Sie sind auf Seite 1von 12

Cyber Forensics & Information Security Specialist

Course Curriculum (10 pages)


16 Hrs. (8 Hrs/Per Day)

Concept of Cyber Forensics

What is Forensics?

What is Cyber Crime Investigation?

Concept of Best for End-User Theorem

Security

User-Friendly

Low Development Cost

Technologies on which Cyber Forensics is done?


o

SIM

Mobile Handset

Emails

Web Server

Database Servers

Data Storage Devices

Operating Systems

Software Source Code analysis

Networks

Wireless

Wired

Forensics Preparation and Implementation


o

Mobile Technology

Preparation phase Pre Forensics Stage

Implementation Phase
1

Post Forensics Stage

Relation Between Computer Forensics and Ethical Hacking

Email Header Analysis: IP Tracing

Introduction to the Email Technology


o

What is an Email?

How does an Email work?

Objects in an Email

Email Attacks
o

Anonymous Emails

Email Forgery

PHP Mail Scripts

Free Website for Fake Emails

Compromised Email IDs Leading to Web Defacements

Email Password Hacking

Email and Web Synchronization

Email Bombing(Email Data loss)

Email Analysis
Analyzing Email Headers
Tracking email accounts
Detecting the Fake Emails
Analyzing the Email Account
Tracing the attackers
Attacks on Passwords(Account Compromise)
Fake Profile Developers(Identity Theft)
Attacks engaging in Financial Frauds

Web Server/Database Server Forensics

Introduction to Web Technologies


2

Email Service Providers

Social Networking Websites

Website Control Panel

Database Server

Server Applications

Root Servers

Shared Web Hosting Servers

Web Application Threats


o

Attacks on Social Profiles

Account Defacement

Identity Thefts

Intellectual Property theft

SQL Injections

Basic SQL Injection

Form based

URL Based

Advance SQL Injection

Form Based

URL Based

Upload Vulnerability

PHP Remote Code Execution

PHP Shell Injections

Mass Defacements

Upload Vulnerability

CMS based Attacks

Web Server Threats


o
o
o

Web Server pwning


Tracing The Owner
Reverse IP Lookup

Social Engineering(Practical Implementation)

Log Analysis
3

Finding Logs

Time Filtering

Checking out attack details

Reaching the Attacker

OS Forensics

Introduction to Windows XP, 7, 8


o

Security Architecture of Windows

NT Technology Operating system

Operating System Log Analysis

Monitoring Tools

Bypassing Windows Passwords

Syskey passwords

Login Password

Bitlocker passwords

Introduction to Linux Based Ubuntu


o Gnome Desktop Environment
o KDE Desktop Environment
o

Grub 1

Grub 2

Bypassing Linux Security

Data recovery from Hierarchical File System

Data Storage Devices

Formats of Data Storage


o

FAT32 File Partitions

NTFS File Partitions

Data Storage Devices


4

Hard Disk

Flash Drives

Compact Disks

DVDs

Blue Ray Disks

Data Storage Threats and Techniques


o

Playing with Attributes

Hidden

Read Only

System File

Alternate Data Streams (Windows 7)

Steganography

File Permissions(Access Control Lists)

Readcable

Writable

Executable

Full Control

Data Shredding and Recovery


o

Removing the File Attributes

Detecting the Streams Files

Tracing hidden messages behind Images

Removing File Permissions

File Properties

Recovering Deleted Files

Retrieving data without memory reference

Disk Imaging and Cloning

Recovering Files from Crash/format Hard disk

Bypassing Biometric Passwords

Write Protected Pen Drives


o

Making a Write Protected Pen drives


5

Formatting the Write Protected Pen Drive


Malwares for Data Storage Devices
o

Malware Development

Malware Removal

Network Forensics: Wired and Wireless

Introduction to Network Technologies


o

Explaining the Terminologies in a Network

IP Address

MAC Address

Clients

Servers

Switch

Router

Local Area Network v/s Wide Area Network

Setting up a Local Area Network

Introduction to Firewalls

Hardware Firewall v/s Software Firewalls

Introduction to IDS/IPS/Honeypots

Attacks on Network
o

MAC Address Spoofing

Denial of Service Attack

Active Network Monitoring

Passive Network Monitoring: Sniffing

ARP Poisoning: Man in the Middle Attack

DNS Spoofing

Bypassing Network Proxies

Network Analysis
o

Detecting attacks on Network

Analysis of Logs on Servers

Analyzing Real Time Network Traffic

Tracing the Network Attacker

Presenting the Network Traffic Report

Restricting Websites on Network

Introduction to Wireless Technologies


o

A Brief History of Wireless

The Benefits of Modern Wireless Technology

The New Risks Created by Wireless Technology

Overview of Modern Wireless Technology

Bluetooth

Infrared

Wireless Local Area Networks

Wireless Terminology

Access Points

BSSID

ESSID

Beacons

Data Packets

Channel

Wireless Hotspots

Wireless Security

WEP Key

WPA Key

Wireless Threats
o

Eavesdropping

Traffic Analysis

Data Tampering

Denial-of-Service (DoS)

War-Driving

Active War Driving

Passive War Driving

Cracking the WEP Key Encryption

Wireless Analysis
o

Wireless Network Enumeration

Network Monitoring
8

Tracing the Attacker

Analyzing Wireless Logs


Mobile Phone Exploration: Sim Based and HandSet Based

Introduction to Mobile technology.

Handset based Mobile Exploration


o

Harm of Addiction of Mobiles Technology

Consistent Web Sessions on Mobile Phone

Voice Modulators

Voice Tappers

Mobile Monitoring tools

Operating system based Attacks

Android Rooting

Nokia Series 60 Smart Phones

Mobile Game Cheats

Mobile a Tracking Device

SIM Based Exploration


o

Concept of VOIP

Introduction

Usage

Implementation

SIP Lines

Call Forgery Attacks

Caller ID Spoofing

Nigerian 419 Scams

SMS Spoofing

Tracing the Forged Calls

Recovery from Forgot patterns & pins(Android Phones)

Mobile Cheat Sheet

Software Code Analysis

Software Engineering Definition

Software Reverse Engineering Definition

Introduction to SOPA

Disassembling the Softwares

Retrieving the code of EXEs

Manipulating the Code of EXEs

Dis-assemblers & Debuggers


o

Olly DBG

Windows Dis-assembler

Software Cracking & Serial Key Phishing


o

Analyzing Assembly Code of Software

Tracing the Error Message

Setting Break Point

Stepping the Assembly Code

Checking the Registers for the Key

Software Patching
o

Disassembling a Software

Error Tracing

Decoding the Instructions

Generating Patch to inject the instruction

Running the Patch

Applying Application Security


o

Introduction to Application Encryption

Using the Setup Encrypters

Applying strong Serial Key Algorithms

10

11

12

Das könnte Ihnen auch gefallen