Table of Contents

Sans 401 June 10-17, 2009

SANS Security Essentials

Schedule

Networking Concepts - Day 1

Module 1: Network Fundamentals..1-2

Network Fundamentals..1-3

types of networks..1-6

Physical and Logical Topologies..1-9

Ethernet..1-12

Token Ring and FDDI..1-14

Asynchronous Transfer Mode (ATM)..1-17

WAN Technologies..1-19

Networking Hardware..1-24

Crossover Cable..1-26

Network Devices..1-28

regarding ping

Virtual LAN (VLAN) and Network Access Control (NAC)..1-32

Network Design..1-33

Network Design Objectives..1-34

Network Sections..1-35

The Final Design..1-38

Module 2: IP Concepts..1-41

Network Protocol..1-44

What is Network Protocol?..1-45

The OSI Protocol Stack..1-47

OSI vs TCP/IP..1-49

OSITCP/IP
5 Session, 6 Presentation, 7 ApplicationApplication
4 TransportTransport (TCP)
3 NetworkInternet (IP)
1 Physical, 2 DataNetwork

How Protocol Stacks Communicate..1-51

How TCP/IP Packets are Generated..1-52

IP Packets..1-55

IPv4 Header..1-56 *

IPv4 Header..1-57

IP Header Identifies Protocol..1-60

Network Addressing..1-61

Addressing Basics..1-62

Two Parts of and Address..1-63

IPv4 Addressess and Subnets..1-64

Netmasks and CIDR..1-65

Broadcast Addresses

Private Network Addressing..1-69

Two Addresses..1-71

Address Resolution Protocol (ARP)..1-74

Domain Name System (DNS)..1-76

Domain Name System (DNS)..1-77

Domain Hierarchy..1-79

Types of DNS Queries..1-81

DNS Security..1-83

IPv6..1-85

IPv4 vs. IPv6

IPv6 features..1-88

IPv6 Addressing..1-90

Module 3: IP Concepts II..1-94

Objectives

...OSI

User Datagram Protocol (UDP)..1-98

UDP..1-99

UPD uses..1-101

UDP Header..1-103

TCP (Transmission Control Protocol..105

TCP uses..1-107

FTP (File Transfew Protocol)..1-108 *

Active vs. Passive FTP..1-111 *

Establishing a TCP Connection..1-113

TCP Header..1-114

TCP Header - Key Fields..1-116 *

TCP Code Bits/Flags..1-119 *

Closing a TCP Session..1-121

TCPdump Output from a Graceful Connection Termination..1-123

TCPdump Output from an Aborted Connection

TCP and UDP..1-126

Internet Control Message Protocol (ICMP)..1-127

ICMP..1-128

ICMP Header..1-129

ping..1-132

traceroute..1-133

Unix and Windows Traceroute..1-135

M0dule 4: Protocal Analysis..1-139

Protocal Analysis..1-140

tcpdump/windump..1-143

What is a Sniffer..1-144

Sniffing on a Switch..1-147

tcpdump..1-148

tcpdump commands..1-149

Analysys with tcpdump..1-150

Sample TCPdump ICMP Output..1-153

Sample TCPdump UDP Output..1-154

Sample TCPdump TCP Output..1-155

Reading Packets..1-157

Hexadecimal Representaion..1-160

Five Tips for Decoding Packets..1-161

Decoding and IP Header..163 ..1-170

Decoding a TCP Header..1-171 ..1-180 (* 1-177 and 1-180)

