A investigacao de crimes ciberneticos
MASTER THE ART OF
CYBER INVESTIGATION
A comprehensive, hands-on training program for IT and Security Professionals. Covering intelligence gathering, forensics, threat hunting, and legal frameworks.
OSINT & DIGITAL FOOTPRINTING
Open-Source Intelligence is the backbone of any cyber investigation. Learn to systematically collect, analyze, and correlate publicly available data to profile targets and uncover hidden connections.
dork:// site:target.com inurl:admin OR inurl:login OR inurl:portal
# Exposed sensitive files
dork:// site:target.com filetype:pdf OR filetype:xlsx OR filetype:docx
# Config/environment file exposure
dork:// site:target.com filetype:env OR filetype:conf OR filetype:bak
# Find email addresses linked to a domain
dork:// "@target.com" -site:target.com
# Subdomain enumeration via cert logs
cmd:// curl -s "https://crt.sh/?q=%.target.com&output=json" | jq '.[].name_value'
// Always document queries + timestamps as part of chain of custody
NETWORK FORENSICS
Network forensics involves capturing, recording, and analyzing network traffic to detect intrusions, reconstruct attacks, and collect evidence. Every packet tells a story.
filter: dns && frame.len > 512
# Detect possible beaconing (repeated connections to same IP)
filter: ip.dst == 185.220.101.x && tcp.flags.syn == 1
# HTTP POST requests (possible data exfiltration)
filter: http.request.method == "POST"
# SMB traffic (lateral movement indicator)
filter: smb || smb2
# TLS with suspicious certificate
filter: tls.handshake.type == 1 && !(tls.handshake.extensions_server_name)
# Extract files from pcap (tshark)
cmd: tshark -r capture.pcap --export-objects http,./extracted/
| Pattern | Indicator | Tool to Detect |
|---|---|---|
| Port Scan | Sequential SYN packets to multiple ports | nmap, Zeek, Suricata |
| DNS Tunneling | Long subdomains, high query frequency | dnstop, Zeek DNS logs |
| C2 Beaconing | Regular interval connections to external IP | Zeek, RITA, Elastic SIEM |
| Data Exfiltration | Large outbound transfers off-hours | NetFlow, Wireshark stats |
| Lateral Movement | SMB/WMI/RDP between internal hosts | Zeek, Windows Event Logs |
| ARP Poisoning | Duplicate ARP replies, MAC conflicts | Wireshark ARP filter |
DARK WEB INVESTIGATIONS
Understand the architecture of darknets, safely navigate anonymous networks, and conduct intelligence operations targeting underground markets, forums, and threat actor infrastructure.
cmd: openssl s_client -connect [onion]:443 2>/dev/null | openssl x509 -text
# Check if onion service has clearnet presence (cert transparency)
cmd: curl "https://crt.sh/?q=<cert_fingerprint>&output=json"
# Analyze HTTP headers for server fingerprinting
cmd: torsocks curl -I http://[onion].onion/ 2>/dev/null
# Passive: monitor Tor exit nodes for clearnet callbacks
// Correlation attacks: match timing of Tor entry/exit traffic
// Hostname leaks: PHP errors, error pages revealing real IPs
SOCIAL MEDIA INVESTIGATION
Social Media Intelligence (SOCMINT) enables investigators to profile individuals, track behavior over time, geolocate activity, and uncover connections between online personas and real identities.
cmd: python3 sherlock.py target_username --output results.txt
# WhatsMyName — OSINT username enumeration
cmd: python3 whatsmyname.py -u target_username
# Holehe — check email registration across services
cmd: holehe [email protected] --only-used
# Extract metadata from profile photo
cmd: exiftool profile_photo.jpg | grep -E "GPS|Location|Date"
// Pattern: same username with slight variations (e.g. h4cker → h4cker_, xh4ckerx)
MALWARE ANALYSIS
Malware analysis enables investigators to understand attacker tools, extract indicators of compromise, attribute attacks, and develop detection signatures. From triage to full reverse engineering.
