Você está na página 1de 11

THE COMPUTER HACKING FORENSICS INVESTIGATOR CERTIFICATION

Course Description Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHF investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information. !ecuring and analy"ing electronic evidence is a central theme in an ever#increasing number of conflict situations and criminal cases. Electronic evidence is critical in the following situations$ % % % % % % % % % % &isloyal employees Computer break#ins 'ossession of pornography (reach of contract ndustrial espionage E#mail Fraud (ankruptcy &isputed dismissals )eb page defacements *heft of company documents

Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. *his may range from tracing the tracks of a hacker through a client+s systems, to tracing the originator of defamatory emails, to recovering signs of fraud. *he CHF course will provide participants the necessary skills to identify an intruder+s footprints and to properly gather the necessary evidence to prosecute in the court of law ,t the end of this intensive - day class participants will have hands on understanding and experience in Forensics nvestigation.

The CHFI course will benefit: % 'olice and other law enforcement personnel % &efense and .ilitary personnel % e#(usiness !ecurity professionals % !ystems administrators % /egal professionals % (anking, nsurance and other professionals % 0overnment agencies % * managers This course prepares you for EC-Council Computer Hacking Forensics Investigator exam !"-#$%

Duration: - days 12$33 4 -$335

Certification *he Computer Hacking Forensics nvestigator certification exam 678#92 will be available through *homson 'rometric *esting Centre. !tudents need to pass the online prometric exam to receive CHF certification. .

Course Outline
Module 1 Computer Forensics and Investigations as a Profession Understanding Computer Forensics Comparing Definitions of Computer Forensics Exploring a Brief History of Computer Forensics Developing Computer Forensics Resources Preparing for Computing Investigations Understanding Enforcement Agency Investigations Understanding Corporate Investigations aintaining Professional Conduct Understanding File %ystems Understanding t&e Boot %e,uence Examining Registry Data Dis$ Drive -vervie) Exploring icrosoft File %tructures Dis$ Partition Concerns Boot Partition Concerns Examining FA# Dis$s Examining .#F% Dis$s .#F% %ystem Files .#F% Attri/utes .#F% Data %treams .#F% Compressed Files .#F% Encrypted File %ystems 0EF%1 EF% Recovery 2ey Agent Deleting .#F% Files Understanding icrosoft Boot #as$s (indo)s 3P4 56664 and .# %tartup (indo)s 3P %ystem Files Understanding %!D-% %tartup #as$s -t&er D-% -perating %ystems

Module 2 Understanding Computer Investigations Preparing a Computer Investigation Examining a Computer Crime Examining a Company! Policy "iolation #a$ing a %ystematic Approac& Assessing t&e Case Planning 'our Investigation %ecuring 'our Evidence Understanding Data! Recovery (or$stations and %oft)are %etting Up 'our (or$station for Computer Forensics Executing an Investigation *at&ering t&e Evidence Copying t&e Evidence Dis$ Analy+ing 'our Digital Evidence Completing t&e Case Criti,uing t&e Case

Module $ Macintos! and %inu& 'oot Processes and Disk "tructures Understanding t&e acintos& File %tructure Understanding "olumes Exploring acintos& Boot #as$s Examining U.I3 and 7inux Dis$ %tructures U.I3 and 7inux -vervie) Understanding modes Understanding U.I3 and 7inux Boot Processes Understanding 7inux 7oader U.I3 and 7inux Drives and Partition %c&eme Examining Compact Disc Data %tructures

Module 3 Working it! Windo s and DO" "#stems

Understanding -t&er Dis$ %tructures Examining %C%I Dis$s Examining IDE8EIDE Devices

