With the growth of digitalisation, issues involving cybercrime and information security have emerged as transnational concerns that affect people across conventional, geospatial, and temporal boundaries.
DTraks IMPACT is an accelerated online interactive training program organised in association with ThirveDx from Israel, who are having a cloud based lab with pre-configured virtual machines and video learning solutions.
Designed and developed around military training methodologies and hands-on learning, the program is designed to equip the participants with the best cyber weapons required in cybersecurity domain.
It is a "Zero to Hero" 480 hours accelerated programme with 100 Labs and 9 Scenarios for cyber reskilling!
The objective of the program is to provide potential research opportunities that allow Law Enforcement and Defense officers to reskill the existing IT teams to face the challenges and threats from cyber-attacks. This training program helps the IT teams to perform vulnerability assessments in their inhouse network, software infrastructure and take the necessary preventive measurements.
MODULE 01 - MODULE 01 - Introduction to Linux
Linux History, Distributions, Open-source philosophy, Linux installation, CLI vs GUI
MODULE 02 - MODULE 02 - CLI Fundamentals
CLI & terminal emulators, Filesystem structure, Command structure, Navigating in the filesystem, Gathering system information, Grep basics, Find and Locate, History, Piping
MODULE 03 - MODULE 03 - Users and Permissions
Users, Password management, Groups, Permissions, Sticky bit and PATH
MODULE 04 - MODULE 04 - Networking & System Management
Network testing using Ping and Traceroute, Networking files and configuration, Updating network configuration
MODULE 05 - Package Management
Package installation, APT vs YUM, Git concepts, Apache installation, Other applications
MODULE 06 - Services and hardening
Common services and protocols, SSH and SCP, FTP setup & configuration, Samba setup & configuration, Hardening services
MODULE 07 - Bash Scripting
Bash scripting introduction, Script input and output, Conditions &Arithmetic operators, Working with archives, File integrity, Crontab
MODULE 08 - Host Security
Linux external mounting, Boot protection, PAM, SELinux & AppArmor, Privilege escalation, Crontab security
MODULE 09 - Network Security
iptables, firewalld, fail2ban, Log monitoring, Apache secure configuration, SSH secure configuration
MODULE 01 - Network Security Systems & Architecture
Cisco Certified CyberOps Associate, Networking Recap, Redundancy Methods, Network Security Design, Network Security Systems
MODULE 02 - Secure Management & Access
AAA Concepts, RADIUS Vs. TACACS+, 802.1X Authentication
MODULE 03 - Network Attacks & Mitigation
MAC Spoofing, CAM Table Overflow, Port Security Mitigation, VLAN Hopping, CDP/LLDP Reconnaissance, Secure Dynamic Routing, NTP Attacks, DHCP Attacks
MODULE 04 - Network Traffic Analysis
Advanced Wireshark, Wireshark Statistics, File Extraction, Network Miner, Network Monitor
MODULE 01 - Introduction to Ethical Hacking
Fundamentals, Ethics, Malware, Cyber Attack Cycle
MODULE 02 - Network Scanning
Network Scanning Definition, Nmap Overview, Nmap Scanning Types, Additional Tools
MODULE 03 - MITM Attacks
MITM, ARP Poisoning, DNS Poisoning, Port Stealing, SSL Stripping
MODULE 04 - Brute-Force
Fundamentals, Offline Password Cracking, Online Password Attacks
MODULE 01 - Module 01 - Practical Cryptography
Cryptography Concepts, Hash Algorithms, Encryption, Digital Signature & Certifications
MODULE 02 - Module 02 - Firewall Fundamental
Firewall Introduction, pfSense, Firewall Types, Additional Firewall Features
MODULE 03 - Module 03 - VPN Technologies
VPN Concepts, VPN Types, Remote Access VPN, Site-to-Site VPN, Modern VPNs, Risks and Limitations of VPN, Security Considerations
MODULE 04 - Module 04 - Network Monitoring
Introduction to Network Monitoring, Protocol Analyzer, RSA Netwitness, Bro, SNMP, NetFlow, Network Monitoring Tools, Deep Packet Inspection
MODULE 05 - Module 05 - IPS & IDS Concepts
