Cyber Crime

Investigation

profile card
Karthikeyan V
Mentor For Cyber Crime Investigation
India , Chennai
7
Courses
10
Writeups
85
Works
Enroll Now!

Requirements:

  • Criminology Skill
  • Basic computer knowledge
  • Basic knowledge of OS
  • Understand basic computer networking
  • Laptop or PC with minimum 4 GB Ram
  • Android Studio for malware Development

NOTE:

  • This course is created only for educational purposes and all the attacks are launched in live Mobile application not in labs and All the attacks shown in this course are properly disclosed

Who this course is for:

  • Tamil Nadu Police CB(Crime Branch)
  • Specially for TN Cyber cell/Wings

What you will learn:

  • Cyber Attaks
  • Ethical Hacking methodology
  • Cyber crime Investigation
  • Mobile hacking
  • Social media hacking
  • Wireless hacking (Radio Hijacking)
  • Cyber awreness with cyber safe tips
  • Atm Card hacking and Securing

Course Details:

  • Duration : 50 days
  • Student Pricing : 5000 inr
  • Ordinary pricing : 10,000 inr
  • Course language : Tamil
Enroll Now!

Course Curriculum

Chapter - Base-1 : Basic

  1. 1. Understanding Basic
  2. 2. About Domain
  3. 3. Domain Extraction
  4. 4. About Email
  5. 5. Email Extraction
  6. 6. About Server
  7. 7. Server Types
  8. 8. About OS
  9. 9. OS Types
  10. 10. About IP/networking
  11. 11. IP and Netwoking attack methodology
  12. 12. CDR analysis
  13. 13. Mobile Tracking

Chapter - Base-2 : Cyber Awareness

  1. 1. Mobile Security
  2. 2. Social Media Security
  3. 3. Internet Banking Security
  4. 4. UPI and Payment Security
  5. 5. Fake ID and Internet Privacy
  6. 6. ATM Security

Chapter - 1 : Web Development Front End and Server setup

  1. 1. HTML 1
  2. 2. HTML 2
  3. 3. PHP web Server Hosting 1
  4. 4. Apache web Server Hosting 2
  5. 5. Static IP
  6. 4. Log Analysis

Chapter - 2 : Web Development Back End and Server setup

  1. 1. PHP Basic 1
  2. 2. Connecting Frontend & Backend
  3. 3. PHP Basic 2
  4. 4. PHP Basic 3
  5. 5. Setting up Server and Live attack
  6. 6. All About Web Hosting
  7. 7. Setting up Cloud Hosting Server
  8. 8. All about DNS Server

Chapter - 3 : Social Media Hacking

  1. 1. About Social Media Hacking
  2. 2. Ways to attack Social Account
  3. 3. Live Demo pishing Attack
  4. 4. Live PayPal Account Hacking
  5. 5. Complete Web App coding
  6. 6. Instagram Account Hacking
  7. 7. Google Account Hacking
  8. 8. FaceBook Account Hacking
  9. 9. NetFlix Account Hacking
  10. 10. ADobe Account Hacking
  11. 11. SnapChat Account Hacking
  12. 12. Spotify Account Hacking
  13. 13. Twitch Account Hacking
  14. 14. Twitter Account Hacking
  15. 15. Spear phishing Attack
  16. 16. Python KeyLogger
  17. 17. PHP KeyLogger
  18. 18. Live KeyLogger attack
  19. 19. About Session attack
  20. 20. Session Attack
  21. 21. Google Session Attack(Live)POC
  22. 22. FITBIT Session Attack(Live)POC
  23. 23. TripAdvisor Session Attack(Live)POC

Chapter - 4 : Web Hacking

  1. 1. About IDN Attack
  2. 2. About Spf Attack
  3. 3. Spf Live Attack
  4. 4. Attacking the Attacker
  5. 5. Burp SetUp
  6. 6. All About Burp
  7. 7. Brute Forcing Attack with Burp
  8. 8. Dictionary Attack with Burp
  9. 9. Stealing Attacker DB
  10. 10. Hijacking Attacker DB
  11. 11. Prevention

Chapter - 5 : Mobile Hacking

  1. 1. About Mobile Hacking
  2. 2. Creating Trojan
  3. 3. Delivering Trojan
  4. 4. Understanding Console
  5. 5. Mobile Shell
  6. 6. Activity Starting
  7. 7. SMS Hacking
  8. 8. Path Explore
  9. 9. WebCam Hacking
  10. 10. Port Forwarding
  11. 11. Getting Connection
  12. 12. Static Ip
  13. 13. Static IP Setup
  14. 14. Payload with Static IP
  15. 15. Getting Connection (SIP)
  16. 16. Automated Hacking
  17. 17. Hacking Android with Python
  18. 18. Hacking Android with Bash
  19. 19. Hacking Android with Link
  20. 20. Hacking Android with USB
  21. 21. Hacking someone android(LIVE)IP
  22. 21. Android Prevention

Chapter Base-3 : Real Time Cyber Crime case

  1. 1. Case 1
  2. 2. Case 2
  3. 3. Case 3

Chapter Base-4 : Rf Hacking

  1. 1. About RF
  2. 2. RF Hacking 1
  3. 3. RF Hacking 2

Chapter Base-5 : ATM Card Hacking

  1. 1. About ATM Card
  2. 2. Exploiting ATM Card

Chapter Base-6 : Call / Mobile Tracking

  1. 1. Real-World CDR analysis
  2. 2. Mobile Tracking
Enroll Now!