Calculating Variable Length Fields..1-177

Module 5: Virtual Machines..1-183

Module 6: Safety and Physical Security

Managing Safety & Physical Security..1-231

Evacuation Procedures..1-237

Restricted Area..1-253

Preventing Unauthorized access..1-258

Deterring Unauthorized Access..1-262

Managing Physical Security..1-267

Cookbook Tools - Networking Concepts..2-1

Defense in Depth - Day 2

Module 7: Defense in Depth..2-2

Defense in Depth..2-3

router example - put in

Defense in Depth..2-5

What is Defense-in-Depth?..2-6

Focus of Security is Risk..2-7

Key Focus of Risk..2-8

Prioritizing CIA..2-10

What is a Threat?..2-11

Vulnerabilities..2-13

Approaches to DiD..2-15

Uniform Protection..2-16

Protected Enclaves..2-17

Information Centric..2-18

Vector-Oriented..2-19

Viruses and Malicious Code..2-20

Viruses..2-23

COM/Script Program Infectors..2-25

EXE Program Infectors..2-26

web bug

Worms..2-27

The Morris Worm 1988..2-29

Linux Worms..2-31

SQL Slammer Worm..2-33

Sasser/Netsky Worms..2-34

Conficker Worm..2-35

Fixing the Problem..2-36

What Worms Teach Us about Configuration management..2-37

Malicious Browser Content..2-39

Hybrid Threats..2-41

Malware Capabilities..2-43

propagation Techniques..2-46 *

Malware Defense Techniques..2-47 *

Malware Analysis..2-54

"The machinery of democracy"

Module 8: Basic Security Policy..2-57

Basic Security Policy..2-58

Why an Organization Needs a Security Policy..2-61

Convincing the Organization..2-63

Mission Statement..2-64

Overall Security Posture..2-65

Example Posture Issues..2-66

Establish a Documentation Baseline..2-68

Policy and Procedures..2-69

Defining a Policy..2-70

Procedure Definitions and Issues..2-71

Standard Definitions and Issues..2-72

Baseline Definitions and Issues..2-73

Guideline Definitions and Issues..2-74

Documentation Review..2-75

Issue-Specific Policies..2-76

Policy Table of Contents..2-77

Policy Statement Must..2-79

Is the Policy..2-81

Creating the Policy..2-83

Building the Policy: State the Issue..2-84

Example of Applicability/Scope..2-85

Compliance/Penalties..2-86

Non-Disclosure Agreement..2-88

Intellectual Property - Copyright..2-90

Contingency Planning..2-93

What is a Business Continuity Plan?..2-95

What is a Disaster Recovery Plan?..2-97

BCP vs DRP...2-99

Basic Elements of Continuity Planning..2-102

BCP Key Components..2-104

Business Impact Analysis..2-105

BCP-DRP Planning Process Lifecycle..2-107

Top BCP/DRP Planning Mistakes..2-108

Asset Classification (Randy's)