IPS & IDS Overview, IPS\IDS Functions, Implement IPS
MODULE 01 - Introduction to DFIR
Introduction to DFIR, DF vs IR vs TH, Incident Response planning, Targeted artifacts, DFIR use-cases, DFIR Toolset, SANS & NIST, Forensics
MODULE 02 - Incident Response - Preparation
Defining assets & values, CIA, Risk management, Roles & Responsibilities, 6 & 4 stages of IR, Creating IR Plan, DRP & BCP, GRC, ATT&CK, Compliances – ISO, GDPR, HIPPA, PCI-DSS
MODULE 03 - Incident Response - Response
SOC Operation & Lifecycle, Identification & Scoping, Containment, Intelligence gathering, Eradication, Chain of custody
MODULE 01 - Module 01 - Data Acquisition
Dead System Analysis, Live System Analysis, Drive Cloning, Image Mounting, Memory Dumping, Evidence Documentation
MODULE 02 - Module 02 - Live Forensics
Artifacts on a Windows computer, Browser History, USB History, DNS Cache, Prefetch, MRU, Nirsoft
MODULE 03 - Module 03 - Windows Forensics
Windows DF Specifics, NTFS, ADS & MFT, File Carving, Registry Forensics, Forensics using powershell
MODULE 04 - Module 04 - Linux Forensics
Linux Filesystems, Network configuration, Login information, Bash history, Identifying Persistence, Logfile Analysis
MODULE 05 - Module 05 - Network Forensics
Traffic interception & Network Evidence, Reverse Proxx, Wireshark, DF using Wireshark, Common Protocol Analysis, Zeek NSM
MODULE 06 - Module 06 - Memory Analysis
Memory structure, Memory analysis tools, Volatility Breakdown & Usage, Process exploration, DLL inspection, Acquiring memory artifacts
MODULE 01 - Introduction to Malware Analysis
What is Malware analysis, Types of malware, Malware analysis types, Structure of PE files & analysis, Static analysis methodology, Sysinternals Suite
MODULE 02 - Understanding Anti Virus’s
VirusTotal, AV engines, Yara Rules, IoC’s and finding them, ClamAV rule-based detection, File signatures & manually creating file, signatures
MODULE 03 - Basic Dynamic Analysis
Dynamic analysis methodology, Dynamic analysis environments, DLL files analysis, Filesystem monitoring, Registry analysis, Network monitoring
MODULE 04 - Sysmon & Sandboxing
Sysmon installation & Configuration, Sysmon – Rule-based detection, Sandbox analysis, Malware samples
MODULE 01 - Social Engineering
Introduction, Social Engineering Toolkit, SE Additional Tools
MODULE 02 - Infrastructure Attacks
Metasploit, Reverse Shell, Lateral Movement
MODULE 03 - Windows Privilege Escalation
Windows Privileges, Windows Local PE, Post Exploitation
MODULE 04 - Linux Privilege Escalation
Linux Local PE, Linux Remote PE
MODULE 05 - Web Application Security Fundamentals
Understanding HTTP, Burp Suite
MODULE 06 - XSS & File Inclusion
Client-Side Web languages, Cross-Site Scripting, Session Hijacking, XSS Mitigations, Local File Inclusion
MODULE 07 - SQL Injection
Introduction to Databases, SQLi
MODULE 08 - Vulnerability Scanners & Reporting
Automated Scanning, Vulnerability Scanners,PT Report Subjects, Regulations
MODULE 01 - Endpoint Security Measures
Network & Endpoint Security Introduction, Problems and Risks, Endpoint Security Components, Endpoint Detection & Response, ClamAV Introduction, Yara Rules & Signatures, Whitelist Databases
MODULE 02 - Data Loss Prevention
Sensitive Data, Data Leak Channels, Regular Expressions, DLP Introduction, OpenDLP, Risk, DLP Bypass Techniques
MODULE 03 - Security Strategy
Security Strategy Planning, Security Policy Scoping, Risk Management, Creating organizational security policy, Compliances & Regulations
MODULE 01 - SOC Life Cycle
SOC Fundamentals, SOC Team Responsibilities, Incident Prioritization, Vulnerability Assessment
MODULE 02 - SIEM Introduction
Security Measures, Introduction to SIEM, SIEM Installation, Log Collection & Types
MODULE 03 - Advanced SIEM
Log Queries, Log Parsing, Operators, Advanced Queries
MODULE 04 - Utilizing SOAR in a SIEM Environment
SOAR, Automation Objectives, Successful Defense, Effective Usage, Demisto
It is a “Professional Mastery” 480 Hours intensive program with all the equipped labs and scenarios in the below technologies.
