CyberCure Knowledge Base âCertified Information
Transcription
CyberCure Knowledge Base âCertified Information
CyberCure Knowledge Base “Certified Information Security Specialist v 3.0” 45 Days (60 Hrs.) Course Curriculum Introduction to Ethical Hacking • • • • • • • What is Hacking? o Definition of hacking o Hacking Legal or Illegal? o Future Scope in this Field o Job Opportunities Who are hackers? o Difference Between Hacker and a Cracker? o How to become a hacker? o Why do we need a hacker? o Case Studies Types of Hackers(As per working) o White Hat Hacker o Black Hat Hacker o Grey Hat Hacker o Hactivists Types of Hackers(As per Knowledge) o Coder o Admin o Script Kiddie hacking methodology o Reconnaissance o Scanning o Gaining Access o Maintaining Access o Clearing Tracks Indian Cyber Law o ISMS o IT Act 2000 o ISO/IEC 13335 o ISO/IEC 17799 (ISO/IEC 27002:2005) o ISO/IEC 27000 SERIES o ISO/IEC 31000 How to Become a Security Expert o How to secure yourself from Attackers o Stopping and Tracing of Attacks Methodology and Concepts of Ethical Hacking • Reconnaissance o Banner Grabbing Telnet Banners HTML Analysis JavaScript Analysis o Web ripping Website at offline Mode • Website Downloaders o Internet Download Manager(Grabber) o HT Website Copier o Black Widow o Etc. • Website Rippers Downloading Server side code o Foot printing Name Space Lookup Trace Routing Techniques • TraceRT • Visual Trace Route Whois Lookup Query • Manual Whois • Whois Lookup Using Tools o Finger printing Email Trackers TTL Network Mapping • Scanning o IP Scanners Private IP Scanners Public IP Scanners LanGaurd Network Scanner Advance IP Scanner IP Eye o Port Scanners Advanced Port Scanner Nmap o Web Server Scanners Operating system Scanners CMS Scanners Vulnerability Analysis Scanners • Gaining Access o Attacks on Networks o o o o Attacks on Webservers Attacks on Wireless Technologies Attacks on Emails Attacks on Bluetooth • maintaining Access(back doors) o Operating System Backdoors Flaws of Windows Flaws in Linux Live Operating Systems o Rootkits o Shell Injections o Network Backdoors • Clearing Tracks Operating System Hacking and Security • Introduction to Operating systems o System Softwares o Open Source Operating Systems o MS-Window XP VISTA SEVEN • Windows Hacking o Introduction to Windows Security Architecture Windows Login Process Security Account Manger LM/NTLM Hashes Access Control List Group Policies o Attacks on Windows Login Password Retrieving Windows Passwords • Brute Force Attacks o Dictionary Attacks o Rainbow Tables o Password Guessing via Combinations and Permutations. Resetting Windows Password • Live Operating Systems • In-built Commands • Windows Flaws • LM/NTLM hash Replacement Bypassing Windows Passwords Windows Backdoors • Live Operating system • Inbuilt Flaws Group Policy Modifications Registry Editing GP Editors Tool Development in Visual Basic for Privilege Escalation o • Linux Hacking o Introduction to Linux Operating system in Linux • Live Operating Systems o Installation and Usage Ubuntu Back Track Introduction to Kernel Introduction to GRUB Security in Linux o Cracking Linux passwords Resetting Linux Passwords Resetting Grub Passwords • Steganography o Hiding Messages Behind Images Without tools With tools o Hiding Data Behind Images Without Tools With tools o Steganalysis • Cryptography o Encryption & Decryption o Public Key Encryption o Hashing MD5 RSA SHA Whirlpool etc. o Introduction to Famous Algorithms o Using Encryption in Web Programming o Data Encrypting tools • Key loggers(Monitoring Tools) o Introduction to Key loggers o Using Key loggers o Development of Keyloggers o Detecting Key loggers and Monitoring Tools • Alternate Data Streaming ( in Windows 7) o Injecting Data inside a File o Detecting ADS Files Streams • Registry Editing o Introduction to Registries o Registries as Windows Spinal Cord o Windows Tweaks Manual Modifications in Windows Putting Restrictions in windows Bypassing Restrictions Developing Windows Tools Using Registries and Visual Basics E-mails: