computer forensics and exploration

6
CyberCure Technologies Pvt. Ltd (An ISO 9001:2008 Certified) “Computer Forensics & Exploration Specialist” Course Curriculum (Hands-on) 16 Hrs. (8 Hrs/Per Day) Concept of Cyber Crime Investigation What is Forensics? What is Cyber Crime Investigation? Concept of “Best for End-User Theorem” o Security o User-Friendly o Low Development Cost Technologies on which Cyber Forensics is done? o Mobile Technology SIM Mobile Handset o Emails o Web Server o Database Servers o Data Storage Devices o Operating Systems o Software Source Code analysis o Networks Wireless Wired Forensics Preparation and Implementation o Preparation phase – Pre Forensics Stage o Implementation Phase o Post Forensics Stage Relation Between Computer Forensics and Ethical Hacking Email Header Analysis: IP Tracing Introduction to the Email Technology o What is an Email? o How does an Email work? o Objects in an Email Email Attacks o Anonymous Emails Email Forgery PHP Mail Scripts Free Website for Fake Emails o Compromised Email IDs Leading to Web Defacements Email Password Hacking Email and Web Synchronization Email Bombing(Email Data loss)

Upload: athul-john

Post on 21-Jul-2016

15 views

Category:

Documents


10 download

DESCRIPTION

Computer Forensics and Exploration

TRANSCRIPT

Page 1: Computer Forensics and Exploration

CyberCure Technologies Pvt. Ltd(An ISO 9001:2008 Certified)

“Computer Forensics & Exploration Specialist”Course Curriculum (Hands-on)

16 Hrs. (8 Hrs/Per Day)

Concept of Cyber Crime Investigation

What is Forensics? What is Cyber Crime Investigation? Concept of “Best for End-User Theorem”

o Securityo User-Friendlyo Low Development Cost

Technologies on which Cyber Forensics is done?o Mobile Technology

SIM Mobile Handset

o Emailso Web Servero Database Serverso Data Storage Deviceso Operating Systemso Software Source Code analysiso Networks

Wireless Wired

Forensics Preparation and Implementationo Preparation phase – Pre Forensics Stageo Implementation Phaseo Post Forensics Stage

Relation Between Computer Forensics and Ethical Hacking

Email Header Analysis: IP Tracing

Introduction to the Email Technologyo What is an Email?o How does an Email work?o Objects in an Email

Email Attackso Anonymous Emails

Email Forgery PHP Mail Scripts Free Website for Fake Emails

o Compromised Email IDs Leading to Web Defacements Email Password Hacking Email and Web Synchronization Email Bombing(Email Data loss)

Page 2: Computer Forensics and Exploration

Email Analysiso Analyzing Email Headerso Tracking email accountso Detecting the Fake Emailso Analyzing the Email Accounto Tracing the attackers

Attacks on Passwords(Account Compromise) Fake Profile Developers(Identity Theft) Attacks engaging in Financial Frauds

o Examples: Live Case Study Solved By CyberCure Technologies

Web Server/Database Server Forensics

Introduction to Web Technologieso Email Service Providerso Social Networking Websiteso Website Control Panelo Database Servero Server Applicationso Root Serverso Shared Web Hosting Servers

Web Application Threatso Attacks on Social Profiles

Account Defacement Identity Thefts Intellectual Property theft

o SQL Injections Basic SQL Injection

Form based URL Based

Advance SQL Injection Form Based URL Based

o Upload Vulnerabilityo PHP Remote Code Executiono PHP Shell Injectionso Mass Defacementso Upload Vulnerabilityo CMS based Attacks

Web Server Threatso Web Server pwningo Tracing The Ownero Reverse IP Lookupo Social Engineering(Practical Implementation)o Log Analysis

Finding Logs Time Filtering

Page 3: Computer Forensics and Exploration

Checking out attack detailso Reaching the Attacker

OS Forensics

Introduction to Windows XP, 7, 8o Security Architecture of Windowso NT Technology Operating system

Operating System Log Analysis Monitoring Tools Bypassing Windows Passwords

o Syskey passwordso Login Passwordo Bitlocker passwords

Introduction to Linux Based Ubuntuo Gnome Desktop Environmento KDE Desktop Environmento Grub 1o Grub 2