The advanced and intensive training is designed to make you an influential Red Team expert who can counter cyber threats combining the tools and techniques applied as a cyber warrior.
The Blue Team training is a prerequisite for joining this advanced course where you are taught an intermediate to advanced range of Red Team knowledge, with a wide range of lectures and hands on demos.
MODULE 01 - Web Fundamentals
Web Technologies Overview, Browser tools & Debugging, OWASP Top10
MODULE 02 - Web Server Installation
Apache Secure Installation, Apache Secure Configuration, Hardening Apache
MODULE 03 -Traffic Manipulation
Burp Suite, OWASP Zap, Web Site Enumeration, Web Application Brute-Force Challenge
MODULE 04 - Web Cryptography
HTTP vs HTTPS, SSL vs TLS, Cipher Suites, OpenSSL – CA vs self-signed certificates
MODULE 05 - Introduction to Client-Side Attacks
Reflected XSS, Stored XSS, DOM XSS
MODULE 06 - Authorization & Authentication
CSRF, Broken Authentication, Broken Authorization, Session Attacks
MODULE 07 - XML Attacks
Configuring & Maintaining Databases, MariaDB, SQL Syntax
MODULE 08 - Marinating Databases
Error-Based SQL Injection, Union-Based SQL Injection, Data Exfiltration, Injection Automation
MODULE 09 - Advanced SQLi
Blind SQL Injection, Time-based injection, NoSQL Injection
MODULE 10 - XML Injection
XML Usage in Web Applications, XXE, SSRF, SSRF through XXE
MODULE 11 - PHP Vulnerabilities
PHP Programming, PHP Vulnerabilities, Insecure Input Filtration
MODULE 12 - LFI/RFI & Directory Traversal
LFI, RFI, Directory Traversal
MODULE 13 - WordPress Hacking
Content management Systems, WPScan, WordPress Enumeration
MODULE 14 - File Upload
PHP Shells
MODULE 15 - File Upload
Nessus, Qualys, Writing Reports
MODULE 16 - Web Hacking Challenges
Web Hacking Challenges
MODULE 01 - Wireshark
Wireshark usage, Capture data on a network, Analysing data using Wireshark
MODULE 02 - Foot printing and reconnaissance
Search engines, People search, Google Hacking DB, Website footprinting, Information gathering
MODULE 03 - Network Scan
Network layout & Services, TCP & UDP handshake, Port scan, IDLE scan, Firewall & IDS evasion, Automation scan
MODULE 04 - Password Cracking
Attack types, Hash types, Local cracking, Remote Cracking
MODULE 05 - Wi-Fi Attack
Wi-Fi encryption, EAPOL protocol, Automated Frameworks, Data sniff, Rouge Access Point
MODULE 06 - Man in the Middle
MITM Technique, Arp spoof, DNS spoof, Bypassing SSL, MITM Automated Frameworks
MODULE 07 - Hacking Frameworks & Automation
Terminology, Search Engines, Automated Framework, Creating malicious files
MODULE 08 - Anonymity on the network
Proxy, VPN, Proxy chain, TOR
MODULE 01 - Introduction to Android & Android Studio
Web Fundamentals - Web Technologies Overview, Browser tools & Debugging, OWASP Top10
MODULE 02 - Android Programming
Java Programming basics - Android Activities life cycle and events, Adding\Defining\Editing visual elements, Create an application with multiple Activities, Signing an Application
MODULE 03 - Android Reverse Engineering
Reversing Android Applications (Decomplication/Java Code Review/Smali Code review (machine code)/Recompiling an app), Code Editing Methods, Explore Reversing Tools & Frameworks, Malicious Android Applications, Getting full control of an Android device with reverse shell
MODULE 04 - Networking & SSL Pinning
Network Moitoring using Burp & Proxy Configuration, Android traffic Interception, SSL Verification Methods, Interception with SSL Pinning, Certificate - Manual obtaining and generating, Bypass Trust Managers
MODULE 05 - MobSF & Drozer
