Awesome
Course Update
(August 2023) Resources for CEH (Certified Ethical Hackers) are uploaded to the repo.
(December 2022) A new course module on "Mobile Disk Forensics" is created.
(December 2022) A tutorial on practicing vulnerability detections on vulnerable websites offered by VulnHub.com is created.
(December 2022) A tutorial on using SQL to query SNORT log file is created.
(December 2022) An extensive tuorial on disk image cration/analysis using DISK EXPLORER NTFS, R DRIVE, WINHEX, ACCESS DATA FTK is created. A disk image (dd file) of size 1.02 GB is also created.
(December 2022) A large set of hands-on experiences (18 samples) on malicious APK files created.
(December 2022) A large set of hands-on experiences (18 samples) on malicious PDF files created.
(March 2022) A set of tutorials on Cuckoo Sandbox was created and uploaded to the Tool-Tutorials folder.
(March 2022) A set of tutorials and hands-on experiences on malware analysis using Rekall uploaded to the Tools-Tutorials folder.
(March 2022) A new module on Malware Analysis along with a few hands-on experience were added to the Lecture Notes folder.
(January 2021) A few video tutorials are uploaded to youtube and added to the course github repository.
(December 2020) Several tutotials added on security tools such as Kali Linux, Burp Suite, etc.
Instructional Materials for the Digital Forensics Course
Texas Tech University, Computer Science Department
Designed and Taught by: Dr. Akbar Namin
A course on "Digital Forensics" designed and offered in the Computer Science Department at Texas Tech University 2017 - 2018
This repository contains the instructional modules and course materials developed by Dr. Akbar Namin, Associate Professor of Computer Science at Texas Tech University to teach Digital Forensics. The materials were prepared, developed, taught during 2017 - 2018, and it is evolving. This course initiallay was developed as a graduate-level university course. But it can also be used for undergraduate students. The lecture notes were prepared by the insturctor of the course, the lab and hands-on experiences were developed by students taking the course.
About the Course
Digital forensics has become a must-have skillset for IT professionals and in particular for security experts. Digital forensics and incident response play key roles in detecting and analyzing malware, security breaches, possible countermeasures, and tracing online criminal activities. Digital forensics, malware detection and analysis, and incident responses techniques are very wide and system-dependent. For instance, the techniques and tools used in detecting malware in Windows operating system are quite different than those used in Linux and Mac. Nevertheless, the security expert and more importantly ethical hackers need to be aware of the core and basic general topics and cocepts as well as platform-dependent techniques in order to be able to conduct penetration testing more effectively.
This course introduces the basic concepts and techniques usually employed in digital forensics and malware analysis. The contents are primarily divided into the following major topics:
- Reverse Engineering
- Disk Forensics
- Memory Forensics
- Network Forensics
- Malware Analysis
- Mobile Forensics
These four topics constitute the skeleton of security incidents and challenges. The security and forensics challenges usually exercised at the major hacking conferences such as DEFCON and Black Hat usually require in-depth knowledge of these four major topics when performed in different platforms.
The course is completely practical supported with hands-on experiences and formal lectures. Students taking this course will be able to:
- Demonstrate in-depth knowledge of cyber evidence and digital forensics
- Perform disk, memory, and network digital forensics
- Demonstrate the knowledge of using forensics tools
- Learn about the state-of-the-art in malware detection and analysis research
- Learn the basics of incident responses
- Capture network, memory, and disk images for the purpose of forensics analysis
- Practical malware analysis
The tentative topics and tools to be covered include:
- Setting up a minilab for conducting experiment and analysis of digital forensics and malware execution and analysis
- Reverse engineering through binary analysis tools such as RootKit, REMnux, sctest, and Libemu
- Live collection and acquisition
- Disk and media analysis: Disk structure, file systems (NTFS, HFS, etc.)
- Disk and media forensics using tools such as Sleuthkit, Autopsy, foremost, scalpel, etc.
- Memory forensics using techniques such as the volatility framework, WinDBG,
- Network forensics using techniques and tools such as WireShark, NetworkMiner, etc.
- Kali Linux
- Metasploitable Framework and tool
- OWASP-BWA (Broken Web Application)
- Windows, Linux, and Mac operating systems forensics
- Practicing digital forensics using real data
Learning Outcomes
The following are the expected learning outcomes of the course:
- Masters of Science Degree:
- Communicate effectively orally and in writing (LO 1)
- Engage in life-long learning and self-critique (LO 2)
- Function independently on self-directed projects or research where appropriate (LO 4 )
- Doctor of Philosophy Degree:
- Graduates are expected to communicate effectively orally and in writing (LO 1 )
- Engage in life-long learning and self-critique (LO 2 ).
- Function in a multi-disciplinary, and culturally diverse environment with cross-functional teams (LO 3)
Textbooks
There are four sections, each would require a separate textbook. Here is the list of books used for each section:
- Reverse Engineering
- Book: Reversing Secrets of Reverse Engineering
- Author: Eldad Eilam
- Published Year: 2005
- Publisher: Wiley
- Disk Forensics
- Book: Computer Forensics: Computer Forensics: Investigating Hard Disks, Files, and Operating Systems
- Author:
- Published Year: 2010
- Publisher: Cengage Learning
- Memory Forensics
- Book: The Art of Memory Forensics
- Author: Michael Hale Ligh et al.
