITAN
According to the latest stats of Pakistani market, 94.61% are using android based cell phone devices, 3.74% are 
using iOS devices.
| 
 Date  | 
 Android  | 
 iOS  | 
 Nokia Unknown  | 
 Series 40  | 
 Unknown  | 
 Windows  | 
 Symbian OS  | 
 Samsung  | 
 BlackBerry OS  | 
 Linux  | 
 Other  | 
| 
 2019-11  | 
 95.21  | 
 3.06  | 
 0.9  | 
 0.27  | 
 0.16  | 
 0.21  | 
 0.08  | 
 0.04  | 
 0.03  | 
 0.02  | 
 0.02  | 
| 
 2019-12  | 
 95.11  | 
 3.25  | 
 0.85  | 
 0.24  | 
 0.16  | 
 0.19  | 
 0.07  | 
 0.04  | 
 0.03  | 
 0.02  | 
 0.02  | 
| 
 2020-01  | 
 94.61  | 
 3.74  | 
 0.85  | 
 0.24  | 
 0.15  | 
 0.21  | 
 0.07  | 
 0.06  | 
 0.03  | 
 0.02  | 
 0.02  | 
Reference: http://gs.statcounter.com/os-market-share/mobile/pakistan
MOBILE ATTACK DEMONSTRATION
Binding malware with a legitimate
application hosted over various
open market places.
Malicious App Contains:
 Reverse Back 
Connection
 Intruder IP
 Intruder Port
Malicious App Will Intrude:
 SMS (Dump, Send/Receive)
 Call Log
 Gallery
 Live Camera
 Microphone, Contact Directory,
 Location Tracking etc.
NEXT GEN CYBER BLUNDERS BY EXPERTS
Implementing the security controls is not the only solution for enhancing organization from the security point of 
view, there are several tuning which may require to be implemented by the experts of those system which may 
include but not limited to:
If we discuss about security solution, the ideal scenario for all the organization providing critical services would be 
as follow:
1. An endpoint solution is implemented through out the organization;
2. A Security Incident & Event Management solution (SIEM) is implemented to monitor critical server(s) and 
applications;
3. Intelligent Firewall for network traffic monitoring;
4. SPAM filter for controlling SPAMMING and SPAMMERS;
SIEM SOLUTION: Securing organization by pushing up a notification of suspicious event in order to preventing 
from data breaches.
I would like to add one thing whether your SIEM solution is capable for monitoring such event or not?
S. No Event Name Event Description Event I
| 
 S. No  | 
 Event Name  | 
 Event Description  | 
 Event ID  | 
| 
 
  | 
 
  | 
 RANSOMWARE  | 
 
  | 
| 
 1  | 
 Object Access  | 
 An attempt was made to access a file  | 
 4663  | 
| 
 2  | 
 Sensitive Privilege Use  | 
 When user exercise privileges assign to them  | 
 4673  | 
| 
 3  | 
 Process Creation  | 
 A process is create when a process is created  | 
 4688  | 
| 
 4  | 
 Process Termination  | 
 A process is terminate when a process is terminated  | 
 6889  | 
| 
 5  | 
 Process Special Logon  | 
 Special privileges assign to new logon  | 
 4672  | 
| 
 
  | 
 
  | 
 TROJAN  | 
 
  | 
| 
 6  | 
 Trojan Detected  | 
 Indicates that Trojan was detected  | 
 6008  | 
| 
 7  | 
 Service Control Manager  | 
 The Windows Defender Services entered the stopped state  | 
 7036  | 
| 
 8  | 
 Remote Access  | 
 Indicate that backdoor was created  | 
 6002  | 
| 
 9  | 
 Sending E-mail  | 
 Hostile Email was attached  | 
 6003  | 
| 
 S. No  | 
 Event Name  | 
 Event Description  | 
 Event ID  | 
| 
 
