Ethical Hacking Practices 2021: IT Surveillance and Computer Forensics @ Eskills Academy
2021 - Ethical Hacking Practices 2021: IT Surveillance and Computer Forensics - Formation de 2H
- Environment Preparation
- Transmitting Volatile Evidence from Evaluated Systems
- Disk Backup Over the Network
- Searching Data
- Analyzing Data Sent by Web Browser
- Analyzing Data Revealed in E-mail Headers
- Remote Capturing User & Hardware Data
- Harvesting User's IP Address
- Creating a Partition Image
- Hiding Data Inside NTFS Alternate Data Streams
- Steganography Techniques
- Accessing Firewall-Protected Services
- File Encryption Methods & Vulnerabilities
- Recovering MS Windows User Passwords
- Analyzing Run Applications Based on Prefetch Folder
- Acquiring Data from Pagefile, Thumbnails & Raw Disk Fragments
- Acquiring Data from Binary Files and Process Memory Dump
- Acquiring Data from E-mail Files
- Acquiring User's Browsing History
- Discovering Web Search Queries
- Examining Remote Host's Availability over LAN
- Checking e-mail's deliverability and analyzing recipient's data
- Creating and installing a keylogger
- Building Custom Tools to Analyze System Security
- Restricting Access to Chosen Websites and Computers
- Using WMI Console for Acquiring and Analyzing Evidence
- Using DNS Cache for Data Gathering
- Using Sleuth Kit for Data Acquisition
- Recovering passwords to FTP, E-mail Accounts and Websites
- Analyzing Corporate Data Leak Scenario