Module ( )!e Investigator*s Office and %a+orator# Understanding Forensic 7a/ Certification Re,uirements Identifying Duties of t&e 7a/ anager and %taff Balancing Costs and .eeds Ac,uiring Certification and #raining Determining t&e P&ysical 7ayout of a Computer Forensics 7a/ Identifying 7a/ %ecurity .eeds Conducting Hig&!Ris$ Investigations Considering -ffice Ergonomics Environmental Conditions 7ig&ting %tructural Design Considerations Electrical .eeds Communications Fire!suppression %ystems Evidence 7oc$ers Facility aintenance P&ysical %ecurity .eeds Auditing a Computer Forensics 7a/ Computer Forensics 7a/ Floor Plan Ideas %electing a Basic Forensic (or$station %electing (or$stations for Police 7a/s %electing (or$stations for Private and Corporate 7a/s %toc$ing Hard)are Perip&erals aintaining -perating %ystems and Application %oft)are Inventories Using a Disaster Recovery Plan Planning for E,uipment Upgrades

Using 7aptop Forensic (or$stations Building a Business Case for Developing a Forensics 7a/ Creating a Forensic Boot Floppy Dis$ Assem/ling t&e #ools for a Forensic Boot Floppy Dis$ Retrieving Evidence Data Using a Remote .et)or$ Connection

Module , Current Computer Forensics )ools Evaluating 'our Computer Forensics %oft)are .eeds Using .ational Institute of %tandards and #ec&nology 0.I%#1 #ools Using .ational Institute of 9ustice 0.U1 et&ods "alidating Computer Forensics #ools Using Command!7ine Forensics #ools Exploring .#I #ools Exploring Ds5dump Revie)ing Drive %py Exploring PDBloc$ Exploring PD(ipe Revie)ing Image Exploring Part Exploring %napBac$ DatArrest Exploring Byte Bac$ Exploring ares(are Exploring DI*% ycroft v: Exploring *rap&ical User Interface 0*UI1 Forensics #ools Exploring AccessData Programs Exploring *uidance %oft)are EnCase Exploring -ntrac$ Using BIAProtect Using 7C #ec&nologies %oft)are Exploring (inHex %pecialist Edition Exploring DI*% Analy+er Professional Forensic %oft)are

Exploring ProDiscover DF# Exploring Data7ifter Exploring A%RData Exploring t&e Internet History "ie)er Exploring -t&er Useful Computer Forensics #ools Exploring 7#--7% Exploring tools Exploring R!#ools Using Explore5fs Exploring ;sta$e Exploring #C# and #C#U#I7s Exploring I7oo$ Exploring Has&2eeper Using *rap&ic "ie)ers Exploring Hard)are #ools Computing!Investigation (or$stations Building 'our -)n (or$station Using a (rite!/loc$er Using 7C #ec&nology International Hard)are Forensic Computers DI*% Digital Intelligence Image A%%ter %olo FastBloc Acard .o(rite (ie/e #ec& Forensic DriveDoc$ Recommendations for a Forensic (or$station

Documenting Evidence -/taining a Digital %ignature

Module / Processing Crime and Incident "cenes Processing Private!%ector Incident %cenes Processing 7a) Enforcement Crime %cenes Understanding Concepts and #erms Used in (arrants Preparing for a %earc& Identifying t&e .ature of t&e Case Identifying t&e #ype of Computing %ystem Determining (&et&er 'ou Can %ei+e a Computer -/taining a Detailed Description of t&e 7ocation Determining (&o Is in C&arge Using Additional #ec&nical Expertise Determining t&e #ools 'ou .eed Preparing t&e Investigation #eam %ecuring a Computer Incident or Crime %cene %ei+ing Digital Evidence at t&e %cene Processing a a<or Incident or Crime %cene Processing Data Centers )it& an Array of RAID% Using a #ec&nical Advisor at an Incident or Crime %cene %ample Civil Investigation %ample Criminal Investigation Collecting Digital Evidence

Module - Digital .vidence Controls Identifying Digital Evidence Understanding Evidence Rules %ecuring Digital Evidence at an Incident %cene Cataloging Digital Evidence 7a/ Evidence Considerations Processing and Handling Digital Evidence %toring Digital Evidence Evidence Retention and edia %torage .eeds

Module 0 Data 1c2uisition Determining t&e Best Ac,uisition et&od Planning Data Recovery Contingencies Using %!D-% Ac,uisition #ools Understanding Ho) Drive%py Accesses %ector Ranges

