DTraks IMPACT

facts-img

Mission Statement

With the growth of digitalisation, issues involving cybercrime and information security have emerged as transnational concerns that affect people across conventional, geospatial, and temporal boundaries.

DTraks IMPACT is an accelerated online interactive training program organised in association with ThirveDx from Israel, who are having a cloud based lab with pre-configured virtual machines and video learning solutions.

Designed and developed around military training methodologies and hands-on learning, the program is designed to equip the participants with the best cyber weapons required in cybersecurity domain.

Course I - Blue Team Training!

It is a "Zero to Hero" 480 hours accelerated programme with 100 Labs and 9 Scenarios for cyber reskilling!

The objective of the program is to provide potential research opportunities that allow Law Enforcement and Defense officers to reskill the existing IT teams to face the challenges and threats from cyber-attacks. This training program helps the IT teams to perform vulnerability assessments in their inhouse network, software infrastructure and take the necessary preventive measurements.

Highlights of the Syllabus

  • Prework - OS & Networking
  • Network Administration
  • Cybersecurity Essentials
  • Network & Application Security
  • Incident Handling
  • Forensics
  • Malware Analysis
  • Ethical Hacking & Incident Response
  • Security Design Principles
  • Risk Management
  • Overview of Final Scenarios

Detailed Syllabus

Prework - OS & Networking

MODULE 01 - MODULE 01 - Introduction to Linux
Linux History, Distributions, Open-source philosophy, Linux installation, CLI vs GUI

MODULE 02 - MODULE 02 - CLI Fundamentals
CLI & terminal emulators, Filesystem structure, Command structure, Navigating in the filesystem, Gathering system information, Grep basics, Find and Locate, History, Piping

MODULE 03 - MODULE 03 - Users and Permissions
Users, Password management, Groups, Permissions, Sticky bit and PATH

MODULE 04 - MODULE 04 - Networking & System Management
Network testing using Ping and Traceroute, Networking files and configuration, Updating network configuration

MODULE 05 - Package Management
Package installation, APT vs YUM, Git concepts, Apache installation, Other applications

MODULE 06 - Services and hardening
Common services and protocols, SSH and SCP, FTP setup & configuration, Samba setup & configuration, Hardening services

MODULE 07 - Bash Scripting
Bash scripting introduction, Script input and output, Conditions &Arithmetic operators, Working with archives, File integrity, Crontab

MODULE 08 - Host Security
Linux external mounting, Boot protection, PAM, SELinux & AppArmor, Privilege escalation, Crontab security

MODULE 09 - Network Security
iptables, firewalld, fail2ban, Log monitoring, Apache secure configuration, SSH secure configuration


Network Administration

MODULE 01 - Network Security Systems & Architecture
Cisco Certified CyberOps Associate, Networking Recap, Redundancy Methods, Network Security Design, Network Security Systems

MODULE 02 - Secure Management & Access
AAA Concepts, RADIUS Vs. TACACS+, 802.1X Authentication

MODULE 03 - Network Attacks & Mitigation
MAC Spoofing, CAM Table Overflow, Port Security Mitigation, VLAN Hopping, CDP/LLDP Reconnaissance, Secure Dynamic Routing, NTP Attacks, DHCP Attacks

MODULE 04 - Network Traffic Analysis
Advanced Wireshark, Wireshark Statistics, File Extraction, Network Miner, Network Monitor


Cybersecurity Essentials

MODULE 01 - Introduction to Ethical Hacking
Fundamentals, Ethics, Malware, Cyber Attack Cycle

MODULE 02 - Network Scanning
Network Scanning Definition, Nmap Overview, Nmap Scanning Types, Additional Tools

MODULE 03 - MITM Attacks
MITM, ARP Poisoning, DNS Poisoning, Port Stealing, SSL Stripping

MODULE 04 - Brute-Force
Fundamentals, Offline Password Cracking, Online Password Attacks


Network & Application Security

MODULE 01 - Module 01 - Practical Cryptography
Cryptography Concepts, Hash Algorithms, Encryption, Digital Signature & Certifications

MODULE 02 - Module 02 - Firewall Fundamental
Firewall Introduction, pfSense, Firewall Types, Additional Firewall Features