- Published: 2014
- Publisher: Wiley
- Network Forensics
- Book: Network Forensics: Tracking Hackers through Cyberspace
- Author: Sherri Davidoff and Jonathan Ham
- Published: 2012
- Publisher: Prentice Hall
- Malware Analysis
- Book: Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
- Author: Book by Andrew Honig and Michael Sikorski
- Published: 2012
- Publisher: No Starch Press
- Mobile Forensics
-
Author: Book by Christian Hummert and Dirk Pawlasczyk
-
Published: 2022
-
Publisher: Springer
Additional Hacking Textbooks
- The Hacker Play Book 2: Practical Guide to Penetration Testing, Author: Peter Kim
- Hacking: The Art of Exploitation, Author: Jon Erickson
Additional References
WikiSET is a portal, called Wiki for Security Training and Education, that lists useful materials and tutorials for teaching and learning digital forensics.
Course Team-based Project
To stimulate learning, four team and competition-based projects are defined. The four projects will allow students and each team practice the necessary skillsets for each section (i.e., reverse engineering, etc.). For each project, each team plays the role of both blue and red teams and thus is responsible to build an artifact with some secret item that will be discovered by the other team.
For instance, in disk forensics, each team will create a disk dump file with some hidden secret recipes hiden in different sectors, and the other team's job is to discover the secret recipes.
Students Evaluation
Students will be graded based on assignments, exams, and the project (tentative).
- Assignments (four individual assignments): 40%
- Projects (four team-based projects): 40%
- Take Home Exams: 20%
Acknowledgements
In preperation of this course including lecture notes, lab assignments, case studies, and hands-on experiences many graduate students involved. In particular, these graduate students contributed to the development of the course through donating their created artifacts:
- Kelsey Hilton (diamond contributor: contributed to 1) lab setup module, 2) case studies on WannaCry, 3) Some other case studies)
- Sara Sartoli (gold contributor: contributed to 1) Network Forensics lecture notes, 2) Create the DigForPort portal, 3) Some other case studies)
- Fethi Inan (gold membe: contributed to 1) Memory Forensics lecture notes and modules)
- Prerit Datta (silver contributor: contributed to 1) some other case studies, 2) Hands-on-Experience on Android Forensics)
- Moitrayee Chatterjee (silver contributor: contributed to 1) some other case studies, 2) Hands-on-Experience on Android Forensics)
- Sevgi Arca (silver contributor: contributed to 1) some other case studies)
- Justin Lugo (silver contributor: contributed to 1) some other case studies)
- Vinh Nguyen (silver contributor: contributed to 1) some other case studies)
- Faranak Abri (silver contributor: contributed to a) hands on experiences and case studies)
- Niklas Gollenstede (silver contributor: contributed to 1) some other case studies)
- Gantaphon Chalumporn (silver contributor: contributed to 1) some other case studies)
- Shuva Dass (Contributor to 1) Hands-on-Experience on Android Forensics)
- Fulsy Theophitle (Contributor: Contributed to 1) Hands-on-Experience on Android Forensics)
- Santosh Shrestha (Contributor: Contributed to 1) Hands-on-Experience on Android Forensics)
- Anish Chhetri (Contributor: Contributed to 1) Android Forensics with Burp Suite)
- Shashank Shrestha (Contributor: Contributed to 1) Android Forensics with Burp Suite)
- Aashish Aman (Contributor: Contributed to 1) Android Forensics with Burp Suite)
- Rojina Shrestha (Contributor: Contributed to 1) Armitage)
- Sujan Roka (Contributor: Contributed to 1) Armitage)
- Hasan Al-Qudah (Contributor: Contributed to 1) Malware Analysis Lecture Notes)
- Yathartha Regmi (Contributed to 1) Malware Analysis using Rekall)
- Sean Bosley (Contributed to 1) Malware Analysis using Rekall)
- John Parker (Contributed to 1) Malware Analysis using Rekall)
- Sharma, Pranaya (Contributed to 1) Cuckoo Sandbox Installatyion guide)
- Sitaula, Bibek (Contributed to 1) Cuckoo Sandbox Installatyion guide)
- Sushil GC (Contributed to 1) Cuckoo Sandbox Installatyion guide)
- Turaga, Venkata Sai Prathyush: Contributed to the collection of resources related to CEH certification.
- Some other contributions: ** Contributed to malicious PDF and APK creation and analysis: *** KAPARTHI SAITEJA, SAI SANJAY NAGARUR, VENKATESH PATHIPATI, Zerubabel Armah, Dileep Narne, Bhogadula Lakshmi Sowjanya, Dinku Dwijesh Gullapalli, Diego Salas Noain, Bipsa Paka, Prakriti Adhikari, Denish Otieno, Sri Nagini Sravishtha ETTE, Udochukwu NWANDIKOM, Diane RENARD, Manish Wagle, Simran Thapa, Arnab Zubair, Ravi Sankar Gogineni, Sai Meghana Akula, Venkata Veera Siva Dasari, Saroj Gopali, Bipin Chetri, Umarani Saidhulu Thandu, Kalyan Srinivas Krishnapasetty, Ramya Sree Mandava, Venkat Nithin Atturu, Sulakshana Mucheli, Nagavarshini Surapaneni, ROHITH SAI PRASAD PEKETI, UDHA SATYA SAI VENKAT REDDY GUDLA, Ranjith Boya, Gayathri Sowjanya Pothineni, Keerthana Katamneni, Pallavi Zambare, Manisha Ratna, Nalluri Mouni Soundarya, Raviteja Sirisanagandla, ALEKHYA BUGATA, KIRAN MAI MALLUVALASA, MADHURI GOKARAJU, Sai Saketh Thatikonda, Meghana Reddy Kosireddy, Hemanth Reddy Nagireddy, Pawan Kumar Sah, Rama Hruday Bandaru.
Special Thanks
- The National Science Foundation (NSF) to support and sponsor the project
- The CS Department for allowing offering this course for two consequtive years in order to prepare the materials.