Brand Image
0%
Empowering Investigative Minds

IICSF

DF & OSINT Internship Dashboard

Session 1 Introduction to DF & OSINT

The Cyber Crime Unit of City X receives a report from a local business regarding unauthorized access to their network, leading to a data breach. The forensic team initiates an investigation and begins collecting evidence. As a digital forensic analyst, you are required to segregate the evidence based on their source. Identify which pieces of evidence are from open sources and which are from closed sources.

Task 1:
Download the evidence list and Segregate the evidence into open source and closed source categories. Write in the response column “Closed source and Open source.

S1- Cyber

Session 2 Setting Up Lab

You have recently been hired as a junior IT security analyst at a mid-sized company. One of your initial tasks is to set up a virtualized environment using VMware, where you will install and configure a Kali Linux & windows 11 operating system. The goal is to create a secure environment by ensuring all relevant security settings are configured properly.

Task 2:
Screen record download and installation process of Kali Linux in a VMware Virtual Machine. This includes configuring the virtual machine, installing the OS, and reviewing all security settings post-installation.

S2- Cyber

Session 3 Creating Sock Puppet

You are an investigator working in the field of cyber forensics. You've been assigned a task by your organization to verify the authenticity of a social media profile that is suspected to be fake. The profile in question is actively engaging with users and sharing content that could potentially mislead or harm others.

Task 3:
Upload the screenshot of isitai results of the profile picture.

S2- Cyber

Week 1 Weekly Assessment

Session 4 Internet Research Techniques

You are an OSINT (Open Source Intelligence) analyst working on a case involving an individual, who is suspected of engaging in illicit activities across multiple countries. Your task is to gather as much open-source information as possible using basic internet research techniques.

Task 4:
Compile a record for the individual in the evidence.

S4 – Cyber

Session 5 Analyzing Metadata

You are a digital forensic investigator working on a high-profile cybercrime case. The case involves the unauthorized access and exfiltration of sensitive corporate documents from a large multinational company's server. The stolen documents were later found posted on a public forum. The company has provided you with a sample of the leaked document, which includes an image.

Task 5:
You are tasked with analyzing the metadata of the image to gather clues about the origin, authorship, and potential modification of the documents. Upload the PDF of the Metadata report.

S5 – Cyber

Session 6 Image OSINT

In a quiet town, an art gallery owner, Mr. Sharma, reported a rare and valuable painting stolen from his gallery. Despite the security measures, the painting vanished without a trace. A few days after the theft, Mr. Sharma received an anonymous tip claiming that the stolen painting was being sold on an obscure online auction site. However, the tip only provided a low-resolution image of the view from the hotel room where the seller is staying, with no additional details about the seller. .

Task 6:
Perform reverse image search as on the image to trace the origins of the image provided by the anonymous tip. Find the location of the city where the seller is staying.

S6 – Cyber

Week 2 Weekly Assessment

Session 7 Domain and Website Investigation

A multinational company suffered a ransomware attack that encrypted all its critical files. Initial investigation revealed that the attacker gained access through an employee's compromised credentials.

Task 7:
Your task is to test whether the password and username in the evidence file could be captured using Wireshark.

S7 – Cyber

Session 8 Social Media Intelligence (SOCMINT)

A medium-sized e-commerce company, recently suffered a cyber attack where customer payment information was compromised. The attackers spread a malicious link along with some genuine links. 

Task 8:
Your task is to investigate the domain and website associated with the link. Upload a screenshot which indicates whether the link is safe to use or not.

S8 – Cyber

Session 9 Email Tracking and Analysis

A multinational corporation, suspects that one of its employees has been leaking sensitive proprietary data to a competitor. IT security team discovered suspicious image files on the employee's workstation. The files appear to be innocuous at first glance, but the security team suspects that steganography has been used to hide confidential data within the image files. They have asked for a thorough forensic analysis to confirm the presence of hidden information.

Task 9:
Check whether the evidence contains any encrypted message or not. If the image contains a message, upload a screenshot of the message.

S9 – Cyber

Week 3 Weekly Assessment

Session 10 Data Breaches and Leaks

An organization, Cyberxyz Inc., experienced a data breach where the email addresses of over 100,000 customers were leaked. This breach was caused by a vulnerability in the company's email management system, which allowed unauthorized access to the email database. The breach was discovered two weeks after the incident when customers started reporting an increase in spam and phishing emails. 

Task 10:
Your task is to identify the breach and report it.

S7 – Cyber

Session 11 Cross platform OSINT

You are an investigator working on a case involving a suspected cybercriminal group. This group is believed to operate across multiple online platforms, using various social media accounts, websites, and forums to coordinate and execute cyberattacks.

Task 11:
Your task is to gather Open Source Intelligence (OSINT) to identify the key members of the group, their communication channels, and their activities.

S8 – Cyber

Session 12 Report Writing

As a forensic professional working in a forensic lab, You were as assigned to examine a case. The digital evidence provided for examination included the employee’s laptop, a USB drive, and an email archive.

Task 12:
Prepare a comprehensive forensic report detailing the acquisition, analysis, findings, and conclusions of any evidence that you have worked on.

S9 – Cyber

Week 4 Final Assessment