How Does Cyber Cells Catches Black Hat Hackers?

How Does Cyber Cells Catches Black Hat Hackers? 
INTRODUCTION
In vast majority of cases, it's actually not
that tricky to trace an hacker its just time
consuming and tedious.
Hackers get caught as same as murder
criminals get caught.
They both leave behind the evidences.
1.Noob Hackers leaves their Ip address behind.
2.Noob Hackers even don't spoof their Mac address.
3.Cyber cell uses "digital forensics tools" to trace the hackers.
4.Using shitty VPN & proxies which sometime leaves their real IP address out beacuse of poor connectivity. (free ones)
5.Some hackers usually forget to delete the log files which make them easy to tack them back.
6.Even the deleted log files can also be recovered using forensics tools.
7.Some hackers leave other traces behind them, such as software registered on their name.
8.Cyber cell can track your Instagram, Facebook & other social profiles as well if
needed.
9.Leaving any of his data like message, EMAIL, mobile no, some of his public IP can also caught him.
10.Cyber cell can ask the browsing history to your 10 which reveals all your secrets.

HERE'S IS HOW CARDERS GET CAUGHT BY CYBER CLLL
Here is the list of ways to catch fraud:

SHOPPING HABITS:
If a card is being used for a small purchase after a large one, it will obviously alarming for theft handlers.

CUSTOMER USAGE PATTERNS:
if you use your credit card only for online
purchases and suddenly you used it on a
jewellery shop. This situation is alarming.

STRANGE LOCATION:
If you use your card for the first time at the
location where you never used it before or
which is far away.
HERE'S IS HOWN CRIMINAL USING TOR GET CAUGH

Here is the list of ways to catch fraud:

1.An attacker who controls both entry
and exit nodes can use the timing of
requests to match users to their
requests.
2.Tor does not protect you against malware served up by the Å¡ites you
visit.
3.Tor only provides protection from your own ISP watching your traffic, that is all, so in reality Tor is nothing more than an overhyped VPN client.
4.The FBI tracked Ross William Ulbricht
through Tor and shut down Silk
Road on October 2013, then jailed him.
5.The FBI & NSA tracks Tor Lusers by:
By Running  their own hostile Tor nodes.
Using zero-day vulnerabilities of Tor browser 
By tracking user browser Cookies.

The FBI and many other worldwide
government agencies have learned to
monitor the Tor exit nodes to monitor everyone.
If you are using Tor, you are being
monitored because its mostly criminals
that use Tor so you are being watched
along with them.

How Does Cyber Cells Catches Black Hat Hackers? 






Post a Comment

1 Comments

If you have any doubts.Please Let me know