* several machines may be part of a single system, such as an Oracle system

Module 9: Access Control and Password Management..2-112

Access Control Theory..2-115

Key Terms & Principles..2-116

Data Classification by Sensitive and by Type..2-118

Identity, Authentication, Authorization, and Accountability..2-120

Controlling Access..2-122

Access Control Techniques..2-123 *

Managing Access..2-125

Single Sign-On (SSO)..2-127

Protocols and Centralized Control..2-128

Password Management..2-131

Reversible and Irreversible Encryption..2-132

Access Control: Passwords..2-134

What is Password Cracking?..2-135

What determines the strength of a Password Hash?..2-137

Methods of Password Assessment..2-139

John the Ripper vs Linux MD5 Password File..2-143

Windows Passwords..2-146

Cain-Password Cracking..2-148

Rainbow Tables..2-151

Winrtgen..2-152

Cain and Rainbow Tables..2-154

How to protect against password Cracking Hacks..2-155

Enforce a Strong Password Policy..2-156

Use Shadow Passwords..2-159

Use One-time Passwords..2-160

Utilize Biometrics..2-162

Disable LAN Manager Authentication..2-165

Module 10: Incident handling Foundations..2-168

Incident handling Fundamentals..2-171

Why is it Important?..2-173 *

What is an Incident?..2-175

What is an Event?..2-176

Overview of the Incident-Handling Process..2-179

The Six-Step Process for Incedent Handling..2-180

Key Mistakes in Incident Handling..2-195

Putting the steps together..2-196

The United States Code, Title 18, Section 1030..2-204

Laws Relating to Incident Handling..2-206

Terrorism, Infrastructure Protection and Espionage..2-208

Search/Seizure with Warrant..2-210

Arrest/False Arrest..2-212

Evidence Must be Admissible..2-213

Chain of Custody..2-215

Evidence Integrity..2-217

Real and Direct..2-218

Best Evidence..2-219

Module 11: Information Warfare..2-221

The Threat, Attacks are Increasing..2-225

More Unknowns than knowns..2-226

Information Warfare tools..2-228

Example of a blended Threat..2-229

Could the US Presidency be Affected?..2-230

Could a city be destroyed?..2-231

Offshore Coding and SW Engineering 2009..2-232

Terrorism and Economic Warfare (The business of terrorism.)..2-233

Information Warfare Theory..2-234

Information Warfare Theory..2-235

Cycle Time..2-237

Indications and Warning..2-238

Indications and Warnings Analysis Model..2-239

Measures of Effectiveness..2-240

Offensive Players..2-241

Offensive Operations Goal..2-242

Increase Value to Offense..2-243

Decrease Value to Defense..2-244

Defense is not Usually Dominant..2-245

Module 12: Web Communications and Security..2-248

Web Application Security..2-251

Web Architecture Hardening..2-255

Web Communication Basics - http..2-257

http transactions..2-259

html-Hypertext Markup Language..2-261 *

html forms..2-262 *

Cookies..2-266

SSL/TLS..2-269

Server Side Programming..2-271

Client Side Programming..2-273

Developing Secure Web Applications..2-275

Basics of Secure Coding..2-277

Web Application Service Providers..2-279

Web Application Vulnerabilities..2-281

Web Application Authentication..2-282 *

Access Control..2-286

Session Tracking/Maintaining State..2-288

Hacking Session Information..2-289

Protection from Session Attacks..2-291

Input Attacks..2-293

Cookbook

Day 3

http://www.giac.org/proctor/kryterion.php

Module 13: Attack Strategies and Mitigation..3-2

K. Mitnick vs. T. Shimomura..3-6

Two Systems, Trust Relationship..3-8

Starting the Attack..3-9

Silence B with DoS..3-11

Attacker Probes for a Weakness in A's TCP Stack..3-13 *

Attacker Pretends to be B..3-14

Make 'A' Defenseless..3-15

Finish the job..3-16

Detecting and Prevention Techniques?..3-19

Patch Systems..3-21

Hardening the System Disabling Unused Services..3-22

Network Vulnerability Scanner..3-23

Host-based Intrusion Detection..3-24

Network-based Intrusion Detection..3-25

Firewalls..3-26

Mitnick Examples: Lessons Learned *

Common Types of Attacks..3-31

Methods of Attack..3-32

Denial of Service..3-35

Physical Attack..3-36

Buffer Overflows..3-37

Buffer Overflow concepts..3-38

When the Return Address Points to our Payload, We Win!..3-39

Brute Force..3-40

Remote Maintenance..3-42

Browsing..3-43

Race Condidtions..3-44

Interrupts..3-46

Alteration of Code..3-47

Rootkits..3-48

Module 14: Firewalls and Honeypots..3-51

Why a Firewall?..3-55

How does a Firewall fit in the big picture?..3-57

Benefits of Firewalls..3-58

Shortcomings of Firewalls..3-58

The Default Rule..3-60

Filtering..3-61

Multi-Zone Designs..3-63

Stateless Packet Filter..3-65

No State Inspection ACK Flag Set..3-66

Stateful Firewalls..3-68

Stateful Inspection with FTP..3-70 *

Proxy or Application Gateway..3-72

Desktop Protection Personal Firewalls..3-74

Firewall Complementing and IDS..3-75

Network Address Translation (and Private Addresses)..3-76

Port Address Translation(PAT)..3-78 *

Randy's

http://www.security.vt.edu/lockitdown/Firewall_Ports_and_Protocols_Summary.doc

Honeypots..3-81

What is a Honeypot?..3-82

Honeypot Example..3-84

Advantages of Honeypots..3-84

Disadvanges of Honeypots..3-86

Classifying honeypots..3-90

Basic honeypot - Netcat Listener..3-93

honeyd..3-94

Sticky Honeypots - LaBrea Tarpit..3-99

Deploying Honeypots..3-102

Honeypot Checklist/Summary..3-104

Module 15: Vulnerability Scanning..3-107

R3: Reconnaissance, Resource Protection, ROI..

