Elective III: Digital Forensics (Truth & Truth Plus Could 2024)


Part BSyllabus



a) Introduction to Pc {Hardware} – Varied Elements of a Pc, Motherboard, Processor, Reminiscence, Storage Units and Networking elements. Understanding Pc Working Programs (OS), Booting means of computer systems. Introduction to File Programs and forms of File System.

b) Cyber Crime- Type of Cyber Crime, Inner and Exterior Assaults, Crimes associated to Social Media, ATM and Banking Frauds. Information Privateness points, Packet sniffing, Spoofing, Net safety.

c) First responder – position and toolkit. Process for search and seizure of digital evidences. Search and Seizure of Unstable and Non-volatile Digital Proof. Imaging and Hashing Digital Proof. Analyzing and Restoration of Deleted, Hidden and Altered recordsdata.

d) Home windows Programs Artifacts: File Programs, Registry, Occasion logs, Shortcut recordsdata, Executables. Alternate Information Streams (ADS), Hidden recordsdata, Slack Area. Linux System and Artifacts: Linux file system: Possession and Permissions, Hidden Information, Consumer Accounts and Logs. Mac OS X programs and Artifacts: System Startup and Providers, Community Configuration, Hidden Directories, System Logs and Consumer Artifacts

e) Net Browsers: Cookies, Favourites or Bookmarks, Cache, Session Information and Plugins. E-mail: Forms of E-mail and Protocols. Analysing the Header particulars and monitoring the e-mail, Spoofed Mails. Digital Machine and Cloud Know-how Forensics.


a) Pc Networking- Digital and Analog Signaling Strategies, Community Varieties and Topologies, Overview of OSI Mannequin and TCP/IP Protocol. Various kinds of IP Addresses and Courses, Subnet Masks, Subnetting and Supernetting. Community {Hardware} Units and Shopper/Server Computing. Forms of Networks – LAN, MAN and WAN. Routers and Routing Protocols.

b) Community threats and vulnerabilities, Forms of community attacks- eavesdropping, spoofing, modification, Cross-site scripting, DNS Spoofing, Routing Desk Poisoning, ARP Poisoning, Net Jacking. Assaults on Wi-fi Networks. Social Engineering Assaults and its varieties. Packet Sniffing, Forms of authentication, Assaults on WEP, WPA and WPA-2 Encryption, pretend hotspots.

c) IP safety structure, Safety protocols, IPSec, Net Safety – Firewalls, IDS, IDPS. Community Safety Functions, Authentication Mechanisms: Passwords, Cryptographic authentication protocol, Kerberos, X.509 LDAP Listing. Digital Signatures. Net Safety: Safe Socket Layer (SSL) Encryption, Transport Layer Safety (TLS), Safe Digital Transaction (SET) and Digital Non-public Networks (VPN).

d) Monitoring of pc community and actions, Dwell Packet Capturing and Evaluation. Looking out and assortment of evidences from the community. Community Intrusion Detection and Evaluation. SQL Injection, Occasion Log analysis- instruments and methods. Investigating community assaults. Proof assortment from Routers different networking units.

e) Cloud Know-how and its numerous elements – non-public, public and hybrid cloud. Cloud varieties; IaaS, PaaS, SaaS. Function of virtualization in enabling the cloud. Applied sciences and the processes required when deploying internet companies. Cloud Safety Structure, Safe Cloud primarily based service, Identification and Entry Administration, Encryption and Key Administration. Cloud Forensic – assortment and evaluation of proof.


a) Introduction to Cell Applied sciences – Asynchronous Switch Mode (ATM), Wi-fi Utility Protocol (WAP). Mobile applied sciences – Superior Cell Cellphone System (AMPS), i-Mode, Time Division A number of Entry (TDMA), Code Division A number of Entry (CDMA) and World System for Cell Communications (GSM) and relative strengths. Subscriber Identification Module (SIM), Worldwide Cell Tools Identification (IMEI).

b) Capabilities of Bluetooth and safety points. Varied Era of Cell Cellphone Applied sciences. Understanding of the cell phone working programs – Android, iOS, Home windows. Understanding of SQLite Databases.

c) Cellphone Phreaking, Name tampering, Wi-fi Hack Walkthrough and Man-in-theMiddle-attacks. Overview of WEP assault. Assaults on WEP, WPA and WPA-2 Encryption, pretend hotspots. Wi-fi Public Key Infrastructure. Securing WLAN, WEP Decryption script.

d) Overview of Cell Forensics, Seizure and Preservation of cellphones and PDA. Forms of Proof current in cellphones – Information current in SIM card, exterior reminiscence dump, and evidences in reminiscence card. Cell phone proof extraction course of, Information Acquisition Strategies – Bodily, File System, Logical and Guide Acquisition. Cell Forensic Investigation Toolkit. Monitoring of cell phone location.


a) Introduction to Social Media, Safety Points in Social Media, Forms of crimes of Social Media – Cyberbullying, On-line Grooming, Cyberstalking. Social Media and its affect on Enterprise, Politics, Regulation and Revolutions, Rising Tendencies in social media,

b) Sources for social media proof, Forms of Information Obtainable on Social Networking Websites, Completely different proof assortment strategies from social networking websites, Intelligence gathering from Social Media- Instruments and approach for intelligence gathering– oblique methodology, direct methodology with login, direct methodology with out login.

c) Introduction to Cryptography, Symmetric and Uneven Cryptosystem Encryption Strategies– Substitutional Cipher and Transpositional Ciphers. Forms of keys – Public Key and Non-public Key. Superior Encryption Strategies and Safety Points. Varied forms of assaults together with Cipher Textual content-Solely assault, Recognized-Plaintext Assault, Chosen-Plaintext Assault, Chosen-Cipher textual content Assault.

d) Symmetric Cryptosystem – AES, DES, RC4, Blowfish. Uneven Cryptosystems – RSA, DSA, Elliptic Curve cryptography. Introduction to Cryptanalysis – Differential and Linear Cryptanalysis. Hashing Algorithms – MD5, SHA-1, SHA-2, SHA-3, One-Approach Hash, Hash Message Authentication Code.


Lascia un commento

Il tuo indirizzo email non sarà pubblicato. I campi obbligatori sono contrassegnati *