  | 
 
  | 
 WORMS  | 
 
  | 
| 
 10  | 
 Service Installed  | 
 An unknown service was installed in the system  | 
 4697  | 
| 
 11  | 
 File Share  | 
 A network object was accessed  | 
 5140  | 
| 
 12  | 
 File Share  | 
 A network object was added  | 
 5142  | 
| 
 13  | 
 Bootnet DNS interception  | 
 Redirect the traffic to malicious site  | 
 338301  | 
| 
 14  | 
 Bootnet Destination blacklist  | 
 Access to malicious site  | 
 338004  | 
| 
 VIRUS  | 
 
  | 
||
| 
 15  | 
 Malicious software  | 
 Indicates a virus  | 
 6004  | 
| 
 16  | 
 Content scan  | 
 An attampt was made to scan the content present in system  | 
 6010  | 
| 
 17  | 
 Disk-Bad block  | 
 Area of storage that is no longer reliable for storing and retriving data  | 
 7  | 
| 
 18  | 
 Disk-Disk error during paging  | 
 Error occurs when your computer swaps information to or from the disk.  | 
 51  | 
| 
 19  | 
 Disk-imminent disk failure  | 
 Hard drive failure  | 
 52  | 
| 
 20  | 
 Application Error  | 
 An attempt was made to crash the application  | 
 1000  | 
| 
 SPYWARE  | 
 
  | 
||
| 
 21  | 
 Spyware Detected  | 
 Indicates a spyware was detected  | 
 6009  | 
| 
 22  | 
 Service Control Manager  | 
 Indicates a new service local synchronization host was installed  | 
 7045  | 
| 
 23  | 
 Service control Manger  | 
 Indicates local synchronization host service entered the running state  | 
 7036  | 
| 
 24  | 
 System Logon  | 
 Logon session was created to logon to local computer  | 
 4624  | 
| 
 25  | 
 User Account Mangement  | 
 An attempt was made to reset the account’s password  | 
 4724  | 
| 
 
  | 
 
  | 
 ADWARES  | 
 
  | 
| 
 26  | 
 Software Install  | 
 Indicates that software was installed  | 
 11707  | 
| 
 27  | 
 Software Uninstall  | 
 Indicates that software was uninstalled  | 
 11724  | 
| 
 
  | 
 
  | 
 ADORE ROOTKIT  | 
 
  | 
| 
 28  | 
 object Access Request  | 
 When an application attempt to access the obejct  | 
 4656  | 
| 
 29  | 
 Changed Object Permission  | 
 Someone made changes to access control list of object  | 
 4670  | 
| 
 30  | 
 Object Access  | 
 An attempt was made to access any object like kernel  | 
 4663  | 
| 
 
  | 
 
  | 
 HACKER DEFENDER ROOTKIT  | 
 
  | 
| 
 31  | 
 Process Create  | 
 A new process has been created  | 
 4688  | 
| 
 32  | 
 Registry  | 
 Registry valued was modified  | 
 4657  | 
| 
 33  | 
 Application Error  | 
 An attempt was made to crash the application  | 
 1000  | 
| 
 
  | 
 
  | 
 STONED BOOTKIT  | 
 
  | 
| 
 34  | 
 Service Control manager  | 
 The Protected Storage service failed to start due to the following error: The system cannot find the path specified.  | 
 7000  | 
| 
 35  | 
 Active Directory Doamin Service  | 
 An internal asynchronous attempt to update the schema cache failed with an error.  | 
 1208  | 
| 
 36  | 
 System -Drives  | 
 The Boot-Start or System-Drives are failed to load  | 
 7026  | 
| 
 
  | 
 
  | 
 DNS CHANGER EXPLOIT KIT  | 
 
  | 
| 
 37  | 
 Remote Access  | 
 Remote Desktop Services accepted a connection from IP address  | 
 1158  | 
| 
 38  | 
 DNS  | 
 an attempt was made to update them with the new records through dynamic update  | 
 6702  | 
| 
 39  | 
 Application  | 
 C:\Program Files\Microsoft Silverlight\slup.exe cannot be restarted  | 
 10010  | 
COMPROMISE ASSESSMENT CHECKLIST
| 
 S. No  | 
 Control Name  | 
 
