This hands-on course is designed for investigators who want to learn more about the methodology of host intrusions and the forensic artifacts left behind. This course goes into not only the technical aspects of host intrusions, but also discusses the methodology commonly used by attackers.
The course begins with an introduction and explanation of the classroom’s virtual workspace. Instruction addresses topics, such as methods of reconnaissance, in-depth exploration of browser exploits triaging a live host, intrusion analysis methodology, data hiding and phishing techniques, and malware infection. Other areas of study include performing collections with EnCase® Portable, various investigation techniques, and escalating privileges.
The course combines forensic examinations with live incident response in a network environment. Students learn how to examine a compromised server or workstation in the field to obtain and analyze host, network, volatile data, and log artifacts.
Students will take part in real-world scenarios by performing several different types of attacks on a mock victim machine and then examine the victim computer using EnCase® Forensic to identify the artifacts left behind by the attacker. Many different types of tools and programs will be discussed and used during the course.
In addition to the various hacker tools, students will also utilize and discuss a variety of forensic tools, including EnCase Forensic, the direct network preview, and network intrusion EnScript® programs for live incident response and collection/analysis of volatile data.
Delivery method: Group-Live. NASBA defined level: advanced.
The course will cover the following topics:
• Conducting reconnaissance activities and using honey networks
• The life cycle of a cyber attack and the anatomy of a browser exploit
• Conducting a triage of a live host
• Understanding and establishing a viable methodology for intrusion analysis
• Data hiding and phishing activities
• Identifying and combatting malware infections
• Analysis of compromised systems of remote access software and drive by web browser exploits
• Analysis of memory, event logs, packet captures, and malware
• Use of tools to escalate privileges and to enhance user capabilities