cmd: sha256sum sample.exe && md5sum sample.exe
# Extract readable strings
cmd: strings -a sample.exe | grep -E "(http|\.exe|cmd|powershell|base64)"
# Identify packer/obfuscation
cmd: die sample.exe # Detect-It-Easy
cmd: PEiD sample.exe
# PE header analysis
cmd: pecheck sample.exe # imports, sections, entropy
// High entropy sections (>7.0) = encrypted/packed payload
// Check imports: CreateRemoteThread, VirtualAlloc = injection
| IOC Type | Where to Find | Example |
|---|---|---|
| File Hashes | Static analysis | SHA256: a3f4b2... |
| C2 Domains/IPs | Dynamic / strings | 185.220.101.45 |
| Mutex Names | Dynamic (API monitor) | Global\MutexXYZ |
| Registry Keys | ProcMon dynamic | HKCU\Run\svchost32 |
| User-Agent Strings | Network capture | Mozilla/4.0 (compatible; MSIE 6.0) |
| File Paths | ProcMon / strings | %APPDATA%\svcupdate.exe |
| Encryption Keys | Memory dump / debugger | AES key extracted from heap |
LEGAL & ETHICAL FRAMEWORKS
Cyber investigations operate within strict legal boundaries. Understanding jurisdiction, authorization, evidence handling, and ethical obligations is critical to successful prosecution and professional integrity.
Evidence without a documented chain of custody is inadmissible in court. Every action performed on evidence must be recorded, including who accessed it, when, what tools were used, and any changes made. Hash verification before and after is mandatory.
| Activity | Requirement | Jurisdiction |
|---|---|---|
| OSINT (public data) | None (ethical guidelines apply) | Universal |
| Network traffic capture (own network) | Written authorization | Local policy |
| Penetration testing | Signed scope document | CFAA / local law |
| Email content access | Court order / warrant | ECPA / GDPR |
| Cross-border data request | MLAT process | International |
| Dark web monitoring | Depends on platform interaction level | Varies |
CRYPTOCURRENCY TRACING
Blockchain's immutable ledger is a goldmine for investigators. Learn to trace transactions, deanonymize wallets, follow illicit fund flows, and link on-chain activity to real-world identities.
cmd: curl https://api.blockcypher.com/v1/btc/main/txs/[TX_HASH]
# Trace wallet balance and transaction history
cmd: curl https://blockchain.info/rawaddr/[WALLET_ADDRESS]
# Python: build transaction graph using networkx
python: import networkx as nx
G = nx.DiGraph()
G.add_edge(input_addr, output_addr, amount=btc_value)
// Blockchain explorers: Blockchair, OXT.me, Breadcrumbs, GraphSense
// Commercial tools: Chainalysis Reactor, Elliptic, CipherTrace
INCIDENT RESPONSE
Structured incident response minimizes damage, enables forensic evidence preservation, and drives systemic improvement. This module covers the full IR lifecycle from detection to lessons learned.
cmd: netstat -anob | findstr ESTABLISHED
# List running processes with parent PIDs
cmd: wmic process get name,processid,parentprocessid,commandline
# Recently modified files (last 24h)
PS: Get-ChildItem C:\ -Recurse | Where-Object {$_.LastWriteTime -gt (Get-Date).AddHours(-24)}
# Scheduled tasks (common persistence)
cmd: schtasks /query /fo LIST /v | findstr "Task Name\|Status\|Run"
# Export event logs (Security, System, PowerShell)
PS: wevtutil epl Security C:\ir\security.evtx
// Always capture volatile data FIRST: RAM > Processes > Network > Disk
PIVOTING TECHNIQUES
Pivoting is the art of using a discovered data point — an IP, domain, email, hash, or account — to jump to new, connected intelligence. The core skill that separates good investigators from great ones.
api: https://api.passivetotal.org/v2/pdns/passive?query=185.220.x.x
# Find all IPs using same SSL certificate (pivot on cert fingerprint)
shodan: ssl.cert.fingerprint:"aa:bb:cc:dd..."
