CyberCure Knowledge Base “Certified Information

Transcription

CyberCure Knowledge Base “Certified Information
CyberCure Knowledge Base
“Certified Information Security Specialist v 3.0”
45 Days (60 Hrs.) Course Curriculum
Introduction to Ethical Hacking
•
•
•
•
•
•
•
What is Hacking?
o Definition of hacking
o Hacking Legal or Illegal?
o Future Scope in this Field
o Job Opportunities
Who are hackers?
o Difference Between Hacker and a Cracker?
o How to become a hacker?
o Why do we need a hacker?
o Case Studies
Types of Hackers(As per working)
o White Hat Hacker
o Black Hat Hacker
o Grey Hat Hacker
o Hactivists
Types of Hackers(As per Knowledge)
o Coder
o Admin
o Script Kiddie
hacking methodology
o Reconnaissance
o Scanning
o Gaining Access
o Maintaining Access
o Clearing Tracks
Indian Cyber Law
o ISMS
o IT Act 2000
o ISO/IEC 13335
o ISO/IEC 17799 (ISO/IEC 27002:2005)
o ISO/IEC 27000 SERIES
o ISO/IEC 31000
How to Become a Security Expert
o How to secure yourself from Attackers
o Stopping and Tracing of Attacks
Methodology and Concepts of Ethical Hacking
•
Reconnaissance
o Banner Grabbing
Telnet Banners
HTML Analysis
JavaScript Analysis
o Web ripping
Website at offline Mode
• Website Downloaders
o Internet Download Manager(Grabber)
o HT Website Copier
o Black Widow
o Etc.
• Website Rippers
Downloading Server side code
o Foot printing
Name Space Lookup
Trace Routing Techniques
• TraceRT
• Visual Trace Route
Whois Lookup Query
• Manual Whois
• Whois Lookup Using Tools
o Finger printing
Email Trackers
TTL
Network Mapping
•
Scanning
o IP Scanners
Private IP Scanners
Public IP Scanners
LanGaurd Network Scanner
Advance IP Scanner
IP Eye
o Port Scanners
Advanced Port Scanner
Nmap
o Web Server Scanners
Operating system Scanners
CMS Scanners
Vulnerability Analysis Scanners
•
Gaining Access
o Attacks on Networks
o
o
o
o
Attacks on Webservers
Attacks on Wireless Technologies
Attacks on Emails
Attacks on Bluetooth
•
maintaining Access(back doors)
o Operating System Backdoors
Flaws of Windows
Flaws in Linux
Live Operating Systems
o Rootkits
o Shell Injections
o Network Backdoors
•
Clearing Tracks
Operating System Hacking and Security
•
Introduction to Operating systems
o System Softwares
o Open Source Operating Systems
o MS-Window
XP
VISTA
SEVEN
•
Windows Hacking
o Introduction to Windows Security Architecture
Windows Login Process
Security Account Manger
LM/NTLM Hashes
Access Control List
Group Policies
o Attacks on Windows Login Password
Retrieving Windows Passwords
• Brute Force Attacks
o Dictionary Attacks
o Rainbow Tables
o Password Guessing via Combinations and
Permutations.
Resetting Windows Password
• Live Operating Systems
• In-built Commands
• Windows Flaws
• LM/NTLM hash Replacement
Bypassing Windows Passwords
Windows Backdoors
• Live Operating system
• Inbuilt Flaws
Group Policy Modifications
Registry Editing
GP Editors
Tool Development in Visual Basic for Privilege Escalation
o
•
Linux Hacking
o Introduction to Linux
Operating system in Linux
• Live Operating Systems
o Installation and Usage
Ubuntu
Back Track
Introduction to Kernel
Introduction to GRUB
Security in Linux
o Cracking Linux passwords
Resetting Linux Passwords
Resetting Grub Passwords
•
Steganography
o Hiding Messages Behind Images
Without tools
With tools
o Hiding Data Behind Images
Without Tools
With tools
o Steganalysis
•
Cryptography
o Encryption & Decryption
o Public Key Encryption
o Hashing
MD5
RSA
SHA
Whirlpool etc.
o Introduction to Famous Algorithms
o Using Encryption in Web Programming
o Data Encrypting tools
•
Key loggers(Monitoring Tools)
o Introduction to Key loggers
o Using Key loggers
o Development of Keyloggers
o
Detecting Key loggers and Monitoring Tools
•
Alternate Data Streaming ( in Windows 7)
o Injecting Data inside a File
o Detecting ADS Files
Streams
•
Registry Editing
o Introduction to Registries
o Registries as Windows Spinal Cord
o Windows Tweaks
Manual Modifications in Windows
Putting Restrictions in windows
Bypassing Restrictions
Developing Windows Tools Using Registries and Visual Basics
E-mails: Attacks and Security
•
•
•
•
What is an E-mail?
