Sans 401 June 10-17, 2009
SANS Security Essentials
Schedule
0900-1030 - class
1030-1050 - break
1050-1200/1215 - class
1200-1330 - Lunch
1330-1500 - class
1500-1520 - break
1520-1715 - class
1715-1900 - Bootcamp
Networking Concepts - Day 1
Module 1: Network Fundamentals..1-2
Network Fundamentals..1-3
types of networks..1-6
Physical and Logical Topologies..1-9
Physical
Bus - older
Ring - older
Star - most popular
Logical
Ethernet..1-12
Baseband shared media network.
CSMA/CD - carrier sense, multiple access with collision detection
the most common layer 2 protocol
A Chunk of data transmitted over the wire is called a frame
Uses 1500 byte frame size
GigE networks utilize Jumbo Frames. Large numbers of small frames will cause problems on GigE.
Token Ring and FDDI..1-14
Communications is token based
Not common with client computing
Large mainframes where each system needs to communicat in a predictable manner still use this technology
Asynchronous Transfer Mode (ATM)..1-17
Older protocol
Encapsulates common protocols
Like combining Ethernet and IP
expensive to set up, not seen on LANs
efficient for video streaming
commonly used for establishing high speed backbones over significant distances
WAN Technologies..1-19
Dedicated lines
Frame Relay
MPLS - IPv6, VoIP, IP Video – considered a replacement for Frame Relay and ATM
ISDN - any ISDN could possibly call any other ISDN providing a backdoor attack
DSL
Cable Modems
WAN
Networking Hardware..1-24
Category 1 and 2
Cat 3 10Mb
Cat 4 16Mb
Cat 5,5e 100Mb-1Gb
Cat 6
Network Taps
Vampire Taps
Crossover Cable..1-26
Network Devices..1-28
regarding ping
Virtual LAN (VLAN) and Network Access Control (NAC)..1-32
Network Design..1-33
Network Design Objectives..1-34
Publish separate mail, Web and
DNS servers to the Internet
Provide appropriate access from the internal network to the Internet
Protect the internal network from external attaccks
Provide defense-in-depth
Protect all aspects of the system
Network Sections..1-35
The Final Design..1-38
Module 2: IP Concepts..1-41
Network Protocol..1-44
What is Network Protocol?..1-45
The OSI Protocol Stack..1-47
OSI vs TCP/IP..1-49
| OSI | TCP/IP |
| 5 Session, 6 Presentation, 7 Application | Application |
| 4 Transport | Transport (TCP) |
| 3 Network | Internet (IP) |
| 1 Physical, 2 Data | Network |
How Protocol Stacks Communicate..1-51
How TCP/IP Packets are Generated..1-52
Encapsulation passes information to each layer
Each layer adds header information
The previous layer's headers are the current layers data
IP Packets..1-55
Version field tells IPv4 or IPv6
Protocol can be a user defined number by a hacker
TTL Time to Live, router hops counts
Decremented each time and is discarded once the count reaches 0
Can tell how far away in router hops.
TTL can tell if a packet has been spoofed. If you expect a close route and receive a high count, something is wrong or intercepted (man in the middle).
Fragment Offset
IP addresses
Identity Match - commercial SSN finder
Network Addressing..1-61
Addressing Basics..1-62
Two Parts of and Address..1-63
IPv4 Addressess and Subnets..1-64
Netmasks and CIDR..1-65
Broadcast Addresses
all 1's for the host portion
older networking hardware will interpret all zeros as broadcast
172.20.15.0/24 broadcast is 172.20.15.255
Limited Broadcast - 255.255.255.255 limited to local network
smurf attack based on Windows 95 stack vulnerability from broadcast flood
Private Network Addressing..1-69
10.0.0.0
172.16.0.0
192.168.0.0
Two Addresses..1-71
Address Resolution Protocol (ARP)..1-74
Domain Name System (DNS)..1-76
Domain Name System (DNS)..1-77
Domain Hierarchy..1-79
Types of DNS Queries..1-81
Gethostbyname
Gethostbyaddr
DNS Security..1-83
split dns
external
only authoritative for your domain name
randomize query id's
only recursive for your internal dns server
don't allow zone transfers
internal
IPv6..1-85
IPv4 vs. IPv6
IPv4
IPv6
128 bits, 240 undecillion addresses
Provides authentication of endpoinots
Support for encryption in protocol
Quality of Service (QoS) features provided in the protocol
IPv6 features..1-88
IPv6 Addressing..1-90
Module 3: IP Concepts II..1-94
