PYTHON FORENSICS / BT215

FIVE   |   EIGHT   |   83%   |   40

           SCENARIOS                    LABS                      HANDS-ON           DURATION

Many laboratories rely on Python to build basic models for predictions and to run experiments. It also helps to control critical operational systems. Python has built-in capabilities to support the digital investigation and protect the integrity of evidence during an investigation. This training will provide the student with steppingstones on how to take forensics skills to the next level, combining them with powerful Python scripting.

LAB 01

Basic Python Scripting

LAB 02

Building Remote Connection

LAB 03

Panda Basics

LAB 04

Analyzing Network with Python

LAB 05

Registry

LAB 06

Memory

LAB 07

Linux Forensics

LAB 08

Building a Framework

Scenario: PF001

MNP, an accounting firm, suffered from a Ransomware attack that causes a major loss of data. You have been hired to recover the company’s data and help finish the investigation.

photo_2020-04-25_00-49-33.jpg

Scenario: PF002

Due to a recent cyber attack at Stadler’s IT systems, The company decided to hire you. The internal surveillance services are currently involved and discovered that the company was attacked by malware that caused a data leak. Use your network analyzing skills to find the attacker and the malware file.

photo_2020-05-12_01-49-28.jpg

Scenario: PF003

Greenville Water, a South Carolina water company, suffered a cyber-attack that caused the payment system to collapse. The attack affected 500,000 customers. Help find evidence and valuable data.

Annotation 2020-05-21 205916.jpg

Scenario: PF004

A new vulnerability has been discovered called SimJacker that affects SIM Cards in 29 countries. The exploit can be remotely hacked and gain access to the mobile phone. You have been hired by one of the cell companies that were effected to use your scanning skills to discover the vulnerability.

photo_2020-03-30_21-22-57.jpg

Scenario: PF005

Waterloo, Ontario-based Blackberry, discovered a group of Chinese hackers. The group exploited Linux servers such as Red hat, Centos, and Ubuntu secretly for eight years. They were abusing a security misconfiguration. As a member of the InfoSec team, your mission is to defend your network from attackers from using this exploit.

Annotation 2020-05-21 210106.jpg

© 2020 by ThinkCyber

THE 2020

CYBERIUM