Working of E-mail
Traveling of an E-Mail
Email Servers
o Definition
o Configuration
Post Cast Server
MS Outlook
o Usage
Sending Mails From our own Email Servers
•
E-mail Forgery
o Anonymous Mailing techniques
How Is E-Mail Forgery Possible?
Ways of Email Forgery
• Using Anonymous Mailers(Email Servers)
o Post Cast Servers
• Using Websites
• Using Self Developed PHP Script
o Developing a Script
o Using a Script
o Sending Attachments in Fake Mails
o
E-mail Spammers
What is a Spam Mail
Why do mail get into Spam Folder
Spam Filtering
o
E-Mail Bombers
Introduction to E-Mail Bombers
Using Bombers
• Developing PHP Scripts for Email Bombing
• Sending Big Attachments in Email Bombers
•
Security to Anonymous Mailing
o Can User stop Receiving Fake Mails?
o Tracing an Attacker
Tracing the Server
Tracing the Sender
Tracing the IP
Tracing the ISP
•
Attacks on E-Mail Password
o Attackers Anatomy and Psychology while hacking the passwords
o
o
Technical Attacks
Using Fake Websites: Phishing
• Steps in Phishing
• PHP Scripts for Phishing
o File Handling Scripts
o Password Mailing Scripts
DNS Re-Direction : Pharming
• Desktop Phishing
• Developing PHP Scripts for Multiple Pharming Pages
Hijacking the Authenticated Session: Cookie Stealing
• Manual Cookie Stealing
• Cookie Stealing Via JavaScript
• Remote Cookie Stealing
Non-Technical Attacks
Shoulder Surfing
Dumpster Diving
Social Engineering
•
Securing the E-Mail Passwords
o Password Policies
o Benefits of SSL Certificate for a User.
o Anti – Trust Policies
•
Email Forensics
o E-Mail Header Analysis
Manual Analysis
Analysis via Website
Email Tracing Soft wares
o
Whois LookUp Query
Tracing the Owner of the Server
o
Tracing a Sender of an E-Mail
Tracing Sender’s IP Address
Tracing Sender’s Location
Internet: Vulnerability and Security
•
•
Identity Masking: Proxies
o Introduction to Proxies
o How Proxy can HIDE USER IDENTITY?
o Type of Proxies
Web Proxies
Proxy Servers
HTTP Tunneling Proxies
Unintentional Proxies
o
Web Proxies
Using Proxy Websites
Using Google as a Proxy Website
Finding Proxy Websites
o
Anonymous Proxy Servers
Types of Proxies Servers
• Transparent proxy Server
• Opaque Proxy Servers
Finding Proxy Servers
Using Proxy Servers
• Pretending to be from other Countries
o
Sock Chain Techniques
Proxy inside Proxy
Using TOR
o
HTTP Tunneling
Bypassing Network Proxies
Accessing Blocked Websites and Content
o
Un-Intentional Proxies
Google as a Proxy Server
RFI attacks
Web Servers
o XSS- Cross Site Scripting
Introduction to XSS
Finding JavaScript
o
o
CSRF- Cross Site Request Forgery
Directory Traversal Attack
Finding the Website with DT Vulnerability
Database Hijacking
Server Side Code Retrieval
o
o
o
Website Scanners
Exploits on CMS
Attacks on Ajax
•
Database Server
o Attacks on Database servers
o SQL Injection
o Advance SQL Injection
o Blind SQL Injection
o URL Based SQL Injection
•
•
Using Browsers as Hacking Tools
Google Dorks
o Using Google as a Dorks
o Finding Confidential data Using Google
o Hacking IP Cameras
o Using GHDB
•
Counter-Measures
o Securing website from XSS
o Securing website from CSRF
o Securing website from SQL Injection
o Secure Website Programming
o Securing website from DT Attack
o Restricting Google From Websites
Robots.txt
Networks and Security
•
•
Introduction to Networking
o Client/Server Architecture
o TCP/IP Protocol
Devices in Networking
o Routers
o Modems
o Switch
o Wi-Fi Devices
o Network Adapters
•
Terminology in Networking
o IP Address
Public IP
Private IP
o MAC
o LAN
o WAN
o MAN
o VPN
o Leased Lines
•
Attacks on Networks
o Sniffing
o ARP Poisoning(MITM)
Using Windows
Using Back Track
o
DNS Spoofing
Using Windows
Using Back Track
o
SSL Redirection
Using Back Track
Buffer Overflow Attacks
Windows Hijacking
• XP
• SEVEN
Metasploit Framework
o Denial of service attacks(DoS)
o Distributed Denial of service attacks(DDoS)
o MAC Flooders
o Mac Spoofing
Wireless networks(Wi-Fi)
Introduction to Wireless Fidelity
Advantages/Disadvantages of Wireless Networks
Wireless Encrypting Keys:
o WEP
o WPA
o WPA2
Modes of Wireless Network Cards
o Managed Mode
o Monitor Mode
o Ad-Hoc Mode
Working on Ad-Hocs
o Using Laptop as Router
o Providing Internet in LAN with Data Card
o
•
•
•
•
•
•
•
•
Rouge Access Point
Network Security and Prevention
o Configuring Firewalls
Hardware Firewalls
Software Firewalls
o Configuring Honeypots
o Configuring Proxy Servers
Putting Restriction on Network
• Restricting Website
• Restricting Download Speed
• Restricting Content
o Intrusion Detection System (IDS)
Introduction to IDS
Configuring IDS
o Intrusion Prevention System (IPS)
Introduction to IPS
Configuring IPS
o Anti-Sniffers
Viruses, Trojans and Malwares
•
•
•
•
•
•
•
•
What are malwares?