Analysis methodologies (Static Analysis, Dynamic Analysis), MODSF Installation, Security review & Resources, Drozer Server, Sessions, Interacting with services, Android challenges
MODULE 01 - Introduction to IoT
Exploring Shodan (Graphic user Interface, Command Line Interface - Using automation, Collecting data with
advance filtering, Extracting data), Mapping operating-systems, applications and IoT devices to specific vulnerabilities
MODULE 02 - Firmware Analysis & Exploitation
Mounting file systems, Firmware analysis (Using Binwalk: Identifying hardcoded vendor “secrets”), Emulating firmware binary, Firmware analysis toolkit - using firmware emulation
MODULE 03 - Exploiting Web Application Vulnerabilities on IoT Devices
OWASP IoT Top 10, Exploitation with Burp Suite, Exploitation using command injection, Exploitation using brute force, Exploitation with CSRF, Extracting vendor credentials
MODULE 04 - Using Physical Tools for IoT Exploitation
Reconnaissance basics, Identifying serial interfaces, Identifying pinouts with multi meter, UART, NAND attack, JTAG (Identifying JTAG pinouts, Using JTAGulator, Debugging with JTAG), USB-TTL
MODULE 05 - SDR (Software-Defined Radio) Based IoT Exploitation
Introduction to SDR, Radio communication analysis, Attacking protocols, RTL-SDR, Capturing FM signals, Analysing wireless signals, Extracting text from signals, Attacking RF (radio frequency) - (Introduction to RF, RF traffic analysis, RF replay attack), HackRF
MODULE 01 - Hello Assembly
What is Assembly, CPU architecture, Registers types & structure, Commands in RAM & RAM’s structure, Stack & Heap, Comparisons - cmp, zf instructions, Basic C, Introduction to IDA
MODULE 02 - Malware Disassembly
IDA overview, Jumping between display, Code-flow analysis, Code segments, Variables identifications, Arithmetic identification, Conditions identification
MODULE 03 - Malware Debugging
Debugging process, Software & Breakpoint, ollyDBG overview, Following the stack, Stepping
MODULE 04 - Patching & Anti-debugging
Combined analysis, Runtime manipulation, Changing code-flow, Patching
MODULE 05 - Patching & Anti-debugging
Anti-debugging, PEB, VM detection, Anti-debugging & VM detection Bypass
MODULE 01 - Introduction to Python
Introduction to code programming, Python installation, PyCharm IDE installation, Creating Project & Python Env configuration, Basic Syntax, String Formation & code Execution
MODULE 02 - Data Types & Conditions
Variables with Different Data Types, User’s Input, Operators, Comparative & Arithmetic, Type Casting, Condition’s, logic and syntax, Dictionary, Tuple & lists, Nested Lists
MODULE 03 - Loops
For Loops, over Lists, While Loops, Break & Continue Uses, Strings Manipulation, Combining Loops & Conditions
MODULE 04 - File System & Error handling
Try & Except, Exceptions Types, Error Handling, full Methodology, File Permissions - (Create, Append, read & Write), OS System Module Functions, Platform Module Functions, Log File Parsing
MODULE 05 - Function & code handling
Functions Structure & uses, Return Different Data Types, Parameters in Functions, Recursion Function and its uses, Scope & Global Keyword, OOP & Proper Code Management
MODULE 06 - Network Communication
Introduction to SOCKET library, Creating Client Socket, Creating Server Socket, Sending & Receiving Data, Set Echo Communication, Client Vs Server, Retrieving Data using OS Module
MODULE 07 - Web Fetching & Parsing
Web Communication library, Requests GET functions, Requests Sessions, Requests with Parameters, Requests Via Post, Beautiful Soup library, Filter & search with bs4, Extracting Data from Web.
