Litehaus
Litehaus
  • Home
  • Workshops
  • Courses
  • Testimonials
  • Contact
  • Feed
  • More
    • Home
    • Workshops
    • Courses
    • Testimonials
    • Contact
    • Feed
  • Sign In

  • My Account
  • Signed in as:

  • filler@godaddy.com


  • My Account
  • Sign out

Signed in as:

filler@godaddy.com

  • Home
  • Workshops
  • Courses
  • Testimonials
  • Contact
  • Feed

Account


  • My Account
  • Sign out


  • Sign In
  • My Account
Find out more

Workshops

Network Reconnaissance (4 Hours)

In this hands-on workshop, we will use multiple tools to identify services, including software package and version information running on unknown systems. Network services to be targeted will include those running on non-standard ports or behind firewalls. After exploring the use of network scanning tools, we will switch our attention to analyzing website data by extracting website contents and exploring its metadata. Attendees will be provided access to their own lab environment.

Overview of Workshop Objectives

  • Scanning networks and hosts using nmap and nbtscan tools.
  • Enumerating SNMP and RPC services.
  • Basics of using the Metasploit framework.
  • Explore the use and impacts of the iptables firewall.
  • Extracting and analyze website content using wget.
  • Overview of the FOCA tool.
  • Perform document metadata analysis.
  • Extract and analyze image file metadata.

Prerequisite Knowledge:

  • Basic networking concepts (TCP/IP, DNS, etc.) and familiarity with the Unix/Linux command line.
  • Basic knowledge of web technologies (e.g., HTML).
  • Some familiarity with  the Windows Command Prompt.


Digital Forensics (4 Hours)

Learners will be introduced to digital forensics techniques, such as analyzing memory and filesystems using industry-standard tools. Students will be provided access to their own environment to use during this hands-on workshop!

Overview of Workshop Objectives

  • Inspect the Windows Registry.
  • Use RegRipper to Extract Information from Registry Hives.
  • Forensic Analysis of the Recycle Bin.
  • Extract information from LNK File.
  • Explore information in JumpList Files.
  • Discover recently run programs.
  • Get times of recently run program.
  • Find accesses to file servers.
  • Discover basic Volatility configuration and execution.
  • Explore Volatility plugins to analyze a Windows memory image.
  • Analyze running processes and network connections from a memory image.
  • Examine Windows registry 

Prerequisite Knowledge:

  • Basic networking concepts and familiarity with the Windows operating system.
  • Basic knowledge of operating systems concepts, such as processes and network connections.
  • Some familiarity with the Linux/Unix command line.
  • Some familiarity with the Windows command prompt.

Find out more

Copyright © 2023 Litehaus - All Rights Reserved.

Powered by GoDaddy

  • Privacy Policy
  • Terms and Conditions

Cookie Policy

This website uses cookies. By continuing to use this site, you accept our use of cookies.

Accept & Close