MODULE 03 - Module 03 - VPN Technologies
VPN Concepts, VPN Types, Remote Access VPN, Site-to-Site VPN, Modern VPNs, Risks and Limitations of VPN, Security Considerations

MODULE 04 - Module 04 - Network Monitoring
Introduction to Network Monitoring, Protocol Analyzer, RSA Netwitness, Bro, SNMP, NetFlow, Network Monitoring Tools, Deep Packet Inspection

MODULE 05 - Module 05 - IPS & IDS Concepts
IPS & IDS Overview, IPS\IDS Functions, Implement IPS


Incident Handling

MODULE 01 - Introduction to DFIR
Introduction to DFIR, DF vs IR vs TH, Incident Response planning, Targeted artifacts, DFIR use-cases, DFIR Toolset, SANS & NIST, Forensics

MODULE 02 - Incident Response - Preparation
Defining assets & values, CIA, Risk management, Roles & Responsibilities, 6 & 4 stages of IR, Creating IR Plan, DRP & BCP, GRC, ATT&CK, Compliances – ISO, GDPR, HIPPA, PCI-DSS

MODULE 03 - Incident Response - Response
SOC Operation & Lifecycle, Identification & Scoping, Containment, Intelligence gathering, Eradication, Chain of custody


Forensics

MODULE 01 - Module 01 - Data Acquisition
Dead System Analysis, Live System Analysis, Drive Cloning, Image Mounting, Memory Dumping, Evidence Documentation

MODULE 02 - Module 02 - Live Forensics
Artifacts on a Windows computer, Browser History, USB History, DNS Cache, Prefetch, MRU, Nirsoft

MODULE 03 - Module 03 - Windows Forensics
Windows DF Specifics, NTFS, ADS & MFT, File Carving, Registry Forensics, Forensics using powershell

MODULE 04 - Module 04 - Linux Forensics
Linux Filesystems, Network configuration, Login information, Bash history, Identifying Persistence, Logfile Analysis

MODULE 05 - Module 05 - Network Forensics
Traffic interception & Network Evidence, Reverse Proxx, Wireshark, DF using Wireshark, Common Protocol Analysis, Zeek NSM

MODULE 06 - Module 06 - Memory Analysis
Memory structure, Memory analysis tools, Volatility Breakdown & Usage, Process exploration, DLL inspection, Acquiring memory artifacts


Malware Analysis

MODULE 01 - Introduction to Malware Analysis
What is Malware analysis, Types of malware, Malware analysis types, Structure of PE files & analysis, Static analysis methodology, Sysinternals Suite

MODULE 02 - Understanding Anti Virus’s
VirusTotal, AV engines, Yara Rules, IoC’s and finding them, ClamAV rule-based detection, File signatures & manually creating file, signatures

MODULE 03 - Basic Dynamic Analysis
Dynamic analysis methodology, Dynamic analysis environments, DLL files analysis, Filesystem monitoring, Registry analysis, Network monitoring

MODULE 04 - Sysmon & Sandboxing
Sysmon installation & Configuration, Sysmon – Rule-based detection, Sandbox analysis, Malware samples


Ethical Hacking & Incident Response

MODULE 01 - Social Engineering
Introduction, Social Engineering Toolkit, SE Additional Tools

MODULE 02 - Infrastructure Attacks
Metasploit, Reverse Shell, Lateral Movement

MODULE 03 - Windows Privilege Escalation
Windows Privileges, Windows Local PE, Post Exploitation

MODULE 04 - Linux Privilege Escalation
Linux Local PE, Linux Remote PE

MODULE 05 - Web Application Security Fundamentals
Understanding HTTP, Burp Suite

MODULE 06 - XSS & File Inclusion
Client-Side Web languages, Cross-Site Scripting, Session Hijacking, XSS Mitigations, Local File Inclusion

MODULE 07 - SQL Injection
Introduction to Databases, SQLi

MODULE 08 - Vulnerability Scanners & Reporting
Automated Scanning, Vulnerability Scanners,PT Report Subjects, Regulations


Security Design Principles

MODULE 01 - Endpoint Security Measures
Network & Endpoint Security Introduction, Problems and Risks, Endpoint Security Components, Endpoint Detection & Response, ClamAV Introduction, Yara Rules & Signatures, Whitelist Databases