Bypassing Linux Security Data recovery from Hierarchical File System

Data Storage Devices

Formats of Data Storageo FAT32 File Partitionso NTFS File Partitions

Data Storage Deviceso Hard Disko Flash Driveso Compact Diskso DVDso Blue Ray Disks

Data Storage Threats and Techniqueso Playing with Attributes

Hidden Read Only System File

o Alternate Data Streams (Windows 7)o Steganographyo File Permissions(Access Control Lists)

Readcable Writable Executable Full Control

Page 4: Computer Forensics and Exploration

Data Shredding and Recoveryo Removing the File Attributeso Detecting the Streams Fileso Tracing hidden messages behind Imageso Removing File Permissionso File Propertieso Recovering Deleted Files

Retrieving data without memory referenceo Disk Imaging and Cloningo Recovering Files from Crash/format Hard disko Bypassing Biometric Passwords

Write Protected Pen Driveso Making a Write Protected Pen driveso Formatting the Write Protected Pen Drive

Malwares for Data Storage Deviceso Malware Developmento Malware Removal

Network Forensics: Wired and Wireless

Introduction to Network Technologieso Explaining the Terminologies in a Network

IP Address MAC Address Clients Servers Switch Router

o Local Area Network v/s Wide Area Networko Setting up a Local Area Networko Introduction to Firewallso Hardware Firewall v/s Software Firewallso Introduction to IDS/IPS/Honeypots

Attacks on Networko MAC Address Spoofingo Denial of Service Attacko Active Network Monitoringo Passive Network Monitoring: Sniffingo ARP Poisoning: Man in the Middle Attacko DNS Spoofingo Bypassing Network Proxies

Network Analysiso Detecting attacks on Networko Analysis of Logs on Serverso Analyzing Real Time Network Traffico Tracing the Network Attackero Presenting the Network Traffic Reporto Restricting Websites on Network

Page 5: Computer Forensics and Exploration

o Restricting Users on Networko Restricting Bandwidth on Network

Introduction to Wireless Technologieso A Brief History of Wirelesso The Benefits of Modern Wireless Technologyo The New Risks Created by Wireless Technologyo Overview of Modern Wireless Technology

Bluetooth Infrared Wireless Local Area Networks

o Wireless Terminology Access Points BSSID ESSID Beacons Data Packets Channel

o Wireless Hotspotso Wireless Security

WEP Key WPA Key

Wireless Threatso Eavesdroppingo Traffic Analysiso Data Tamperingo Denial-of-Service (DoS)o War-Driving

Active War Driving Passive War Driving

o Cracking the WEP Key Encryption Wireless Analysis

o Wireless Network Enumerationo Network Monitoringo Tracing the Attackero Analyzing Wireless Logs

Mobile Phone Exploration: Sim Based and HandSet Based

Introduction to Mobile technology. Handset based Mobile Exploration

o Harm of Addiction of Mobiles Technology Consistent Web Sessions on Mobile Phone

o Voice Modulatorso Voice Tapperso Mobile Monitoring tools

Operating system based Attacks

Page 6: Computer Forensics and Exploration

o Android Rootingo Nokia Series 60 Smart Phoneso Mobile Game Cheatso Mobile a Tracking Device

SIM Based Explorationo Concept of VOIP

Introduction Usage Implementation

o SIP Lines Call Forgery Attacks Caller ID Spoofing Nigerian 419 Scams

o SMS Spoofing Tracing the Forged Calls Recovery from Forgot patterns & pins(Android Phones) Mobile Cheat Sheet

Software Code Analysis

Software Engineering – Definition Software Reverse Engineering – Definition Introduction to SOPA Disassembling the Softwares

o Retrieving the code of EXEso Manipulating the Code of EXEs

Dis-assemblers & Debuggerso Olly DBGo Windows Dis-assembler

Software Cracking & Serial Key Phishingo Analyzing Assembly Code of Softwareo Tracing the Error Messageo Setting Break Pointo Stepping the Assembly Codeo Checking the Registers for the Key

Software Patchingo Disassembling a Softwareo Error Tracingo Decoding the Instructionso Generating Patch to inject the instructiono Running the Patch

Applying Application Securityo Introduction to Application Encryptiono Using the Setup Encrypterso Applying strong Serial Key Algorithms