MODULE 01 - Local Privilege Escalation in Windows OS
Windows Local Escalation technics
MODULE 02 - Post Exploitation
Post Exploitation Techniques, Credential Extraction, Persistence & Hidden Users, Covering the Tracks
MODULE 03 - Local Privilege Escalation in Linux OS
Linux Local Privilege Escalation technics
MODULE 04 - Linux Remote Escalation
Automated Tasks, Bad Path Configuration
MODULE 05 - Windows Advanced Remote Escalation
DLL Hijacking, DLL Injection, Exploiting Unquoted Services, Exploiting Group Policy Preferences
MODULE 06 - Architecture Vulnerabilities
Dirty COW, Eternal Blue
MODULE 07 - Pivoting
PsExec & WMIexec, Pass the Hash & NTLM, Session Hijacking
MODULE 01 - Security Measures
Network Security Measures, Endpoint Security Measures, Additional Security Measures, SIEM Basics, SIEM Logs, SIEM Monitoring
MODULE 02 - SIEM Solutions + Log Generation & Collection
SIEM Operations, Get to Know Splunk, Splunk Configuration, Splunk Logging & Filtering, Additional Splunk Abilities, Understanding System Logs
MODULE 03 - Log Generation & Collection + Monitoring Attacks
Windows Event Viewer, GPO Configuration, Endpoint Security, Monitoring Attacks, Attack Differentiation, Corelated Rules, Windows Security Logs
MODULE 04 - Security Measures Integration – ESET + SOC Life Cycle
ESMC & Agent, Tasks & Group Configuration, Policy Management, Mobile Management, SOC Life Cycle, Get to Know SOC
MODULE 05 - SOC Life Cycle + Threat Haunting Through Logs
Vulnerability Assessment, Task Management System, Policy Management, Mobile Management, Threat Hunt Trough Logs, Get to Know Zeek, Get to Know ELK
MODULE 01 - Enumerating an organization
Windows domain environment, Domain enumeration techniques, Manual enumeration, Automatic enumeration
MODULE 02 - Lateral Movement
Manual Lateral Movement, PsExec, WMI, WinRM, Pass the Hash
MODULE 03 - SMB Relay & Responder
Broadcasting, LLMNR Manipulation, Hash Evolution, Responder, SMB Relay, Inveigh
MODULE 04 - PowerShell as a Weapon
PowerShell Fundamentals, PowerShell ISE, PowerShell Modules, Attack with PowerShell, PowerShell to EXE
MODULE 05 - Office Exploitation
Macro & VBA, Word Exploitation, Excel as a weapon, PowerPoint exploit, Macro Obfuscation, SFX, Social Engineering technique
MODULE 06 - Exploiting Services
Basic Enumeration, Vulnerability search, Services features, SearchSploit, Misconfiguration bugs, RDP Enumeration
MODULE 07 - Veil Framework & Obfuscation
What is obfuscation?, Types of obfuscation, Packing, Various tools, Tools comparison, Multi-layered obfuscation
MODULE 08 - Reverse Shell & Tunneling
Shell, Reverse Shell, Remote connections, Firewall Evasion, ICMP Tunneling, SSH Tunneling, DNS Tunneling
MODULE 09 - Kerberoasting & Pass the Ticket
Kerberos Authentication, Kerberos Traffic Analysis, Kerberoasting, Pass the Ticket, Golden Ticket, Domain Replications
MODULE 10 - Challenge
The students will receive a challenge and will try to hack according to the learning material to the targeted machine/services.