MODULE 02 - Data Loss Prevention
Sensitive Data, Data Leak Channels, Regular Expressions, DLP Introduction, OpenDLP, Risk, DLP Bypass Techniques

MODULE 03 - Security Strategy
Security Strategy Planning, Security Policy Scoping, Risk Management, Creating organizational security policy, Compliances & Regulations


Risk Management

MODULE 01 - SOC Life Cycle
SOC Fundamentals, SOC Team Responsibilities, Incident Prioritization, Vulnerability Assessment

MODULE 02 - SIEM Introduction
Security Measures, Introduction to SIEM, SIEM Installation, Log Collection & Types

MODULE 03 - Advanced SIEM
Log Queries, Log Parsing, Operators, Advanced Queries

MODULE 04 - Utilizing SOAR in a SIEM Environment
SOAR, Automation Objectives, Successful Defense, Effective Usage, Demisto



Course II - Red Team Training!

It is a “Professional Mastery” 480 Hours intensive program with all the equipped labs and scenarios in the below technologies.

The advanced and intensive training is designed to make you an influential Red Team expert who can counter cyber threats combining the tools and techniques applied as a cyber warrior.

The Blue Team training is a prerequisite for joining this advanced course where you are taught an intermediate to advanced range of Red Team knowledge, with a wide range of lectures and hands on demos.

Highlights of the Syllabus

  • Web Application Penetration Testing
  • Cyber Infrastructure Attacks
  • Android Mobile Security
  • IoT Exploration
  • Reverse Engineering
  • Python for Security
  • Cross-Platform Elevation of Privileges
  • SIEM & SOC
  • Advanced Infrastructure Attacks

Detailed Syllabus

Web Application Penetration Testing

MODULE 01 - Web Fundamentals
Web Technologies Overview, Browser tools & Debugging, OWASP Top10

MODULE 02 - Web Server Installation
Apache Secure Installation, Apache Secure Configuration, Hardening Apache

MODULE 03 -Traffic Manipulation
Burp Suite, OWASP Zap, Web Site Enumeration, Web Application Brute-Force Challenge

MODULE 04 - Web Cryptography
HTTP vs HTTPS, SSL vs TLS, Cipher Suites, OpenSSL – CA vs self-signed certificates

MODULE 05 - Introduction to Client-Side Attacks
Reflected XSS, Stored XSS, DOM XSS

MODULE 06 - Authorization & Authentication
CSRF, Broken Authentication, Broken Authorization, Session Attacks

MODULE 07 - XML Attacks
Configuring & Maintaining Databases, MariaDB, SQL Syntax

MODULE 08 - Marinating Databases
Error-Based SQL Injection, Union-Based SQL Injection, Data Exfiltration, Injection Automation

MODULE 09 - Advanced SQLi
Blind SQL Injection, Time-based injection, NoSQL Injection

MODULE 10 - XML Injection
XML Usage in Web Applications, XXE, SSRF, SSRF through XXE

MODULE 11 - PHP Vulnerabilities
PHP Programming, PHP Vulnerabilities, Insecure Input Filtration

MODULE 12 - LFI/RFI & Directory Traversal
LFI, RFI, Directory Traversal

MODULE 13 - WordPress Hacking
Content management Systems, WPScan, WordPress Enumeration

MODULE 14 - File Upload
PHP Shells

MODULE 15 - File Upload
Nessus, Qualys, Writing Reports

MODULE 16 - Web Hacking Challenges
Web Hacking Challenges


Cyber Infrastructure Attacks

MODULE 01 - Wireshark
Wireshark usage, Capture data on a network, Analysing data using Wireshark

MODULE 02 - Foot printing and reconnaissance
Search engines, People search, Google Hacking DB, Website footprinting, Information gathering

MODULE 03 - Network Scan
Network layout & Services, TCP & UDP handshake, Port scan, IDLE scan, Firewall & IDS evasion, Automation scan

MODULE 04 - Password Cracking
Attack types, Hash types, Local cracking, Remote Cracking

MODULE 05 - Wi-Fi Attack
Wi-Fi encryption, EAPOL protocol, Automated Frameworks, Data sniff, Rouge Access Point

MODULE 06 - Man in the Middle
MITM Technique, Arp spoof, DNS spoof, Bypassing SSL, MITM Automated Frameworks