Attacks and Security • • • • What is an E-mail? Working of E-mail Traveling of an E-Mail Email Servers o Definition o Configuration Post Cast Server MS Outlook o Usage Sending Mails From our own Email Servers • E-mail Forgery o Anonymous Mailing techniques How Is E-Mail Forgery Possible? Ways of Email Forgery • Using Anonymous Mailers(Email Servers) o Post Cast Servers • Using Websites • Using Self Developed PHP Script o Developing a Script o Using a Script o Sending Attachments in Fake Mails o E-mail Spammers What is a Spam Mail Why do mail get into Spam Folder Spam Filtering o E-Mail Bombers Introduction to E-Mail Bombers Using Bombers • Developing PHP Scripts for Email Bombing • Sending Big Attachments in Email Bombers • Security to Anonymous Mailing o Can User stop Receiving Fake Mails? o Tracing an Attacker Tracing the Server Tracing the Sender Tracing the IP Tracing the ISP • Attacks on E-Mail Password o Attackers Anatomy and Psychology while hacking the passwords o o Technical Attacks Using Fake Websites: Phishing • Steps in Phishing • PHP Scripts for Phishing o File Handling Scripts o Password Mailing Scripts DNS Re-Direction : Pharming • Desktop Phishing • Developing PHP Scripts for Multiple Pharming Pages Hijacking the Authenticated Session: Cookie Stealing • Manual Cookie Stealing • Cookie Stealing Via JavaScript • Remote Cookie Stealing Non-Technical Attacks Shoulder Surfing Dumpster Diving Social Engineering • Securing the E-Mail Passwords o Password Policies o Benefits of SSL Certificate for a User. o Anti – Trust Policies • Email Forensics o E-Mail Header Analysis Manual Analysis Analysis via Website Email Tracing Soft wares o Whois LookUp Query Tracing the Owner of the Server o Tracing a Sender of an E-Mail Tracing Sender’s IP Address Tracing Sender’s Location Internet: Vulnerability and Security • • Identity Masking: Proxies o Introduction to Proxies o How Proxy can HIDE USER IDENTITY? o Type of Proxies Web Proxies Proxy Servers HTTP Tunneling Proxies Unintentional Proxies o Web Proxies Using Proxy Websites Using Google as a Proxy Website Finding Proxy Websites o Anonymous Proxy Servers Types of Proxies Servers • Transparent proxy Server • Opaque Proxy Servers Finding Proxy Servers Using Proxy Servers • Pretending to be from other Countries o Sock Chain Techniques Proxy inside Proxy Using TOR o HTTP Tunneling Bypassing Network Proxies Accessing Blocked Websites and Content o Un-Intentional Proxies Google as a Proxy Server RFI attacks Web Servers o XSS- Cross Site Scripting Introduction to XSS Finding JavaScript o o CSRF- Cross Site Request Forgery Directory Traversal Attack Finding the Website with DT Vulnerability Database Hijacking Server Side Code Retrieval o o o Website Scanners Exploits on CMS Attacks on Ajax • Database Server o Attacks on Database servers o SQL Injection o Advance SQL Injection o Blind SQL Injection o URL Based SQL Injection • • Using Browsers as Hacking Tools Google Dorks o Using Google as a Dorks o Finding Confidential data Using Google o Hacking IP Cameras o Using GHDB • Counter-Measures o Securing website from XSS o Securing website from CSRF o Securing website from SQL Injection o Secure Website Programming o Securing website from DT Attack o Restricting Google From Websites Robots.txt Networks and Security • • Introduction to Networking o Client/Server Architecture o TCP/IP Protocol Devices in Networking o Routers o Modems o Switch o Wi-Fi Devices o Network Adapters • Terminology in Networking o IP Address Public IP Private IP o MAC o LAN o WAN o MAN o VPN o Leased Lines • Attacks on Networks o Sniffing o ARP Poisoning(MITM) Using Windows Using Back Track o DNS Spoofing Using Windows Using Back Track o SSL Redirection Using Back Track Buffer Overflow Attacks Windows Hijacking • XP • SEVEN Metasploit Framework o Denial of service attacks(DoS) o Distributed Denial of service attacks(DDoS) o MAC Flooders o Mac Spoofing Wireless networks(Wi-Fi) Introduction to Wireless Fidelity Advantages/Disadvantages of Wireless Networks Wireless Encrypting Keys: