Beruflich Dokumente
Kultur Dokumente
What is Forensics?
Security
User-Friendly
SIM
Mobile Handset
Emails
Web Server
Database Servers
Operating Systems
Networks
Wireless
Wired
Mobile Technology
Implementation Phase
1
What is an Email?
Objects in an Email
Email Attacks
o
Anonymous Emails
Email Forgery
Email Analysis
Analyzing Email Headers
Tracking email accounts
Detecting the Fake Emails
Analyzing the Email Account
Tracing the attackers
Attacks on Passwords(Account Compromise)
Fake Profile Developers(Identity Theft)
Attacks engaging in Financial Frauds
Database Server
Server Applications
Root Servers
Account Defacement
Identity Thefts
SQL Injections
Form based
URL Based
Form Based
URL Based
Upload Vulnerability
Mass Defacements
Upload Vulnerability
Log Analysis
3
Finding Logs
Time Filtering
OS Forensics
Monitoring Tools
Syskey passwords
Login Password
Bitlocker passwords
Grub 1
Grub 2
Hard Disk
Flash Drives
Compact Disks
DVDs
Hidden
Read Only
System File
Steganography
Readcable
Writable
Executable
Full Control
File Properties
Malware Development
Malware Removal
IP Address
MAC Address
Clients
Servers
Switch
Router
Introduction to Firewalls
Introduction to IDS/IPS/Honeypots
Attacks on Network
o
DNS Spoofing
Network Analysis
o
Bluetooth
Infrared
Wireless Terminology
Access Points
BSSID
ESSID
Beacons
Data Packets
Channel
Wireless Hotspots
Wireless Security
WEP Key
WPA Key
Wireless Threats
o
Eavesdropping
Traffic Analysis
Data Tampering
Denial-of-Service (DoS)
War-Driving
Wireless Analysis
o
Network Monitoring
8
Voice Modulators
Voice Tappers
Android Rooting
Concept of VOIP
Introduction
Usage
Implementation
SIP Lines
Caller ID Spoofing
SMS Spoofing
Introduction to SOPA
Olly DBG
Windows Dis-assembler
Software Patching
o
Disassembling a Software
Error Tracing
10
11
12