Data Preservation Commands Using Drive%py Data anipulation Commands Using (indo)s Ac,uisition #ools AccessData F#2 Explorer Ac,uiring Data on 7inux Computers Using -t&er Forensics Ac,uisition #ools Exploring %napBac$ DatArrest Exploring %afeBac$ Exploring EnCase

Bit!%&ifting Using %teganograp&y Examining Encrypted Files Recovering Pass)ords

Module 11 .4mail Investigations Understanding Internet Fundamentals Understanding Internet Protocols Exploring t&e Roles of t&e Client and %erver in E!mail Investigating E!mail Crimes and "iolations Identifying E!mail Crimes and "iolations Examining E!mail essages Copying an E!mail essage Printing an E!mail essage "ie)ing E!mail Headers Examining an E!mail Header Examining Additional E!mail Files #racing an E!mail essage Using .et)or$ 7ogs Related to E!mail Understanding E!mail %ervers Examining U.I3 E!mail %erver 7ogs Examining icrosoft E!mail %erver 7ogs Examining .ovell *roup(ise E!mail 7ogs Using %peciali+ed E!mail Forensics #ools

Module 13 Computer Forensic 1nal#sis Understanding Computer Forensic Analysis Refining t&e Investigation Plan Using Drive%py to Analy+e Computer Data Drive%py Command %)itc&es Drive%py 2ey)ord %earc&ing Drive%py %cripts Drive%py Data!Integrity #ools Drive%py Residual Data Collection #ools -t&er Useful Drive%py Command #ools Using -t&er Digital Intelligence Computer Forensics #ools Using PDBloc$ and PD(ipe Using AccessData=s Forensic #ool$it Performing a Computer Forensic Analysis %etting Up 'our Forensic (or$station Performing Forensic Analysis on icrosoft File %ystems U.I3 and 7inux Forensic Analysis acintos& Investigations Addressing Data Hiding #ec&ni,ues Hiding Partitions ar$ing Bad Clusters

Module 12 5ecovering Image Files Recogni+ing an Image File Understanding Bitmap and Raster Images Understanding "ector Images etafle *rap&ics Understanding Image File Formats Understanding Data Compression Revie)ing 7ossless and 7ossy Compression

7ocating and Recovering Image Files Identifying Image File Fragments Repairing Damaged Headers Reconstructing File Fragments Identifying Un$no)n File Formats Analy+ing Image File Headers #ools for "ie)ing Images Understanding %teganograp&y in Image Files Using %teganalysis #ools Identifying Copyrig&t Issues )it& *rap&ics

Module 13 Writing Investigation 5eports Understanding t&e Importance of Reports 7imiting t&e Report to %pecifics #ypes of Reports Expressing an -pinion Designing t&e 7ayout and Presentation 7itigation %upport Reports versus #ec&nical Reports (riting Clearly Providing %upporting aterial Formatting Consistently Explaining et&ods Data Collection Including Calculations Providing for Uncertainty and Error Analysis Explaining Results Discussing Results and Conclusions Providing References Including Appendices Providing Ac$no)ledgments Formal Report Format (riting t&e Report Using F#2 Demo "ersion

Comparing #ec&nical and %cientific #estimony Preparing for #estimony Documenting and Preparing Evidence 2eeping Consistent (or$ Ha/its Processing Evidence %erving as a Consulting Expert or an Expert (itness Creating and aintaining 'our C" Preparing #ec&nical Definitions #estifying in Court Understanding t&e #rial Process >ualifying 'our #estimony and "oir Dire Addressing Potential Pro/lems #estifying in *eneral Presenting 'our Evidence Using *rap&ics in 'our #estimony Helping 'our Attorney Avoiding #estimony Pro/lems #estifying During Direct Examination Using *rap&ics During #estimony #estifying During Cross! Examination Exercising Et&ics (&en #estifying Understanding Prosecutorial isconduct Preparing for a Deposition *uidelines for #estifying at a Deposition Recogni+ing Deposition Pro/lems Pu/lic Release? Dealing )it& Reporters Forming an Expert -pinion Determining t&e -rigin of a Floppy Dis$