o WEP o WPA o WPA2 Modes of Wireless Network Cards o Managed Mode o Monitor Mode o Ad-Hoc Mode Working on Ad-Hocs o Using Laptop as Router o Providing Internet in LAN with Data Card o • • • • • • • • Rouge Access Point Network Security and Prevention o Configuring Firewalls Hardware Firewalls Software Firewalls o Configuring Honeypots o Configuring Proxy Servers Putting Restriction on Network • Restricting Website • Restricting Download Speed • Restricting Content o Intrusion Detection System (IDS) Introduction to IDS Configuring IDS o Intrusion Prevention System (IPS) Introduction to IPS Configuring IPS o Anti-Sniffers Viruses, Trojans and Malwares • • • • • • • • What are malwares? Trojans o What is a Trojan? o Types of Trojans Trojan Attack Methods o Direct Connection o Reverse Connection Some Knows Trojans Detection of Trojan o Using Anti-Trojan Software o Manual Detection TCP View Process Viewer Process Explorer Viruses Working and Functionality of Viruses Development o Batch Programming Programming • Development of Folder lockers • Registry tweaks and Tricks o Lock Autorun Virus o Enabling/Disabling Task Manager o Enabling/Disabling Folder option, etc • Developing Professional Security tools Compilation and EXE Generation o Visual Basics Programming Developing Viruses and Patches using VB • Detection and Manual Removal o Detecting Viruses o Process Monitoring o Manual Removal of Viruses Using Safe Mode Using Live Operating Systems • • • • Introduction to Malwares Introduction to Anti-Viruses Working of Anti-Viruses Removal of Malwares Mobile Hacking – VOIP, Android and Software’s RE • • • • Introduction to Mobile Technology o Operating Systems Series 60 Nokia Android from Google MAC Operating System for I-Phones VOIP – Definition and Usage o What is VOIP o Requirements for Setting up VOIP server Asterisk Configuration SIP Connections Call Forgery o Call from any number Using Soft Phones Using Websites Using Series 60 mobile Phones SMS Forgery o Sending SMS from any number o Attack on Facebook • Security to Mobile Attacks o Call Data Records Recognition o VOIP Identification o Nigerian 419 Scam(Advance Fee Attacks) • Mobile Forensics o Blackberry Hack o Series 60 Voice Recording with Beep Suppression o Chinese Mobile Advantages Software Reverse Engineering • • • • • • • What is Reverse Engineering Software - Definition Disassembling the Softwares o Getting the code of EXEs o Manipulating the Code of EXEs Dis-assemblers & Debuggers o Olly DBG o Windows Dis-assembler Software Cracking & Serial Key Phishing o Analyzing Assembly Code of Software o Tracing the Error Message o Setting Break Point o Stepping the Assembly Code o Checking the Registers for the Key Software Patching o Disassembling a Software o Error Tracing o Decoding the Instructions o Generating Patch to inject the instruction o Running the Patch Applying Application Security o Introduction to Application Encryption o Using the Setup Encrypters o Applying strong Serial Key Algorithms Computer Forensics and Cyber Crime Investigation • • • • Introduction to Computer Forensics The Objectives of Computer Forensics Reasons for Cyber Attacks Computer Forensics • Introduction to Data Storage o FAT32 File Partitions o NTFS File Partitions o Data Storage Devices Hard Disk Flash Drives Compact Disks DVDs Blue Ray Disks • Data Storage Threats and Techniques o File Attributes Hidden Read Only System File Alternate Data Streams (Windows 7) Steganography File Permissions(Access Control Lists) Readable Writable Executable Full Control Data Storage Analysis o Removing the File Attributes o Detecting the ADS Files o Tracing hidden messages behind Images o Removing File Permissions o File Properties o Recovering Deleted Files o Disk Imaging and Cloning o Recovering Files from Crash Hard disk o Bypassing Biometric Passwords Write Protected Pen Drives o Making a Write Protected Pen drives o Formatting the Write Protected Pen Drive o o o • • • • Digital Forensics Data Recovery o Acquiring Data o Duplicating Data o Recovering Deleted Files