Projects

Digital Forensic Project List

01

MALWARE ANALYSIS & THREAT IDENTIFICATION

Analyze malwares which arrives over the Email, USB media. By examining the file content

Read More
Ubaid%20Jafri%20 %20Global%20Cybersecurity%20Speaker
02

FILE SHREDDING - ANTI FORENSIC SOLUTION

Permanently remove important and critical files from your Computer storage, USB

Read More
Ubaid%20Jafri%20 %20Global%20Cybersecurity%20Speaker
03

STATIC & DYNAMIC MALWARE ANALYSIS

This project is divided into two phases Static and Dynamic, here we will be using malware

Read More
Ubaid%20Jafri%20 %20Global%20Cybersecurity%20Speaker
04

SECURING SYSTEM FROM RANSOMWARE ATTACK

Using Automated tool and backing up the last good known configuration of the system

Read More
Ubaid%20Jafri%20 %20Global%20Cybersecurity%20Speaker
05

MEMORY FORENSIC & ANALYSIS- LIVE ACQUISITION OF MEMORY

Memory forensics is forensic analysis of a computer's memory dump.

Read More
Ubaid%20Jafri%20 %20Global%20Cybersecurity%20Speaker
06

LIVE FORENSIC OF SYSTEM (Laptop, Desktop)

Live Forensic includes assessing a system without performing imaging on it

Read More
Ubaid%20Jafri%20 %20Global%20Cybersecurity%20Speaker
07

DATA COMPROMISE ASSESSMENT

Compromise assessments are high-level investigations where skilled teams

Read More
Ubaid%20Jafri%20 %20Global%20Cybersecurity%20Speaker
08

MOBILE APPLICATION FORENSIC

To analyze the Contacts , Call logs, Messages, Social Media data

Read More
Ubaid%20Jafri%20 %20Global%20Cybersecurity%20Speaker
09

REMOTE IMAGING OF A SYSTEM

The objective is to acquire an image of a system remotely via an agent.

Read More
Ubaid%20Jafri%20 %20Global%20Cybersecurity%20Speaker
10

INVESTIGATING OF AN ABANDON TABLET

Forensic Examiner will be provided an .E01 image of an abandon tablet

Read More
Ubaid%20Jafri%20 %20Global%20Cybersecurity%20Speaker
11

VOICE PITCH ANALYZER

In this project your task is to analyze different voices and compare them

Read More
Ubaid%20Jafri%20 %20Global%20Cybersecurity%20Speaker
12

REMOTE CLONING OF A SYSTEM

In this project investigator will need to clone/snapshot a Windows machines.

Read More
Ubaid%20Jafri%20 %20Global%20Cybersecurity%20Speaker
13

USER THREAT INTELLIGENCE GATHERING

We will use Maltego which will search and capture as much information

Read More
Ubaid%20Jafri%20 %20Global%20Cybersecurity%20Speaker
14

ANDROID MALWARE ANALYSIS

In this project, investigator will need to assess Static and Dynamic malware analysis

Read More
Ubaid%20Jafri%20 %20Global%20Cybersecurity%20Speaker
15

NETWORK FORENSIC OF A CELL PHONE

In this project we will perform an experimental forensic study on multiple applications

Read More
Ubaid%20Jafri%20 %20Global%20Cybersecurity%20Speaker
16

READ COMMAND HISTORY

This project is specifically designed to Windows based operating system

Read More
Ubaid%20Jafri%20 %20Global%20Cybersecurity%20Speaker
17

PACKET CAPTURING USING SDR (SOFTWARE DEFINED RADIO)

In this project we have used HACK-RF ONE which captures 10 MHZ to 5 Ghz of frequency

Read More
Ubaid%20Jafri%20 %20Global%20Cybersecurity%20Speaker

Ethical Hacking Projects

01

Remote Mirroring Application

A tool is required to perform a remote mirroring function for a client/server machine. A portable agent which will be executed in the server and connects back with its client.

Read More
Ubaid%20Jafri%20 %20Global%20Cybersecurity%20Speaker
02

Searching for Unofficial/illegitimate presence over the internet

A Web based application is required to be developed using PHP/ASP/JSP/WEBRTC in which Google Dorking and keywords based searching will be used to find any unofficial presence of a company is hosted over the internet. Note: there will be a whitelisting of company official domains, URL, Web Links. a part from them all should be collected and counted in a blacklist We have customize and added around 200+ domain in this open source tool called "Sherlock" use to populate data on behalf of usernames, email address, domain name.

Read More
Ubaid%20Jafri%20 %20Global%20Cybersecurity%20Speaker
03

Auto Video Recorder

This project allows a user to setup a domain using WEBRTC services which help to record video of the user using Cell phone, laptop having camera installed in it. Application would have the ability to record the live video of the victim front cam, ability to hide itself from being detected by any EndPoint Protection program. The Program has been developed using PHP language and WEBRTC Protocol with customize programming.

Read More
Ubaid%20Jafri%20 %20Global%20Cybersecurity%20Speaker
04

Automated Data Exfiltration

This project allows a user to setup a vulnerable USB drive for the victim, as soon as the hacker plug in the USB drive in the system, it automatically execute the script and copy all the important files including (pptx, xlsx, docx, pdf, jpg, png, gif, txt, zip) etc. from the system and make a copy of these files in the system by creating a Hidden folder, once the copying process is done it than starts compressing and protecting the copied data in the disk. As soon as the data is copied it finally starts uploading the data to the cloud The Program has been developed using batch script and assembly language

Read More
Ubaid%20Jafri%20 %20Global%20Cybersecurity%20Speaker
05

Office 365 Phishing Email Malware Campaign

This project allows a user to setup a vulnerable and fake Office 365 webpage in order to deceive the victim. As soon as the victim clicks on the fake URL, it will popup a page claiming to be an office 365 page. forcing the victim to enter the credentials, as soon as the victim will enter the credentials it will send the credentials to Hackers Cloud The Program has been developed using PHP Language.

Read More
Ubaid%20Jafri%20 %20Global%20Cybersecurity%20Speaker
06

Capture Public IP of Victim

This project allows an intruder to setup an application and installed it in the victim machine. As soon as the victim will open the system it will automatically send public IP information to the hacker The Program has been developed using C#. Net.

Read More
Ubaid%20Jafri%20 %20Global%20Cybersecurity%20Speaker