  | 
 Objective  | 
 Technique  | 
 Status  | 
||
| 
 Yes  | 
 No  | 
||||||
| 
 
  | 
 
  | 
 Compromise Assessment Checklist – System/Server  | 
 
  | 
 
  | 
 
  | 
||
| 
 1  | 
 
  | 
 User Access Control  | 
 Assessing the User Access Privilege rights for the OS.  | 
 Review of Access right form  | 
 
  | 
 
  | 
|
| 
 2  | 
 
  | 
 Searching for Cracked OS  | 
 Assessment of OS by examining its serial no.  | 
 Product key viewer/ key finder  | 
 
  | 
 
  | 
|
| 
 
  | 
 
  | 
 Searching for Outdated, Obsoleted, End of Life OS  | 
 Assessing OS version and Firmware, release issued officially by the vendor  | 
 Winver (Windows) uname -a (Linux)  | 
 
  | 
 
  | 
|
| 
 3  | 
 
  | 
 Anti Virus/End point/Defender real time protection  | 
 Ensure that the AV/End points real time protection is turned on  | 
 Manual technique  | 
 
  | 
 
  | 
|
| 
 4  | 
 
  | 
 AV/Endpoint/OS Updates  | 
 Ensure that the AV/End points are Up to dated.  | 
 Manual technique  | 
 
  | 
 
  | 
|
| 
 5  | 
 
  | 
 Cracked tools  | 
 Assessment of any cracked tool installation (MS Office, Acrobat, IDM, etc.)  | 
 Examining installed programs  | 
 
  | 
 
  | 
|
| 
 6  | 
 
  | 
 Open Source tools  | 
 Assessment of any open source tool installation (Firefox, VLC, VEEAM, Chrome etc.)  | 
 Manual technique  | 
 
  | 
 
  | 
|
| 
 7  | 
 
  | 
 Browser Plug-ins  | 
 Assessment of Installed plug-ins in the browser ( Video Downloader, File Converter etc.)  | 
 Manual technique  | 
 
  | 
 
  | 
|
| 
 8  | 
 
  | 
 Application Activity Monitoring  | 
 Assessment of activity performs by examining processes of the application(s)  | 
 Process Monitor Apps (procmon, ps -a) Wireshark  | 
 
  | 
 
  | 
|
| 
 S. No  | 
 Control Name  | 
 
  | 
 Objective  | 
 Technique  | 
 Status  | 
||
| 
 Yes  | 
 No  | 
||||||
| 
 
  | 
 
  | 
 Compromise Assessment Checklist – System/Server  | 
 
  | 
 
  | 
 
  | 
||
| 
 9  | 
 
  | 
 Email/USB Attachments  | 
 Assessment of malwares, Trojans, Macros attached in email/USB attachments transferred in the system.  | 
 
  | 
 
  | 
 
  | 
|
| 
 10  | 
 
  | 
 Key logger  | 
 Assessment of Malwares, key logger/Spying tools and Trojans .  | 
 Manual technique  | 
 
  | 
 
  | 
|
| 
 11  | 
 
  | 
 Java Auto Run  | 
 Reviewing installation of java in the system in order to assess auto execution capability of java applets, scripts, java runtime environment files  | 
 Manual technique  | 
 
  | 
 
  | 
|
| 
 12  | 
 
  | 
 Shells  | 
 Searching for connections (Listening, Established)  | 
 netstat -a, netstat -bano (Windows) ss -tulw, ss-tulwn (linux)  | 
 
  | 
 
  | 
|
| 
 13  | 
 
  | 
 Unnecessary Port Assessment  | 
 Searching for unnecessary ports opened on the server  | 
 netstat, NMAP  | 
 
  | 
 
  | 
|
| 
 14  | 
 
  | 
 Searching for Stored Credentials  | 
 Searching for Stored Credential in Windows, Browsers, Applications  | 
 rundll32.exe keymgr.dll,KRshowKeyMgr  | 
 
  | 
 
  | 
|
| 
 15  | 
 
  | 
 Network Monitoring  | 
 Assess Network Behavior  | 
 Nmon  | 
 
  | 
 
  | 
|


Comments are closed