# Find servers with identical Cobalt Strike configs
shodan: product:"Cobalt Strike" port:443,80,50050
# JA3 fingerprint pivot (same malware TLS fingerprint)
cmd: ja3 -j capture.pcap | grep "bd0bf25947d4a37404f0424edf4db9ad"
# Domain registration pattern (same WHOIS data)
cmd: whois attacker.domain | grep "Registrant Email"
api: https://api.domaintools.com/v1/reverse-whois/?terms=[email]
// Build graph: IP → Cert → Domains → Registrant → More Domains → More IPs
| Starting Point | Pivot To | Tool / Source |
|---|---|---|
| IP Address | Hosted domains, ASN, geo, history | Shodan, PassiveTotal, Censys |
| Domain Name | IP history, WHOIS registrant, subdomains | DomainTools, crt.sh, SecurityTrails |
| SSL Certificate | All IPs/domains using that cert | Shodan, Censys, crt.sh |
| Email Address | Registered domains, personas, breaches | DomainTools reverse-WHOIS, HaveIBeenPwned |
| File Hash | Related malware family, C2, campaigns | VirusTotal, MalwareBazaar, ANY.RUN |
| Username | Cross-platform accounts, email, real ID | Sherlock, WhatsMyName, Maltego |
| Bitcoin Address | Transaction history, linked wallets, exchanges | Chainalysis, OXT.me, Breadcrumbs |
| JA3 Fingerprint | All hosts with same TLS fingerprint | Shodan, ja3er.com |
A real investigation starts with one indicator and expands outward. Example: A single phishing domain → passive DNS reveals 12 IPs → Shodan reveals 3 share the same SSL cert → cert search reveals 40 more domains → WHOIS reveals a registrant email → reverse-WHOIS reveals 200+ domains → pattern analysis reveals the campaign.
CYBERCRIME LEGISLATION
Cyber investigators must navigate a complex web of national and international laws. This module covers key statutes that define what constitutes a crime, how evidence must be handled, and how cross-border cooperation works.
| Scenario | Applicable Law(s) | Required Action |
|---|---|---|
| Unauthorized access to corporate email system | Lei 12.737/2012, Art. 154-A CP | File police report (boletim de ocorrência), preserve logs |
| Request for subscriber data from Brazilian ISP | Marco Civil da Internet, Art. 22 | Court order required — judicial request (ofício judicial) |
| Bank fraud via Pix/boleto | Lei 14.155/2021, Art. 171 §2-A CP | Report to BACEN, law enforcement; preserve transaction logs |
| Data breach exposing Brazilian personal data | LGPD Art. 48 | Notify ANPD within 72h, notify affected subjects |
| Evidence needed from US-based platform | MLAT Brazil-US / Budapest Convention | Request via MJ (Ministério da Justiça) international channel |
| Sextortion involving minor | ECA (8.069/90), CP Art. 241-A | Priority prosecution, CiberLab / NCMEC reporting |
Scenario: A corporate employee's Gmail account is accessed by an unauthorized third party who copies confidential documents and sends them to a competitor.
DIGITAL FORENSICS FUNDAMENTALS
Digital forensics is the science of collecting, preserving, analyzing, and presenting digital evidence in a legally defensible manner. Every step — from seizure to court — must be documented and reproducible.
Email headers are a critical forensic artifact. They contain the full routing path, originating IP, mail server identifiers, and authentication results. Learning to read them reveals the true origin of phishing, fraud, and threat emails.
Received: from mail.attacker.ru [185.220.101.45]
→ Originating server IP — look up in Shodan, AbuseIPDB, VirusTotal
From: "PayPal Support" <support@paypa1.com>
→ Display name spoofing — note 'paypa1' vs 'paypal'
Reply-To: harvester@tempmail.xyz
→ Different from From: — credential harvesting indicator
Authentication-Results: spf=fail; dkim=none; dmarc=fail
→ SPF/DKIM/DMARC failures = spoofed sender domain
X-Originating-IP: 177.39.45.102
→ True client IP — geolocate and cross-reference
# Tools: MXToolbox Header Analyzer, Google Admin Toolbox, emlAnalyzer
cmd: python3 emlAnalyzer.py -i suspect_email.eml --headers --links --extract
| Trace Type | Location | Forensic Value |
|---|---|---|
| Browser History | %APPDATA%\...\History | Timeline of web activity, searches, downloads |
| Prefetch Files | C:\Windows\Prefetch\ | Proof of program execution (up to 128 entries) |
| LNK Files | %APPDATA%\Roaming\Microsoft\Windows\Recent\ | Recently accessed files — persist after deletion |
| Registry Hives | NTUSER.DAT, SAM, SYSTEM | USB history, installed software, last accessed paths |
| Event Logs | C:\Windows\System32\winevt\Logs\ | Logon events, process creation, service installation |
| Swap / Pagefile | C:\pagefile.sys | Fragments of RAM — can contain passwords, keys |
| Shellbags | Registry: USRCLASS.DAT | Folders browsed — proves user explored specific paths |
| EXIF Metadata | Image files (JPEG, PNG, HEIC) | GPS location, device ID, timestamp of photo |
Scenario: A suspect's iPhone is seized at a crime scene. It is locked with Face ID and a 6-digit PIN. The device has mobile data enabled.