Module 1( Computer "ecurit# Incident 5esponse )eam Incident Response #eam Incident Reporting Process 7o)!level incidents

Module 1$ 'ecoming an .&pert Witness

id!level incidents Hig&!level incidents (&at is a Computer %ecurity Incident Response #eam 0C%IR#1@ (&y )ould an organi+ation need a C%IR#@ (&at types of C%IR#s exist@ -t&er Response #eams Acronyms (&at does a C%IR# do@ (&at is Incident Handling@ .eed for C%IR# in -rgani+ations Best Practices for Creating a C%IR#@

Module 1, %ogfile 1nal#sis %ecure Audit 7ogging Audit Events %yslog essage File %etting Up Remote 7ogging 7inux Process #rac$ing (indo)s 7ogging Remote 7ogging in (indo)s ntsyslog Application 7ogging Extended 7ogging onitoring for Intrusion and %ecurity Events Importance of #ime %ync&roni+ation Passive Detection et&ods Dump Event 7og #ool 0DumpelAexe1 EventCom/ # Event Collection %cripting Event Collection #ools Forensic #ool? f)analog Elements of an End!to!End Forensic #race 7og Analysis and Correlation #CPDump logs Intrusion Detection 7og 0Real%ecure1 Intrusion Detection 7og 0%.-R#1

#&e (indo)s Recycle Bin Digital evidence Recycle Hidden Folder Ho) do I undelete a file@ e5undel -B- UnErase Restorer5666 BadCopy Pro File %cavenger ycroft v: PC ParaC&ute %earc& and Recover %tellar P&oenix Ext54Ext: Cero Assumption Digital Image Recovery File%aver "irtual7a/ Data Recovery R!7inux Drive B Data Recovery Active; U.ERA%ER ! DA#A Recovery

Module 1/ 1pplication Pass ord Crackers Advanced -ffice 3P Pass)ord Recovery A-3PPR Accent 2ey)ord Extractor Advanced PDF Pass)ord Recovery APDFPR Distri/uted .et)or$ Attac$ (indo)s 3P 8 5666 8 .# 2ey Pass)are 2it Ho) to Bypass BI-% Pass)ords BI-% Pass)ord Crac$ers Removing t&e C -% Battery Default Pass)ord Data/ase

Module 10 Investigating .4 Mail Crimes E!mail Crimes %ending Fa$email %ending E!mail using #elnet #racing an e!mail ail Headers Reading Email Headers #racing Bac$

Module 1- 5ecovering Deleted Files

#racing Bac$ (e/ Based E! mail icrosoft -utloo$ ail Pst File 7ocation #ool? R! ail #ool? Finale ail %earc&ing E!mail Addresses E!mail %earc& %ite a/useAnet .et)or$ A/use Clearing House Handling %pam Protecting your E!mail Address from %pam #ool? En$oder Form #ool? e ail#rac$erPro #ool? %PA Punis&er

Example of F#P Compromise F#P logs %>7 In<ection Attac$s Investigating %>7 In<ection Attac$s (e/ Based Pass)ord Brute Force Attac$ Investigating IP Address #ools for locating IP Address Investigating Dynamic IP Address 7ocation of DHCP %erver 7ogfile

Module 21 Investigating 6et ork )raffic .et)or$ Intrusions and Attac$s Direct vsA Distri/uted Attac$s Automated Attac$s Accidental FAttac$sG Address %poofing IP %poofing ARP %poofing D.% %poofing Preventing IP %poofing Preventing ARP %poofing Preventing D.% %poofing "isualCone D%&ield Forensic #ools for .et)or$ Investigations #CPDump Et&ereal .etAnalyst Ettercap Et&ereal