5 Vulnerability axioms..3-113

Threat Types and Vectors..3-114

Threat Concerns..3-115

Firewall Subversion..3-117

KaZaA - Firewall Subversion..3-118

Bypassing Firewall Protection..3-120

Firewalls, Wireless Connections, and Modems..3-121

HTTP Tunnels..3-123

Social Engineering..3-125

Social Engineering Defense..3-127

Bypassing Firewall Protection Controls..3-128

Network Mapping Tools..3-129

Network Mapping Tools..3-129

Finding Unprotected Shares - Legion..3-131

Hping3 - Spoofing Port Scanner..3-133

Attack History..3-136

Network Scanning..3-139

What is a Port Scan?..3-140

Port Scanning with Nmap..3-142

Simple nmap scan..3-144

nmap scan types..3-146

Operating System Identification..3-149

Vulnerability Scanning..3-151

Vulnerability Scanners..3-152

How to do a Vulnerability Scan..3-154

Nessus..3-156

Alternate Network Mapping Techniques..3-167

Wireless network scanning..3-168

Net Stumbler..3-169

Kismet..3-172

Mitigating Wireless network Mapping..3-176

War Dialing..3-177

War Dialers..3-178

Managing Penetration testing..3-181

Pen Testing Techniques..3-182

Scanning Tools Warning..3-184

Module 16: Intrusion Detection Technologies..3-189

Intrusion Detection Technologies..3-189

What is IDS?..3-192

IDS Technology..3-194

IDS Alerts..3-197

NIDS Overview..3-199

How Signature Analysis Works..3-201

Rules and Signature Criteria..3-202 *

How Anomaly Analysis Works..3-204 *

How Application Protocol Analysis Works..3-205

Deep vs. Shallow Packet Inspection..3-207

Data Normalization..3-209

NIDS Advantages..3-210

NIDS Challenges..3-213

Topology Limitatinos..3-214

Analyzing Encrypted Traffic..3-216

Signature Quality vs Quantity..3-217

Performance Limitations..3-218

NIDS Costs..3-220

TCPdump as NIDS..3-222

Snort as NIDS..3-224

Snort Rule Flexibility..3-227

Writing Snort Rules..3-228

Simple Snort Rules..3-229

Advanced Snort Rules..3-230

Key Points for NIDS..3-231 *

Developments in NIDS..3-233

HR IDS Application - Content Monitoring Systems..3-236

HIDS Overview..3-238

How File Integrity Checking Works..3-241

How Log Monitoring works..3-242

HIDS Network Monitoring..3-244

HIDS Advantages..3-245

HIDS Challenges..3-246

HIDS Recommendations..3-248

Developments in HIDS..3-248

Host and Network-based Intrusion Detection..3-251

Internet Storm Center..3-252

Module 17: Intrusion Prevention Technologies..3-255

What is IPS?..3-259

What IPS is Not?..3-261

HIPS Detail..3-263

HIPS Advantages..3-264

HIPS Challenges..3-265

Application Behavior Monitoring..3-267

HIPS Recommendations..3-269

Developments in HIPS..3-271

NIPS Overview..3-273

How NIPS Work..3-274

NIPS Detail..3-275

NIPS Challenges..3-278

Passive Analysis..3-279

Developments in NIPS..3-281 *

IPS Examples..3-284

Randy

Module 18: IT Risk Management..3-291

Risk management Overview..3-295

IT Risk management - Where do I Start?..3-296

IT is Only One Form of Risk..3-300

Define Risk..3-301

Risk Management Questions..3-302

SLE vs ALE..3-305

Single Loss Expectancy (SLE - one shot)..3-306

Annualize Loss Expectancy (ALE - multi-hits)..3-307

Quantitative vs Qualitative..3-309

Threat Assessment, Analysis & Report to Management..3-311

Business Case for Risk Management..3-312

Business Case - Applications..3-313

Step 1 Threat Assessment and Analysis..3-314