ADVANCED INVESTIGATION & UNDERCOVER
Advanced cyber investigations require going beyond passive OSINT — into covert persona operations, deep web navigation, and active infrastructure monitoring. This module covers high-risk, high-reward investigative techniques used by law enforcement and corporate threat intelligence teams.
# Hidden services (.onion): Client → Guard → Middle → Rendezvous → HS
# Enumerate .onion from Tor consensus (known HSDir nodes)
cmd: torsocks curl -s http://msydqstlz2kzerdg.onion/ 2>/dev/null
# Monitor Tor exit nodes for specific traffic patterns
api: https://check.torproject.org/torbulkexitlist
# Identify .onion → clearnet leakage via HTTP errors
cmd: torsocks curl -v http://target.onion 2>&1 | grep -E "(Location|Server|X-Powered)"
# OPSEC: check your own Tor circuit before operating
cmd: torsocks curl https://check.torproject.org/api/ip
// HS v3 (.onion 56 chars) are cryptographically stronger than v2
// Use Ahmia.fi and Torch as dark web search indexes
Scenario: A financial institution detects that customer credentials appear to be circulating on criminal forums. You are tasked with determining the scope, source, and threat actors involved.
FRAUD & ATTACK INVESTIGATION
The most prevalent cybercrime categories investigated by law enforcement and corporate security teams. This module covers practical investigation methodologies for bank fraud, sextortion, system attacks, social engineering campaigns, and malware incidents.
→ Pix/TED/DOC transaction ID, timestamp, originating account, IP, device fingerprint
→ Beneficiary account (Conta de Destino) — trace ownership via BACEN MED system
# Step 2: Device forensics on victim's phone/computer
→ Check for RAT/banking trojan (Grandoreiro, Mekotio, BRATA family common in BR)
→ Accessibility service abuse (overlays, screen readers used by Android banking malware)
# Step 3: Telecom records (if SIM swap suspected)
→ SIM change log with timestamp, location of requesting store, employee ID
→ Cross with victim's SMS 2FA bypass window
# Step 4: Follow the money
→ Laranjas (money mule accounts) — trace withdrawal patterns (ATM + location data)
// BACEN MED: Mecanismo Especial de Devolução — key tool for fraud chargebacks
Social engineering attacks manipulate human psychology rather than exploiting technical vulnerabilities. Investigation requires both technical forensics and behavioral analysis.
| Attack Type | Indicators | Investigation Approach |
|---|---|---|
| Spear Phishing | Targeted email with personalized content, urgent request, spoofed domain | Email header analysis, domain registration check, OSINT on target to understand what data attacker had access to |
| Vishing (Voice) | Unexpected call claiming to be bank/IT support, requesting OTP or credentials | Caller ID spoofing analysis, telecom records, script analysis to identify campaign breadth |
| Pretexting | Elaborate false scenario to extract information over time | Document all interactions, map the false persona using OSINT, identify data exfiltrated |
| BEC (Business Email Compromise) | Email from "CEO/CFO" requesting urgent wire transfer | Email header analysis (spoofed or compromised account?), financial transaction trace, MLAT if funds sent abroad |
| QR Code Phishing (Quishing) | Malicious QR code in email/document redirecting to credential harvest page | Decode QR, analyze URL, check hosting infrastructure, trace registration data |
Scenario: An employee reports their computer is behaving strangely — slow performance, unexpected pop-ups, and suspicious outbound network traffic detected by the firewall. Suspected banking trojan (Grandoreiro family — prevalent in Brazil and Latin America).
