Basic Internet training
Basic Internet training is the foundation of online investigations. It introduces the tools and concepts valuable to new and experienced investigators. NetBootCamp provides these skills through onsite and online consultation.
You’ll begin the training by setting up your investigative workstation: browsers, add-ons and the anonymous surfing proxies that you’ll use throughout your career. You’ll become a master of search engine queries, using advanced operators that target profiles only, or results on specific websites, from a time period you specify. You’ll learn about IP addresses, how traffic is routed, and how to geolocate servers even when the operators provide misleading location information.
Traceroutes, email header investigations, advanced Google search techniques, HTML, and anonymous surfing are the everyday tasks of an Internet investigator. You’ll learn these skills via hands-on participation in the Basic Internet classes.
Basic Internet training is the 1st stage of the bootcamp series. After mastering Basic Internet, you’ll progress to Website Investigations and then Social Networks in the 2nd and 3rd stages of the core training program.
- Recommended desktop and portable applications, browsers, bookmarks, and add-ons are provided via download.
- Instructor introduces the functions of tools and provides recommendations for essential subscriptions.
- Google advanced search operators are introduced with practical exercises.
- Recommended uses for Bing and foreign language search engines are also discussed.
- Methods to search online drives to locate public files are covered with Google Drive & Picasa, Skydrive, Dropbox, and Box.
- Search methods to target profiles, forums, and specific platforms like cyberlockers, blogs, FTP, and social networks are covered.
- Visual web crawling tools are introduced for extracting data from the target directly or through Google.
- Tools to monitor RSS feeds and create search alerts are provided.
Session includes: Practical exercises, tools, downloadable resources.
- Introduction to IP addresses: IPv4
- AS Numbers: ISPs that peer with other ISPs
- IP address details
- DNS: How Domain names are resolved
- IP address geolocation
- Rogue ASNs and ISPs
- Overview of IPv6
- Practical exercise: Tools, Exercise handouts, Online resources
- Troubleshoot ISP and server location
- Identify ASN, DNS, MX , reverse IP, subdomains
- Server location obfuscation: Proxies, CDNs, rWhois contacts
- Enumerate domains and IP addresses on an ISP
- Advanced tracerouting
Some website owners operate their own ISP via a reassigned IP addresses. Some also use online, intermediary services like CloudFlare to conceal the server location. Investigators will learn how to investigate web hosting and verify server locations via peering, datacenter maps, traceroute, and more.
- Read email headers: IP address, sender’s computer name
- Comparison of Gmail, Yahoo, Hotmail, and web hosted email
- IP address proxies and date time stamps
- Undercover email considerations
Investigators will learn how to read email headers and how email clients, web hosted mail, and proxies alter the details. Potential header details such as the sender’s computer name, city location, and time zone will also be discussed. Undercover considerations and basic trap-and-trace methods will be introduced for capturing similar information from a recipient.
- Operators block visitors, referral links, countries: .htaccess
- Staying anonymous: Cookies, Proxies, and Search
- Checking your IP address
- Checking browser geolocation leaks
- Meta description
- Meta keywords
- Script author and hosting locations
- Image hosting
- Video Hosting
- Blogger accounts
- Authors and Email accounts
- Publisher codes
- Advertising codes
- Analytics codes
- Sharing widget codes
- Theme author
Overview of TOR and the Onion Network
- TOR Bundle installation
- TOR search listings
- Investigation considerations for TOR
- Overview of BitTorrent and P2P file sharing
- Indexing sites, Trackers, Seeders, Leechers, and more
- Examining the activity, estimating volumes
- BitTorrent client installation
- Investigation considerations for BitTorrent