MODULE 07 - Hacking Frameworks & Automation
Terminology, Search Engines, Automated Framework, Creating malicious files

MODULE 08 - Anonymity on the network
Proxy, VPN, Proxy chain, TOR


Android Mobile Security

MODULE 01 - Introduction to Android & Android Studio
Web Fundamentals - Web Technologies Overview, Browser tools & Debugging, OWASP Top10

MODULE 02 - Android Programming
Java Programming basics - Android Activities life cycle and events, Adding\Defining\Editing visual elements, Create an application with multiple Activities, Signing an Application

MODULE 03 - Android Reverse Engineering
Reversing Android Applications (Decomplication/Java Code Review/Smali Code review (machine code)/Recompiling an app), Code Editing Methods, Explore Reversing Tools & Frameworks, Malicious Android Applications, Getting full control of an Android device with reverse shell

MODULE 04 - Networking & SSL Pinning
Network Moitoring using Burp & Proxy Configuration, Android traffic Interception, SSL Verification Methods, Interception with SSL Pinning, Certificate - Manual obtaining and generating, Bypass Trust Managers

MODULE 05 - MobSF & Drozer
Analysis methodologies (Static Analysis, Dynamic Analysis), MODSF Installation, Security review & Resources, Drozer Server, Sessions, Interacting with services, Android challenges


IoT Exploitation

MODULE 01 - Introduction to IoT
Exploring Shodan (Graphic user Interface, Command Line Interface - Using automation, Collecting data with advance filtering, Extracting data), Mapping operating-systems, applications and IoT devices to specific vulnerabilities

MODULE 02 - Firmware Analysis & Exploitation
Mounting file systems, Firmware analysis (Using Binwalk: Identifying hardcoded vendor “secrets”), Emulating firmware binary, Firmware analysis toolkit - using firmware emulation

MODULE 03 - Exploiting Web Application Vulnerabilities on IoT Devices
OWASP IoT Top 10, Exploitation with Burp Suite, Exploitation using command injection, Exploitation using brute force, Exploitation with CSRF, Extracting vendor credentials

MODULE 04 - Using Physical Tools for IoT Exploitation
Reconnaissance basics, Identifying serial interfaces, Identifying pinouts with multi meter, UART, NAND attack, JTAG (Identifying JTAG pinouts, Using JTAGulator, Debugging with JTAG), USB-TTL

MODULE 05 - SDR (Software-Defined Radio) Based IoT Exploitation
Introduction to SDR, Radio communication analysis, Attacking protocols, RTL-SDR, Capturing FM signals, Analysing wireless signals, Extracting text from signals, Attacking RF (radio frequency) - (Introduction to RF, RF traffic analysis, RF replay attack), HackRF


Reverse Engineering

MODULE 01 - Hello Assembly
What is Assembly, CPU architecture, Registers types & structure, Commands in RAM & RAM’s structure, Stack & Heap, Comparisons - cmp, zf instructions, Basic C, Introduction to IDA

MODULE 02 - Malware Disassembly
IDA overview, Jumping between display, Code-flow analysis, Code segments, Variables identifications, Arithmetic identification, Conditions identification

MODULE 03 - Malware Debugging
Debugging process, Software & Breakpoint, ollyDBG overview, Following the stack, Stepping

MODULE 04 - Patching & Anti-debugging
Combined analysis, Runtime manipulation, Changing code-flow, Patching

MODULE 05 - Patching & Anti-debugging
Anti-debugging, PEB, VM detection, Anti-debugging & VM detection Bypass


Python for Security

MODULE 01 - Introduction to Python
Introduction to code programming, Python installation, PyCharm IDE installation, Creating Project & Python Env configuration, Basic Syntax, String Formation & code Execution

MODULE 02 - Data Types & Conditions
Variables with Different Data Types, User’s Input, Operators, Comparative & Arithmetic, Type Casting, Condition’s, logic and syntax, Dictionary, Tuple & lists, Nested Lists

MODULE 03 - Loops
For Loops, over Lists, While Loops, Break & Continue Uses, Strings Manipulation, Combining Loops & Conditions

MODULE 04 - File System & Error handling
Try & Except, Exceptions Types, Error Handling, full Methodology, File Permissions - (Create, Append, read & Write), OS System Module Functions, Platform Module Functions, Log File Parsing

