computer forensics and exploration
DESCRIPTION
Computer Forensics and ExplorationTRANSCRIPT
CyberCure Technologies Pvt. Ltd(An ISO 9001:2008 Certified)
“Computer Forensics & Exploration Specialist”Course Curriculum (Hands-on)
16 Hrs. (8 Hrs/Per Day)
Concept of Cyber Crime Investigation
What is Forensics? What is Cyber Crime Investigation? Concept of “Best for End-User Theorem”
o Securityo User-Friendlyo Low Development Cost
Technologies on which Cyber Forensics is done?o Mobile Technology
SIM Mobile Handset
o Emailso Web Servero Database Serverso Data Storage Deviceso Operating Systemso Software Source Code analysiso Networks
Wireless Wired
Forensics Preparation and Implementationo Preparation phase – Pre Forensics Stageo Implementation Phaseo Post Forensics Stage
Relation Between Computer Forensics and Ethical Hacking
Email Header Analysis: IP Tracing
Introduction to the Email Technologyo What is an Email?o How does an Email work?o Objects in an Email
Email Attackso Anonymous Emails
Email Forgery PHP Mail Scripts Free Website for Fake Emails
o Compromised Email IDs Leading to Web Defacements Email Password Hacking Email and Web Synchronization Email Bombing(Email Data loss)
Email Analysiso Analyzing Email Headerso Tracking email accountso Detecting the Fake Emailso Analyzing the Email Accounto Tracing the attackers
Attacks on Passwords(Account Compromise) Fake Profile Developers(Identity Theft) Attacks engaging in Financial Frauds
o Examples: Live Case Study Solved By CyberCure Technologies
Web Server/Database Server Forensics
Introduction to Web Technologieso Email Service Providerso Social Networking Websiteso Website Control Panelo Database Servero Server Applicationso Root Serverso Shared Web Hosting Servers
Web Application Threatso Attacks on Social Profiles
Account Defacement Identity Thefts Intellectual Property theft
o SQL Injections Basic SQL Injection
Form based URL Based
Advance SQL Injection Form Based URL Based
o Upload Vulnerabilityo PHP Remote Code Executiono PHP Shell Injectionso Mass Defacementso Upload Vulnerabilityo CMS based Attacks
Web Server Threatso Web Server pwningo Tracing The Ownero Reverse IP Lookupo Social Engineering(Practical Implementation)o Log Analysis
Finding Logs Time Filtering
Checking out attack detailso Reaching the Attacker
OS Forensics
Introduction to Windows XP, 7, 8o Security Architecture of Windowso NT Technology Operating system
Operating System Log Analysis Monitoring Tools Bypassing Windows Passwords
o Syskey passwordso Login Passwordo Bitlocker passwords
Introduction to Linux Based Ubuntuo Gnome Desktop Environmento KDE Desktop Environmento Grub 1o Grub 2
Bypassing Linux Security Data recovery from Hierarchical File System
Data Storage Devices
Formats of Data Storageo FAT32 File Partitionso NTFS File Partitions
Data Storage Deviceso Hard Disko Flash Driveso Compact Diskso DVDso Blue Ray Disks
Data Storage Threats and Techniqueso Playing with Attributes
Hidden Read Only System File
o Alternate Data Streams (Windows 7)o Steganographyo File Permissions(Access Control Lists)
Readcable Writable Executable Full Control
Data Shredding and Recoveryo Removing the File Attributeso Detecting the Streams Fileso Tracing hidden messages behind Imageso Removing File Permissionso File Propertieso Recovering Deleted Files
Retrieving data without memory referenceo Disk Imaging and Cloningo Recovering Files from Crash/format Hard disko Bypassing Biometric Passwords
Write Protected Pen Driveso Making a Write Protected Pen driveso Formatting the Write Protected Pen Drive
Malwares for Data Storage Deviceso Malware Developmento Malware Removal
Network Forensics: Wired and Wireless
Introduction to Network Technologieso Explaining the Terminologies in a Network
IP Address MAC Address Clients Servers Switch Router
o Local Area Network v/s Wide Area Networko Setting up a Local Area Networko Introduction to Firewallso Hardware Firewall v/s Software Firewallso Introduction to IDS/IPS/Honeypots
Attacks on Networko MAC Address Spoofingo Denial of Service Attacko Active Network Monitoringo Passive Network Monitoring: Sniffingo ARP Poisoning: Man in the Middle Attacko DNS Spoofingo Bypassing Network Proxies
Network Analysiso Detecting attacks on Networko Analysis of Logs on Serverso Analyzing Real Time Network Traffico Tracing the Network Attackero Presenting the Network Traffic Reporto Restricting Websites on Network
o Restricting Users on Networko Restricting Bandwidth on Network
Introduction to Wireless Technologieso A Brief History of Wirelesso The Benefits of Modern Wireless Technologyo The New Risks Created by Wireless Technologyo Overview of Modern Wireless Technology
Bluetooth Infrared Wireless Local Area Networks
o Wireless Terminology Access Points BSSID ESSID Beacons Data Packets Channel
o Wireless Hotspotso Wireless Security
WEP Key WPA Key
Wireless Threatso Eavesdroppingo Traffic Analysiso Data Tamperingo Denial-of-Service (DoS)o War-Driving
Active War Driving Passive War Driving
o Cracking the WEP Key Encryption Wireless Analysis
o Wireless Network Enumerationo Network Monitoringo Tracing the Attackero Analyzing Wireless Logs
Mobile Phone Exploration: Sim Based and HandSet Based
Introduction to Mobile technology. Handset based Mobile Exploration
o Harm of Addiction of Mobiles Technology Consistent Web Sessions on Mobile Phone
o Voice Modulatorso Voice Tapperso Mobile Monitoring tools
Operating system based Attacks
o Android Rootingo Nokia Series 60 Smart Phoneso Mobile Game Cheatso Mobile a Tracking Device
SIM Based Explorationo Concept of VOIP
Introduction Usage Implementation
o SIP Lines Call Forgery Attacks Caller ID Spoofing Nigerian 419 Scams
o SMS Spoofing Tracing the Forged Calls Recovery from Forgot patterns & pins(Android Phones) Mobile Cheat Sheet
Software Code Analysis
Software Engineering – Definition Software Reverse Engineering – Definition Introduction to SOPA Disassembling the Softwares
o Retrieving the code of EXEso Manipulating the Code of EXEs
Dis-assemblers & Debuggerso Olly DBGo Windows Dis-assembler
Software Cracking & Serial Key Phishingo Analyzing Assembly Code of Softwareo Tracing the Error Messageo Setting Break Pointo Stepping the Assembly Codeo Checking the Registers for the Key
Software Patchingo Disassembling a Softwareo Error Tracingo Decoding the Instructionso Generating Patch to inject the instructiono Running the Patch
Applying Application Securityo Introduction to Application Encryptiono Using the Setup Encrypterso Applying strong Serial Key Algorithms