Social Icons

Monday, January 01, 2018

Regional Cooperation on Cyber Security : A Deemed Necessity

Sharing here a copy of my article on Regional Cooperation on Cyber Security : A Deemed Necessity, published in PINNACLE journal which is registered with the Indian National Scientific Documentation Centre with ISSN 0972-4044

Sunday, October 29, 2017

BITCOIN FORENSICS AGAIN : Bsides Delhi 2017

1. I have been on a spree like something giving presentations in the domain of BITCOIN FORENSICS for past few months...and more or less talking discussing around the same terms of references but to a new audience always though.Recently participated at Bsides Delhi. Security BSides is a community driven framework for building events by and for information security community members. These events are already happening in major cities all over the world!

The idea behind the Security BSides Delhi is to organise an Information Security gathering where professionals, experts, researchers, and InfoSec enthusiasts come together to discuss. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration. It is an intense event with discussions, demos, and interaction from participants. It is where conversations for the next-big-thing are happening.

2.  Details on the event and about me at https://bsidesdelhi.in/anupam-tiwari/


Thursday, October 12, 2017

BITCOIN FORENSICS : ROAD AHEAD

Gave this presentation and talk on the still evolving field of BITCOIN FORENSICS that brings out the technical overview and evolving forensics developments in the domain at the BLOCKCHAIN SUMMIT held at BrightTalk on 10th Oct 2017 vide webinar




More Details at https://www.brighttalk.com/webcast/13689/272431/bitcoin-forensics

BITCOIN FORENSICS : CHALLENGES & HOPE

Gave this presentation and talk on the still evolving field of BITCOIN FORENSICS that brings out the technical overview and evolving forensics developments in the domain at the "4th  International Information Security Meet “ Hakon’2017, Insecure Cyber of Things – The Hackers Choice" held at Indore,MP.

Tuesday, September 26, 2017

BITCOIN is FOREN"SICK" : Threats and Solutions

1.  The increased use of cryptocurrencies such as Bitcoin among an increasing user base has opened a new avenue of research in the field of digital forensics involving cryptocurrencies. Since the creation of Bitcoin in 2008, cryptocurrencies have begun to make a presence in the world of e-commerce. Cryptography serves as the underlying foundation for Bitcoin, which gives it the benefits of confidentiality, integrity, non repudiation and authentication. Having been designed and built upon the foundation of these four objectives makes Bitcoin an attractive alternative to mainstream currency and provides users with the benefits of payment freedom, security, very low fees, and fewer risks for merchants.

2.  This presentation brings out the aspects and discusses on BITCOIN FORENSICS.The same was presented at National Information Security Summit (NISS) held at Lucknow,a premier International Information Security Awareness, Cyber Forensics, Malware Analysis, Cyber Cop, Cyber Law & Ethical Hacking Summit with skilled & proficient Speakers from government & private sector.


Few pics of the event below:



























Sunday, August 13, 2017

Whonix : Debian GNU/Linux based Security-focused Linux distribution

1.     Even if one is not doing anything wrong, he is being watched and recorded in real time as Edward Snowden revealed few years back. Most Internet users value online anonymity, with majority saying they have taken steps to remove or mask their digital footprints, and  reporting that they have taken steps to avoid being observed by specific people, organizations, or governments.Whonix is a Debian GNU/Linux based security-focused Linux distribution which aims to provide privacy, security and anonymity on the internet. The operating system consists of two virtual machines, a "Workstation" and a Tor "Gateway", running Debian GNU/Linux. All communications are forced through the Tor network.This post gives you screen-shots of installation and execution of the virtual appliances involved.

2.    The Gateway VM is responsible for running Tor, and has two virtual network interfaces. One of these is connected to the outside Internet via NAT on the VM host, and is used to communicate with Tor relays. The other is connected to a virtual LAN that runs entirely inside the host.

3.    The Workstation VM runs user applications and is connected only to the internal virtual LAN, and can directly communicate only with the Gateway, which forces all traffic coming from the Workstation to pass through the Tor network. The Workstation VM can "see" only IP addresses on the Internal LAN, which are the same in every Whonix installation.

4.  Download the two virtual machines ie the Gateway and the workstation from https://www.whonix.org/wiki/VirtualBox

5.   Once you download the two machines as above from the link in reference,the following screen-shots will assist you in installation of the same.The two downloaded files are seen below : 
Instead of typically creating a virtual machine and then mounting a vdi,in this case more simply we have to just import the .ova appliance,rest is in auto mode.
Next
Next
Agree to the T&C
Next
Will take few minutes loading
Next
Import
Agree again
Import appliance of the workstation
So u have two machines in the virtualbox console as seen in the bottom two listing below :
Just click both with the start button...and the machine start



Next
Next
Next
Ok
Updated TOR download



Here we see the IP address relating to Budapest Hungary....and thats surely not the user....:-)
Powered By Blogger