Outsider Attack - Internet..3-316

Insider Attack - Internal Net..3-318

Insider Attack - Honeypot..3-320

Malicious Code..3-321

Step 2 - Asset Identification and Valuation..3-322

Step 3 - Vulnerability Analysis..3-323

Step 4 - Risk Evaluation..3-324

Step 5 - Interim Report..3-325

Acceptable Risk - Who Decides?..3-326

Cost Benefit Analysis..3-327

"Final" Report..3-328

http://www.security.vt.edu/playitsafe/riskassessmentresources.html

Cookbook - Internet Security Technologies..2-1

Available upon request from Security Office ***

find where ipaddresses originate

Day 4

Module 19: Encryption 101..4-2

Encryption 101..4-3

What is Cryptography?..4-6 **

Security by Obscurity is no Security..4-8

Beware of Overconfidence..4-10

Credit Cards Over the Internet..4-11

The Challenges That We Face..4-13

Goals of Cryptography..4-14 *

Digital Substitution (Encryption)..4-16

Digital Substitution (Decryption)..4-18

General Symetric Encryption Technique..4-19

Arbitrary Substitution..4-20

Rotation Substitution..4-21

Permutation..4-23

Block Ciphers..4-24 *

Stream Ciphers..4-26 *

General Types of Cryptosystems..4-28

Types..4-29

Symetric Key Cryptosystems..4-30

Asymmetric Key Cryptosystems..4-32

Diffie-Hellman Key Exchange..4-35 *

Hash Functions..4-37

Steganography..4-39

Steganography (Stego)..4-40

Crypto vs Stego..4-41

Detecting Cryptography..4-43

Historgrams..4-44

How Steganography Works..4-45

General Types of Stego..4-46

Module 20: Encryption 102..4-53

Concepts in Cyptography..4-57

Symmetric & Asymmetric Cryptosystems..4-64

DES..4-65

DES Weakness..4-66

DES Advangage..4-68

Meet-in-the-middle Attack..4-69 *

Triple DES..4-70

AES..4-72

AES Algorithm..4-74 *

AES Basic Functions..4-75

AES (2)..4-76

RSA..4-77

AES vs. DES (Asymetric vs Symmetric)..4-78

Elliptic Curve Cyptosystems (1)..4-79

Elliptic Curve Cyptosystems (2)..4-80

Comparing Key Length..4-82 *

Crypto Attacks..4-83

Birthday Attack..4-87

Module 21: Applying Cryptography..4-90

Applying Cryptography..4-91

Objectives..4-92

Virtual Private Networks (VPN's)..4-95

Confidentiality in Transit..4-96

Virtual Private Network (VPN)..4-97

VPN Advantage - "Flexibility"..4-98

VPN Advantage - "Cost"..4-99

VPN Breakdown..4-100

Types of Remote Access..4-101

Security Implications..4-103

IPSec Overview..4-105

Types of IPSec Headers..4-106 *

Types of IPSec Modes..4-109 *

SSL VPN's..4-112

Examples of Non-IPSec VPN's..4-114

Pretty Good Privacy (PGP)..4-116

Confidentiality in Storage..4-117

On-the-Fly Encryption..4-120

Establishing a Key..4-121

Choosing a Passphrase..4-122

Encrypting Outbound Email..4-123

Sample PGP-Encrypted E-mail..4-125

Decrypting Inbound E-mail..4-126

Signing Outbound E-mail..4-127

Confirming a Signed E-mail..4-128

Public Key infrastructure (PKI)..4-129

What is the business Value of a Public Key Infrastructure?..4-130

How PKI Works..4-132

Operational Goals of PKI..4-135 *

Digital Certificates..4-139 *

Secure Web Traffic (SSL)..4-141

PKI SSL Crypto: An Illustration..4-143 *

  1. Client Web Request
  2. Server Responds
  3. Client validates certificate & Crypto ( this is the step the client can cause failure by accepting the cert)
  4. Client encrypts the session dey
  5. Session key exchange
  6. Server decrypts the session key
  7. Encrypted messages are exchanged