Module 23 Investigating We+ 1ttacks Ho) to #ell an Attac$ is in Progress (&at to Do (&en 'ou Are Under Attac$@ Conducting t&e Investigation Attempted Brea$!in %tep D? Identifing t&e %ystem0s1 %tep 5? #raffic /et)een source and destination Ho) to detect attac$s on your server@ Investigating 7og Files II% 7ogs 7og file Codes Apac&e 7ogs AccessElog 7og %ecurity 7og File Information %imple Re,uest #ime8Date Field irrored %ite Detection irrored %ite in II% 7ogs "ulnera/ility %canning Detection Example of Attac$ in 7og file (e/ Page Defacement Defacement using D.% Compromise Investigating D.% Poisoning Investigating F#P %ervers

Module 22 Investigating 5outer 1ttacks Do% Attac$s Investigating Do% Attac$s Investigating Router Attac$s

Module 23 )!e Computer Forensics Process Evidence %ei+ure et&odology

Before t&e Investigation Document Everyt&ing Confiscation of Computer E,uipment

Module 2$ Data Duplication #ool? R!Drive Image #ool? DriveLook #ool? Dis$Explorer for .#F%

Module 2( Windo s Forensics *at&ering Evidence in (indo)s Collecting Data from emory Collecting Evidence emory Dump anual emory Dump 0(indo)s 56661 anual emory Dump 0(indo)s 3P1 P Dump (indo)s Registry Registry Data Regmon utility Forensic #ool? InCntrlH Bac$ing Up of t&e entire Registry %ystem %tate Bac$up Forensic #ool? Bac$I(in Forensic #ool? Registry (atc& %ystem Processes Process onitors Default Processes in (indo)s .#4 56664 and 3P Process! onitoring Programs Process Explorer 7oo$ for Hidden Files "ie)ing Hidden Files in (indo)s .#F% %treams Detecting .#F% %treams Root $its Detecting Root $its %igverif Detecting #ro<ans and Bac$doors

Removing #ro<ans and Bac$doors Port .um/ers Used /y #ro<ans Examining t&e (indo)s %)ap File %)ap file as evidence "ie)ing t&e Contents of t&e %)ap8Page File Recovering Evidence from t&e (e/ Bro)ser 7ocating Bro)ser History Evidence Forensic #ool? Cac&e onitor Print %pooler Files %teganograp&y Forensic #ool? %tegDetect

Module 2, %inu& Forensics Performing emory Dump on Unix %ystems "ie)ing Hidden Files Executing Process Create a 7inux Forensic #ool$it Collect "olatile Data Prior to Forensic Duplication Executing a #rusted %&ell Determining (&o is logged on to t&e %ystem Determining t&e Running Processes Detecting 7oada/le 2ernel odule Root $its 72 -pen Ports and 7istening Applications 8proc file system 7og Files Configuration Files 7o) 7evel Analysis 7og essages Running syslogd Investigating User Accounts Collecting an Evidential Image File Auditing #ools

Module 2- Investigating PD1 Para/en=s PDA %ei+ure

Module 2/ .nforcement %a and Prosecution Freedom of Information Act Reporting %ecurity Breac&es to 7a) Enforcement .ational Infrastructure Protection Center Federal Computer Crimes and 7a)s Federal 7a)s #&e U%A Patriot Act of 566D Building t&e Cy/ercrime Case Ho) t&e FBI Investigates Computer Crime Cy/er Crime Investigations Computer!facilitated crime FBI Federal %tatutes 7ocal la)s Federal Investigative *uidelines *at&er Proprietary Information Contact la) enforcement #o initiate an investigation

UA%A Copyrig&t -ffice Ho) are copyrig&ts enforced@ %C- vsA IB (&at is Plagiarism@ #urnitin Plagiarism Detection #ools

Module 20 Investigating )rademark and Cop#rig!t Infringement #rademar$s #rademar$ Eligi/ility (&at is a service mar$@ (&at is trade dress@ Internet domain name #rademar$ Infringement Conducting a #rademar$ %earc& Using Internet to %earc& for #rademar$s Hiring a professional firm to conduct my trademar$ searc& #rademar$ Registrations Benefits of #rademar$ Registration Copyrig&t Ho) long does a copyrig&t last@ Copyrig&t .otice Copyrig&t FFair UseG Doctrine

Você também pode gostar