Surveillance

  • GSM Architecture
  • CDMA Architecture
  • GPRS Architecture and Monitoring
  • 4G Architecture and Monitoring
  • GPRS CDR Analysis
  • GPRS Dump Analysis
  • CDR Analysis
  • BTS Dump Analysis
  • Spoof Call Tracking
  • Gateway Tracing
  • Satellite Phones
  • IP Addressing in GSM Networks
  • Detecting 2g 3g Cell IDs in Tower Dump Analysis
  • Tracking Phone Numbers from IP Address in GSM
  • Trunk
  • Surveillance at Border Areas
  • Crime Scene Mapping & Monitoring
  • Reverse Sweep GSM/CDMA/VOIP Gateway Traversal
  • Location Zeroing Concepts on Live Targets
  • Movement Tracking on Google Maps from CDR
  • Pattern Matching In Different CDRs and Tower Dumps

Cyber Crime Investigation

  • What is cyber crime
  • Internet Monitoring System
  • IP address allotment
  • Phone Tracking
  • Phone Hijacking
  • Whatsapp Monitoring
  • Facebook Monitoring
  • Sentiment Analysis
  • Laptop Tracking
  • Remote GPS tracking
  • Bank Frauds Cracking
  • Fake Websites Tracking
  • Archived Websites Analysis
  • Remote Location Grabbing
  • Online Fraud Investigation
  • Keylogging and Safeguard
  • Computer and Network Security Basics
  • Encryption and Decryption
  • Man in the Middle Attacks
  • Mobile Phone and Computer Data Recovery
  • Remote Computer Hijacking
  • Fingerprinting and Identifying targets
  • Reverse Engineering Encrypted Communication Apps
  • Clearing CCTV Footage
  • Anti-theft systems
  • Intelligence gathering system
  • Online Suspect tracking
  • Tracking users on other social networks
  • Dark web investigation
  • Bitcoins & Mining
  • Image, Video, Audio Forensics
  • Computer Forensics
  • Malware Analysis
  • Offensive Tracking
  • Revolutionary Tools For Monitoring & Tracking
  • Apps For Operations
  • Portrait/Sketch Building Using Tools
  • Open Source Intelligence & Sentiment Analysis
  • Google Advanced Search Techniques
  • Reverse Image Search Analysis
  • Reverse Video Search Analysis
  • Spy Apps/Softwares
  • Vulnerability Analysis and Penetration Testing
  • Malware Analysis

 

Advanced Linux Security

  • Performance Basics
  • Kernel Tuning
  • Filesystem Tuning
  • Network and Service Performance
  • System Security
  • System Auditing
  • Network Performance & Security
  • Web Server Performance
  • E-Mail Server Performance
  • NFS and Samba Server Performance
  • Kernel Security
  • Securing Files and Filesystems
  • PAM
  • OpenSSL
  • Shadow Passwords and OpenSSH
  • Secure Remote Passwords
  • xinetd
  • Network Service Security
  • Web Server Security
  • DNS Server Security
  • E-Mail Server Security
  • FTP Server Security
  • Samba and NFS Server Security
  • Firewalls
  • Firewalls, VPNs, and SSL Tunnels
  • Firewall Security Tools
  • Vulnerability Assessment Tools
  • SELinux

Advanced Linux Administration

  • Installation
  • System Initialization
  • Disks and Partitioning
  • File Systems and Such
  • Networking
  • Package Management
  • User Administration – Detailed
  • Network Installs
  • System Logging, Monitoring, and Automation
  • The Kernel
  • System Security
  • Remote Access
  • Web Services
  • NFS
  • Samba
  • FTP
  • DNS
  • Network Services
  • Email Services
  • Troubleshooting
  • Virtualization with KVM, Virtualbox, VMWare, OpenVZ
  • Linux Shell Scripts: System Administration, Security, Networking, File Transfers

Advanced Penetration Testing

Module 1: Starting with Kali Linux 

  • Kali, Backtrack, Backbox, Fedora Live Linux
  • Configuring network services and secure communications
  • Updating Operating System
  • Configuring and customizing Operating System
  • Managing third-party applications

Module 2: Identifying the Target – Passive Reconnaissance

  • Basic principles of reconnaissance
  • Open Source intelligence
  • DNS reconnaissance and route mapping
  • Obtaining user information
  • Profiling users for password lists

Module 3: Active Reconnaissance and Vulnerability Scanning     

  • Advanced Vulnerability Scanning Tools and Scripts
  • Stealth scanning strategies
  • Identifying the network infrastructure
  • Enumerating hosts
  • Port, operating system, and service discovery
  • Employing comprehensive reconnaissance applications

Module 4: Exploit

  • Threat modeling
  • Using online and local vulnerability resources
  • Exploiting multiple targets with Armitage
  • Metasploit Framework
  • Bypassing IDs and antivirus detection

Module 5: Post Exploit – Action on the Objective

  • Bypassing Windows User Account Control
  • Conducting a rapid reconnaissance of a compromised system
  • Finding and taking sensitive data – pillaging the target
  • Creating additional accounts
  • Using Metasploit for post-exploit activities
  • Escalating user privileges on a compromised host
  • Replaying authentication tokens using incognito
  • Accessing new accounts with horizontal escalation
  • Covering your tracks

Module 6: Post Exploit – Persistence

  • Compromising the existing system and application files for remote access
  • Using persistent agents
  • Maintaining persistence with the Metasploit Framework
  • Creating a standalone persistent agent with Metasploit
  • Redirecting ports to bypass network controls

Module 7: Physical Attacks and Social Engineering   

  • Social Engineering Toolkit
  • Fully Undetectibles
  • Using the PowerShell alphanumeric shellcode injection attack
  • Hiding executables and obfuscating the attacker’s URL
  • Escalating an attack using DNS redirection
  • Physical access and hostile devices

Module 8: Exploiting Wireless Communications

  • Configuring Kali for wireless attacks
  • Wireless reconnaissance
  • Bypassing a Hidden Service Set Identifier
  • Bypassing the MAC address authentication
  • Compromising a WEP encryption
  • Attacking WPA and WPA2
  • Cloning an access point
  • Denial-of-service attacks

Module 9: Reconnaissance and Exploitation of Web-based Applications

  • Conducting reconnaissance of websites
  • Vulnerability scanners
  • Testing security with client-side proxies
  • Server exploits
  • Application-specific attacks
  • Maintaining access with web backdoors

Module 10: Exploiting Remote Access Communications

  • Exploiting operating system communication protocols
  • Exploiting third-party remote access applications
  • Attacking Secure Sockets Layer
  • Attacking an IPSec Virtual Private Network

Module 11: Client Side Exploitation

  • Attacking a system using hostile scripts
  • The Cross-Site Scripting Framework
  • The Brower Exploitation Framework – BeEF
  • A walkthrough of the BeEF browser