Secure E-mail (S/MIME)..4-145

Partial or Whole Disk encryption..4-147

Other Uses of PKI..4-150

PGP as 'Web of Trust'..4-151

Problems with PKI..4-154

Applying Cryptography: Summary..4-156

Module 22: Wireless Network Security..4-158

Wireless Network Security..4-159

Wireless Advantages..4-163

Vertical Markets..4-165

Bluetooth..4-168

Bluetooth..4-169

Bluetooth Specification..4-170

Bluetooth Security..4-172

Bluetooth Security Issues

blueScanner..4-176

Bluesnarf Attacks..4-177

Bluetooth Sniffing Impact..4-178

Protecting Bluetooth..4-180

ZigBee Wireless..4-182

ZigBee Specification..4-183

ZigBee Security..4-185

802.11..4-187

IEE 802.11 Wireless..4-188

WEP Security..4-190

IEEE 802.11i, 802.1x, EAP..4-192

802.1x Authentication..4-193 *

Wi-Fi Protected Access..4-195

Wireless Security..4-196

General Misconceptions..4-197

Top 4 Security Risks for WLAN's..4-203

Eavesdropping..4-204

Eavesdropping Mitigation..4-205

Masquerading..4-207

Masquerading Mitigation..4-209

Denial-of-Service Attacks..4-210

DoS Attack Mitigation..4-212

Rogue AP's..4-213

Rogue AP Mitigation..4-214

Steps to Planning a Secure WLAN..4-216 *

Protecting Wireless Networks..4-218 *

Module 23: Voice over IP..4-220

VoIP..4-221

VoIP Functionality & Architecture..4-223

VoIP Overview..4-224

VoIP Risks..4-225

LAN VoIP..4-227

WAN VoIP..4-228

VoIP Networking..4-229

Advantages of VoIP..4-231

Disadvantages of VoIP..4-234

VoIP Architecture..4-238

VoIP Components..4-240

VoIP Traffic Patterns..4-242

VoIP Protocols..4-243

VoIP Signaling H.323..4-245 *

VoIP Signaling - SIP..4-247

SIP Packet Details..4-248

SIP Exchange..4-249

VoIP Media - RTP..4-251

VoIP and TCP vs UDP..4-252

Skype..4-253

VoIP Challenges..4-254

VoIP Operation Challenges..4-255

VoIP Security Challenges..4-257

VoIP Security Challenges..4-259

Securing VoIP..4-261

other services

Module 24: Operations Security..4-264

Operations Security (OPSEC) Defensive and Offensive Methods..4-265

Management Application - Operations Security (OPSEC)..4-268

The three Laws of Defensive OPSEC..4-270

OPSEC Weekly Assessment Cycle..4-271

Employee Issues..4-273

Employment Agreements..4-275

Need to Know..4-277

Putting it all together..4-278

Sensitive Information..4-280

Offensive OPSEC..4-282

Society for Competitive Intelligence Professionals Code of Ethics..4-290

Corporate Information..4-292

Edgar Search..4-293

Wayback Search..4-298

Company Information from Other Web Sites..4-301

Company Financials..4-302

Project/Product Information..4-304

Individual Information..4-305

Project/Product Information..4-304

Individual Information..4-305

What does this mean to me..4-306

How to Apply OPSEC - Summary..4-307

Cookbook Tools - Secure Communications

pgp

netstumbler

s-tools

Invisible Secrets

xsteg/stegdetect

wireshark

wireshark and VoIP

Day 5

Module: 25 The Windows Security Infrastructure..5-2

The Windows Security Infrastructure..5-3

Windows Operating Systems..5-5

Windows XP..5-6

Windows Server 2003..5-9

Windows Vista & Windows 7..5-11

Windows Server 2008..5-14

Windows Mobile..5-17

Windows Workgroups and Accounts..5-21

Workgroups..5-22

Workgroups..5-24 Benefits

Workgroups..5-25 Drawbacks

Managing Local Accounts..5-26

Security ID Numbers (SIDs)..5-27

Your Security Access Token (SAT)..5-29

whoami.exe /all /fo list

To Form a More Perfect Workgroup..5-31

Windows Active Directory and Group Policy..5-33

Active Directory Domains..5-34

Authentication Protocols (1 of 3)..5-37

Authentication Protocols: Kerberos (2 of 2)..5-39

Forests and Trusts..5-42

The Nature of Trust..5-44

Cross-Forest Trusts..5-46 *

Group Policy..5-48

How Group Policy Works..5-49

Module 26: Service packs, Hotfixes and Backups..5-53

Service Packs..5-56

Slipstreaming..5-58

Hands-Free Service Packs..5-59

Hotfixes..5-61

E-mail/Newsfeed Bulletins..5-62

Installing Multiple Hotfixes..5-63

Organize Hotfixes..5-64

BATCH.BAT..5-65