BIBLIOGRAPHY & REFERENCES
A curated, professional bibliography for cyber investigators. Organized by topic area, covering foundational texts, technical references, legal documents, and continuously updated online resources.
| Title | Author(s) | Relevance |
|---|---|---|
| The Art of Invisibility | Kevin Mitnick | OPSEC, digital privacy, investigator mindset — understanding attacker perspective on anonymity |
| Open Source Intelligence Techniques (9th Ed.) | Michael Bazzell | The definitive OSINT manual. Updated annually. Covers every major platform and tool. Essential reading. |
| Practical Malware Analysis | Sikorski & Honig | Static and dynamic malware analysis. IDA Pro, OllyDbg, sandbox techniques. The malware analyst's bible. |
| The Hacker Playbook 3 | Peter Kim | Red team operations, pivoting, lateral movement. Valuable for understanding attacker TTPs from defender's view. |
| Intelligence-Driven Incident Response | Rebekah Brown & Scott Roberts | Threat intelligence integration into IR. Diamond Model, kill chain, F3EAD framework. |
| Digital Forensics and Incident Response (3rd Ed.) | Gerard Johansen | Comprehensive DFIR methodology. Evidence acquisition, memory forensics, log analysis. |
| Rtfm: Red Team Field Manual | Ben Clark | Quick-reference commands for network recon, pivoting, and post-exploitation — useful for understanding attack paths. |
| Applied Cryptography | Bruce Schneier | Understanding encryption — essential for cryptocurrency tracing and secure communication analysis. |
| Document | Source | Key Articles |
|---|---|---|
| Lei 12.737/2012 — Lei Carolina Dieckmann | planalto.gov.br | Art. 154-A (invasão de dispositivo informático) |
| Lei 12.965/2014 — Marco Civil da Internet | planalto.gov.br | Arts. 13, 15 (data retention); Art. 22 (judicial access) |
| Lei 13.709/2018 — LGPD | planalto.gov.br | Arts. 7, 11 (lawful basis); Art. 48 (breach notification) |
| Lei 14.155/2021 — Cyberfraud Enhancement | planalto.gov.br | Arts. 171 §2-A, 154-A §4-A (enhanced penalties) |
| Lei 12.850/2013 — Organized Crime | planalto.gov.br | Art. 10-A (digital undercover agent) |
| Lei 13.964/2019 — Pacote Anticrime | planalto.gov.br | Arts. 158-A to 158-F (chain of custody) |
| Decreto 11.491/2023 — Budapest Convention | planalto.gov.br | Brazil's accession to Budapest Convention framework |
| Resolução BCB 6/2020 — Pix Regulation | bcb.gov.br | MED (fraud return mechanism), data retention obligations |
| Document | Organization | Key Application |
|---|---|---|
| Budapest Convention on Cybercrime (ETS 185) | Council of Europe | International cooperation, mutual legal assistance, definitions of offenses |
| NIST SP 800-61 Rev. 2 — Incident Handling Guide | NIST (US) | IR lifecycle methodology — prepare, detect, contain, eradicate, recover |
| NIST SP 800-86 — Forensic Techniques Integration | NIST (US) | Forensic methodology integration into incident response |
| ISO/IEC 27037:2012 — Digital Evidence | ISO | International standard for identification, collection, and preservation of digital evidence |
| MITRE ATT&CK Framework | MITRE | Adversary TTPs taxonomy — maps attacker behavior for detection and investigation |
| FATF Guidance on Virtual Assets | FATF | Cryptocurrency AML/CFT guidance — critical for crypto tracing investigations |
| RFC 3227 — Evidence Collection Guidelines | IETF | Technical guidelines for network evidence collection and handling |
| Certification | Body | Focus Area |
|---|---|---|
| CompTIA Security+ | CompTIA | Security fundamentals — good baseline before specialization |
| GCFE (GIAC Certified Forensic Examiner) | GIAC/SANS | Windows forensics, timeline analysis, artifact analysis |
| GCFA (GIAC Certified Forensic Analyst) | GIAC/SANS | Advanced forensic analysis, memory forensics, IR |
| OSCP (Offensive Security Certified Professional) | OffSec | Penetration testing — understanding attacker methodology |
| CCE (Certified Computer Examiner) | ISFCE | Digital forensics and legal admissibility |
| CISA (Certified Information Systems Auditor) | ISACA | IT audit and control — useful for regulatory compliance |
| CTIA (Certified Threat Intelligence Analyst) | EC-Council | Threat intelligence lifecycle, OSINT, dark web monitoring |
| Perito em Informática Forense | ABEINFO (BR) | Brazilian forensic examiner certification — recognized by courts |

Comentários
Postar um comentário