Trojans
o What is a Trojan?
o Types of Trojans
Trojan Attack Methods
o Direct Connection
o Reverse Connection
Some Knows Trojans
Detection of Trojan
o Using Anti-Trojan Software
o Manual Detection
TCP View
Process Viewer
Process Explorer
Viruses
Working and Functionality of Viruses
Development
o Batch Programming
Programming
• Development of Folder lockers
• Registry tweaks and Tricks
o Lock Autorun Virus
o Enabling/Disabling Task Manager
o Enabling/Disabling Folder option, etc
• Developing Professional Security tools
Compilation and EXE Generation
o
Visual Basics Programming
Developing Viruses and Patches using VB
•
Detection and Manual Removal
o Detecting Viruses
o Process Monitoring
o Manual Removal of Viruses
Using Safe Mode
Using Live Operating Systems
•
•
•
•
Introduction to Malwares
Introduction to Anti-Viruses
Working of Anti-Viruses
Removal of Malwares
Mobile Hacking – VOIP, Android and Software’s RE
•
•
•
•
Introduction to Mobile Technology
o Operating Systems
Series 60 Nokia
Android from Google
MAC Operating System for I-Phones
VOIP – Definition and Usage
o What is VOIP
o Requirements for Setting up VOIP server
Asterisk Configuration
SIP Connections
Call Forgery
o Call from any number
Using Soft Phones
Using Websites
Using Series 60 mobile Phones
SMS Forgery
o Sending SMS from any number
o Attack on Facebook
•
Security to Mobile Attacks
o Call Data Records Recognition
o VOIP Identification
o Nigerian 419 Scam(Advance Fee Attacks)
•
Mobile Forensics
o Blackberry Hack
o Series 60 Voice Recording with Beep Suppression
o Chinese Mobile Advantages
Software Reverse Engineering
•
•
•
•
•
•
•
What is Reverse Engineering
Software - Definition
Disassembling the Softwares
o Getting the code of EXEs
o Manipulating the Code of EXEs
Dis-assemblers & Debuggers
o Olly DBG
o Windows Dis-assembler
Software Cracking & Serial Key Phishing
o Analyzing Assembly Code of Software
o Tracing the Error Message
o Setting Break Point
o Stepping the Assembly Code
o Checking the Registers for the Key
Software Patching
o Disassembling a Software
o Error Tracing
o Decoding the Instructions
o Generating Patch to inject the instruction
o Running the Patch
Applying Application Security
o Introduction to Application Encryption
o Using the Setup Encrypters
o Applying strong Serial Key Algorithms
Computer Forensics and Cyber Crime Investigation
•
•
•
•
Introduction to Computer Forensics
The Objectives of Computer Forensics
Reasons for Cyber Attacks
Computer Forensics
•
Introduction to Data Storage
o FAT32 File Partitions
o NTFS File Partitions
o Data Storage Devices
Hard Disk
Flash Drives
Compact Disks
DVDs
Blue Ray Disks
• Data Storage Threats and Techniques
o File Attributes
Hidden
Read Only
System File
Alternate Data Streams (Windows 7)
Steganography
File Permissions(Access Control Lists)
Readable
Writable
Executable
Full Control
Data Storage Analysis
o Removing the File Attributes
o Detecting the ADS Files
o Tracing hidden messages behind Images
o Removing File Permissions
o File Properties
o Recovering Deleted Files
o Disk Imaging and Cloning
o Recovering Files from Crash Hard disk
o Bypassing Biometric Passwords
Write Protected Pen Drives
o Making a Write Protected Pen drives
o Formatting the Write Protected Pen Drive
o
o
o
•
•
•
•
Digital Forensics
Data Recovery
o Acquiring Data
o Duplicating Data
o Recovering Deleted Files