Microsoft Update..5-67

Windows Update..5-68

Windows Server update Services (WSUS)..5-69

How does WSUS work..5-71

WSUS Administration..5-72 *

3rd-Party Patch Management..5-74

http://www.h-online.com/security/Do-it-yourself-Service-Pack--/features/80682

Windows Backup and Restore..5-76

Importance of Backups for Security..5-77

Windows XP/2003 Backup..5-78 *

System State Backup..5-80

Windows Vista/2008/7 Backup..5-81

Third-Party Backup Solutions..5-84

Binary Disk Images..5-85

System Restore..5-86 *

Previous Versions..5-89

Device Driver Rollback..5-91

Summary..5-92

comment

To clean up a new system

Module 27: Windows Access Controls..5-94

Windows Access Controls..5-96

NTFS Overview..5-98 *

NTFS DACL's..5-100

Advanced Security Settings for ACE's *

NTFS Owners..5-104

Principle of Least Privilege..5-106

AGULP..5-108,5-109 *

AD Users and Computers..5-110

Shared Folder Permissions..5-112

Hidden and Administrative Shares..5-115

Combining NTFS and Share DACL's..5-117 *

What is the Registry?..5-119

Remote Registry Service..5-120

Registry DACL..5-122

Active Directory Permissions..5-123

Delegation of Authority in AD..5-125

Mandatory Integrity Control (MIC)..5-127 *

User Rights..5-129

Encypting File System..5-137

EFS Implementation Details..5-139 *

EFS Key Recovery..5-140

EFS Best Practices..5-142

BitLocker Overview..5-144

Trusted Platform Module..5-146

BitLocker TPM Options..5-148

Disabling vs Turning Off..5-150

Emergency Recovery..5-151,5-153 *

Module 28: Enforcing Security Policy..5-156

Security Templates..5-159 *

SCA Snap-In..5-164

SECEDIT.EXE..5-166

Local Group Policy Object..5-167

GPO Security Settings..5-169

GPO Scripts..5-170

Administrative Templates..5-171

Domain Group Policy Objects..5-173

Default Domain and OU GPO's..5-175

Checklist of GPO Settings..5-176 * (for audit)

GPO > Passphrase Policy..5-177

GPO > Lockout Policy..5-179

GPO > Security Options..5-180,5-183

Anonymous Access..5-184 ** check

net.exe use \\address\IPC$ "" /user:""
* null users not used as much on later OS's

Kerberos & NTLMv1..5-186

Kerberos & NTLMv2..5-187

The Guest Account..5-188

Administrative Accounts..5-190

Software restriction Policies..5-192

User Account Control..5-195

Internet Explorer Security..5-198 *

Internet Explorer Security..5-201

Module 29: Windows Network Services..5-207

The Best Way to Secure a Service..5-210

How to disable Service..5-211

Security Configuration Wizard..5-214

Server Manager..5-218

Network Adapter Bindings..5-220

Do I Still Need NetBIOS?..5-222

nbstat.exe -A ipaddress

Key Protocols..5-226

More Key Protocols..5-228

The Windows Firewall in Vista/2008/7..5-230

Network Location Types..5-232 *

Managing Firewall Rules..5-234

Windows IPSec & other VPN's..5-238

Internet Protocol Security..5-239

Command-Line IPSec Tools..5-240

IPSec & Group Policy..5-242

Group Policy Example..5-243

Virtual Private Networking..5-245

Routing and Remote Access Service..5-249

Windows IIS Security..5-251

Securing Internet Information Server (IIS)..5-252

Use a Minimal Patched Install..5-253

Separate NTFS Volumes for Web Content..5-255

Require a Host Header..5-257

Remove Unused Handler Mapping..5-259

Folders Not to Have..5-261

IIS Access Controls..5-263

Some Questions for Your Web Developers..5-267,5-270 *

SQL SErver Security Tips..5-271,5-272 *

Remote Desktop Services..5-273

Remote Desktop Services..5-274

RDP Best Practices..5-278

Module 30: Automation, auditing and response..5-285

Windows Automation and Auditing..5-286

Automation..5-289

The Support Tools..5-290,5-291

Microsoft Resource Kits..5-292

WMIC.EXE..5-297

wmic.exe process list full

Network Configuration Tools..5-302

Other free Toolsets..5-304

Scripting Support And *NIX tools..5-306

Microsoft PowerShell..5-310

Push Scripts with Group Policy..5-312

Scheduling Jobs..5-314

Auditing..5-316 *

Verifying Policy Comliance..5-317

The SCA Snap-In Again..

