Host-based Incident Response

Learning objectives

Participants will learn the basics of Incident Response and forensic investigations by way of a fictional hacker attack. Thus the seminar starts off with a scenario that is explained step by step and which is accompanied by various exercises with different technologies and systems.

As part of training, measures will be developed and subsequently implemented. This includes the analysis of log files, the definition of Indicators of Compromise (IoC), as well as the classical forensic analysis of file systems.

Demarcation: The seminar teaches incident response and forensics fundamentals deployed in conjunction with workstations and servers. Locating and resolving network anomalies is covered in the “Incident Response Networks” course.


Highlights

  • Introduction to Incident Response
  • Live Response (Memory Dumps & Information Gathering)
  • Creating and using IoC
  • Securing Evidence (imaging)
  • Chain of Custody in Forensic Analysis
  • Fundamentals of File Systems
  • Post Mortem Analysis
  • Tracks in Slack Space
  • Tracks in Office Documents
  • Email Analysis and Exchange Forensics
  • Analysis of Windows Systems
  • Log Analysis and Finding Anomalies
  • Forensic Readiness

 

The exercises will be done on www.hacking-lab.com. Following the course, the labor environment is available to the participants for 30 days more.


Target group

  • Security Officers
  • IT Managers
  • System Engineers
  • Third-level Support
  • Incident Handlers
  • SOC Team Members


Prerequisite

  • Good technical understanding
  • Good knowledge of operating systems
  • Interest in security incidents
  • Interest in the forensic process
  • Interest in bits and bytes

CALENDAR

Security Training: Secure Mobile Apps

In the 2-day course (in German) from October 20/21, 2020, you will learn about the most important security problems of mobile apps. Read more

Security Training: Social Engineering

In the 2-day course (in German) from December 1/2, 2020, you will get to know and understand the methods, tools and tricks of social engineering. Read more

ALL DATES

NEWS

Vulnerability in Mailster

Thierry Viaccoz identified an XSS vulnerability in Mailster (email newsletter plugin for WordPress). Read more

Secure Payments on th Internet

More and more goods and services are bought and paid on the internet. Ivan Bütler summarizes security relevant information on online shopping and... Read more

Vulnerability in Froala WYSIWYG HTML Editor

Security Analyst Emanuel Duss identified a DOM XSS vulnerability in the Froala WYSIWYG HTML Editor Read more

ARCHIVES

Compass Security Blog

Yet Another Froala 0-Day XSS

Compass found a DOM-based cross-site scripting (XSS) in the Froala WYSIWYG HTML Editor. HTML code in the editor is not correctly sanitized when inserted into the DOM. This allows an attacker that can... mehr

Relaying NTLM authentication over RPC

Since a few years, we - as pentesters - (and probably bad guys as well) make use of NTLM relaying a lot for privilege escalation in Windows networks. In this article, we propose adding support for... mehr

ZUM BLOG