MODULE 05 - Function & code handling
Functions Structure & uses, Return Different Data Types, Parameters in Functions, Recursion Function and its uses, Scope & Global Keyword, OOP & Proper Code Management

MODULE 06 - Network Communication
Introduction to SOCKET library, Creating Client Socket, Creating Server Socket, Sending & Receiving Data, Set Echo Communication, Client Vs Server, Retrieving Data using OS Module

MODULE 07 - Web Fetching & Parsing
Web Communication library, Requests GET functions, Requests Sessions, Requests with Parameters, Requests Via Post, Beautiful Soup library, Filter & search with bs4, Extracting Data from Web.


Cross-Platform Elevation of Privileges

MODULE 01 - Local Privilege Escalation in Windows OS
Windows Local Escalation technics

MODULE 02 - Post Exploitation
Post Exploitation Techniques, Credential Extraction, Persistence & Hidden Users, Covering the Tracks

MODULE 03 - Local Privilege Escalation in Linux OS
Linux Local Privilege Escalation technics

MODULE 04 - Linux Remote Escalation
Automated Tasks, Bad Path Configuration

MODULE 05 - Windows Advanced Remote Escalation
DLL Hijacking, DLL Injection, Exploiting Unquoted Services, Exploiting Group Policy Preferences

MODULE 06 - Architecture Vulnerabilities
Dirty COW, Eternal Blue

MODULE 07 - Pivoting
PsExec & WMIexec, Pass the Hash & NTLM, Session Hijacking


SIEM & SOC

MODULE 01 - Security Measures
Network Security Measures, Endpoint Security Measures, Additional Security Measures, SIEM Basics, SIEM Logs, SIEM Monitoring

MODULE 02 - SIEM Solutions + Log Generation & Collection
SIEM Operations, Get to Know Splunk, Splunk Configuration, Splunk Logging & Filtering, Additional Splunk Abilities, Understanding System Logs

MODULE 03 - Log Generation & Collection + Monitoring Attacks
Windows Event Viewer, GPO Configuration, Endpoint Security, Monitoring Attacks, Attack Differentiation, Corelated Rules, Windows Security Logs

MODULE 04 - Security Measures Integration – ESET + SOC Life Cycle
ESMC & Agent, Tasks & Group Configuration, Policy Management, Mobile Management, SOC Life Cycle, Get to Know SOC

MODULE 05 - SOC Life Cycle + Threat Haunting Through Logs
Vulnerability Assessment, Task Management System, Policy Management, Mobile Management, Threat Hunt Trough Logs, Get to Know Zeek, Get to Know ELK


Advanced Infrastructure Attacks

MODULE 01 - Enumerating an organization
Windows domain environment, Domain enumeration techniques, Manual enumeration, Automatic enumeration

MODULE 02 - Lateral Movement
Manual Lateral Movement, PsExec, WMI, WinRM, Pass the Hash

MODULE 03 - SMB Relay & Responder
Broadcasting, LLMNR Manipulation, Hash Evolution, Responder, SMB Relay, Inveigh

MODULE 04 - PowerShell as a Weapon
PowerShell Fundamentals, PowerShell ISE, PowerShell Modules, Attack with PowerShell, PowerShell to EXE

MODULE 05 - Office Exploitation
Macro & VBA, Word Exploitation, Excel as a weapon, PowerPoint exploit, Macro Obfuscation, SFX, Social Engineering technique

MODULE 06 - Exploiting Services
Basic Enumeration, Vulnerability search, Services features, SearchSploit, Misconfiguration bugs, RDP Enumeration

MODULE 07 - Veil Framework & Obfuscation
What is obfuscation?, Types of obfuscation, Packing, Various tools, Tools comparison, Multi-layered obfuscation

MODULE 08 - Reverse Shell & Tunneling
Shell, Reverse Shell, Remote connections, Firewall Evasion, ICMP Tunneling, SSH Tunneling, DNS Tunneling

MODULE 09 - Kerberoasting & Pass the Ticket
Kerberos Authentication, Kerberos Traffic Analysis, Kerberoasting, Pass the Ticket, Golden Ticket, Domain Replications

MODULE 10 - Challenge
The students will receive a challenge and will try to hack according to the learning material to the targeted machine/services.