SECEDIT.EXE..5-320

Microsoft Baseline Security Analyzer..5-322,5-323 *

MBSACLI.EXE..5-326

Windows Defender..5-328

Creating Snapshots..5-330

Snapshot Batch Script..5-334,5-335,to 5-338

Gathering Ongoing Data..5-339

Security Event Log and Audit Policies..5-341 *

NTFS, Registry and Printer SACLs..5-343

What Objects Should be Audited?..5-346 *

Log Size and Wrapping Options

Log Consolidation..5-350

IIS Logging..5-352

Change Detection and Analysis..5-355

Cookbook - Windows Security..5-358

nmap scans

nmap SYN: -sS, UDP: -sU, Xmas: -sX, FIN: -sF

Cookbook

SCA

BSA

CIS

Linux Security - Day 6

Module 31: Securing Linux/Unix..6-3

fog

Securing Linux/Unix..6-3

Operating System Overview..6-5

Kernel..6-6

File system Structure..6-7

File System Strucure..6-8

Shell..6-9

Examples of Shells..6-10

Commands You Need to Know..6-11,6-12 *

Unix File Permissions..6-29

Unix File Permissions..6-31 *

Group Management..6-40

/etc/group..6-41

uid=500(steve) gid=500(steve) groups=500(steve) context=user_u:system_r:unconfined_t

passwd File "good old days"..6-45

Passwd/shadow..6-46

passwd File..6-47 *

shadow File..6-48 *

useradd..6-49

Enabling Password Aging..6-50

Account Password Info..6-52

chage -l <user>

Enforce stronger Passwords..6-53

Restricting Use of Previous Passwords..6-54

Locking User Accounts After To Many Login Failures..6-55

Process Status (ps)..6-56

ps -aux |more

Process Status (ps)..6-57

netstat..6-59

Backup with dd..6-61

Module 32: Securing Linux/Unix..6-63

How Unix Systems Boot..6-65

Boot Loader..6-69

Run Levels..6-70,6-71 *

inittab..6-72

Run condition directory..6-73

init.d..6-74

service management..6-75

Patch a Disabled Service?..6-76

service command..6-77

chkconfig..6-78

How are services started..6-79

Common Services..6-80

Network File System..6-81

NFS..6-82.6-83

Samba..6-84

DNS Basic..6-85

Network Information Service (NIS)..6-86

Remote Procedure Call..6-88

Remote Procedure Call in action..6-89

Port Mapper..6-90

Other RPC Services..6-91

Inetd/ xinetd..6-92

inetd..6-93

xinetd..6-95

xinetd Key files/Directory..6-96 *

tcpwrappers..6-98

Module 33: Securing Linux/Unix..6-106

Logs and Log Management

Important Log Files..6-108

WTMP Log..6-109

UTMP Log..6-110

utmp "w" output..6-112

Lastlog..6-113

SULOG..6-114

HTTP Logs..6-116,6-117 *

Messages (SYSLOG)..6-118

Messages..6-119 *

The syslogd..6-120

syslog.conf..6-122

Secure Log..6-126

Example of a Secure Log after a Scan..6-127

FTP Logs..6-128

Maillog..6-132

Module 34: Securing Linux/Unix..6-136

Patch Management

Why Patch..6-138

Be Careful..6-139

Finding Out About Patches..6-140

Using apt..6-141

RPM..6-143

GUI Tools..6-145

Other O/S..6-146

Module 35: Securing Linux/Unix..6-148

Security Enhancement Utilities

Tripwire..6-150

Tripwire Attribute Tracking..6-151

Tripwire Common Commands..6-152

iptables..6-153

Mangle..6-154
filtering..6-155
nat..6-156
Custom Chains..6-157
rules..6-158,6-159 *
iptables -L (list)..6-160
iptables -L -n
iptables -F (flush)..6-161

Additional Security Options..6-162

Security-Enhanced Linux (SELinux)..6-164

Parts of SELinux..6-165
How to Enforce..6-166
DAC & SELinux Policy..6-167
MLS/MCS..6-168
SELinux COmmands..6-169
sestatus..6-170
chcon & semanage..6-171
restorecon..6-172
audit2allow..6-173
getenforce..6-174
setenforce..6-175
Other Approaches..6-176

Glossary of Terms..6-181

Other