Objectives
...OSI
User Datagram Protocol (UDP)..1-98
UDP..1-99
UPD uses..1-101
TCP (Transmission Control Protocol..105
TCP uses..1-107
Offers flow control to handle network congestion
Allows for transmission of larger amount of data per packet
Guaranteed delivery of transmitted dtat is more important than speed
offers better
FTP (File Transfew Protocol)..1-108 *
bounce attack can allow access to
FTP through firewall
Active vs. Passive FTP..1-111 *
google “
FTP Bounce attack”
Establishing a TCP Connection..1-113
TCP Code Bits/Flags..1-119 *
Closing a TCP Session..1-121
TCPdump Output from a Graceful Connection Termination..1-123
TCPdump Output from an Aborted Connection
TCP and UDP..1-126
Internet Control Message Protocol (ICMP)..1-127
ICMP..1-128
ICMP Payload usually contains the header of the packet that failed
Payload can contain anything
tools that cross firewall
ping..1-132
traceroute..1-133
Unix and Windows Traceroute..1-135
M0dule 4: Protocal Analysis..1-139
Protocal Analysis..1-140
tcpdump/windump..1-143
What is a Sniffer..1-144
Sniffing on a Switch..1-147
tcpdump..1-148
tcpdump commands..1-149
Analysys with tcpdump..1-150
Sample TCPdump ICMP Output..1-153
Sample TCPdump UDP Output..1-154
Sample TCPdump TCP Output..1-155
Reading Packets..1-157
Hexadecimal Representaion..1-160
Five Tips for Decoding Packets..1-161
Decoding and IP Header..163 ..1-170
Decoding a TCP Header..1-171 ..1-180 (* 1-177 and 1-180)
Calculating Variable Length Fields..1-177
Module 5: Virtual Machines..1-183
Module 6: Safety and Physical Security
Managing Safety & Physical Security..1-231
Safety trumps security
oftcrack
backtrack
Evacuation Procedures..1-237
Restricted Area..1-253
Preventing Unauthorized access..1-258
Deterring Unauthorized Access..1-262
Managing Physical Security..1-267
Defense in Depth - Day 2
Module 7: Defense in Depth..2-2
Defense in Depth..2-3
router example - put in
no ip source routing
no ip directed broadcast
Defense in Depth..2-5
What is Defense-in-Depth?..2-6
Data
Application
Host
internal network
perimeter
Physical security
Focus of Security is Risk..2-7
Key Focus of Risk..2-8
Prioritizing CIA..2-10
Confidentiality
Pharmaceuticals
soft drink manufacturers
Integrity
Availability
What is a Threat?..2-11
Primary Threats:
Malware
Insider
Natural disasters
Terrorism
Vulnerabilities..2-13
known
unknown - “zero day”
unpatched systems
mis-configured systems
Approaches to DiD..2-15
Protected Enclaves..2-17
Vector-Oriented..2-19
Viruses and Malicious Code..2-20
Viruses..2-23
COM/Script Program Infectors..2-25
EXE Program Infectors..2-26
web bug
Worms..2-27
The Morris Worm 1988..2-29
Linux Worms..2-31
SQL Slammer Worm..2-33
Sasser/Netsky Worms..2-34
Conficker Worm..2-35
Fixing the Problem..2-36
What Worms Teach Us about Configuration management..2-37
Malicious Browser Content..2-39
Hybrid Threats..2-41
Malware Capabilities..2-43
backdoor access
leaking of data
propagation Techniques..2-46 *
Malware Defense Techniques..2-47 *
Activity monitoring
malware scanners
File and resource integrity checking
Stripping e-mail attachments - can cause business practice problems
Remember defense-in-depth
Patch all systems
turn off unused services
Malware Analysis..2-54
"The machinery of democracy"
Module 8: Basic Security Policy..2-57
Basic Security Policy..2-58
Why an Organization Needs a Security Policy..2-61
Convincing the Organization..2-63
Mission Statement..2-64
Overall Security Posture..2-65
Example Posture Issues..2-66
Establish a Documentation Baseline..2-68
Policy and Procedures..2-69
Defining a Policy..2-70
Procedure Definitions and Issues..2-71
Standard Definitions and Issues..2-72
Baseline Definitions and Issues..2-73
Guideline Definitions and Issues..2-74
Documentation Review..2-75
Issue-Specific Policies..2-76
Policy Table of Contents..2-77
Policy Statement Must..2-79
Is the Policy..2-81
Creating the Policy..2-83
Building the Policy: State the Issue..2-84
Example of Applicability/Scope..2-85
Compliance/Penalties..2-86
Non-Disclosure Agreement..2-88
Intellectual Property - Copyright..2-90
Contingency Planning..2-93
What is a Business Continuity Plan?..2-95
What is a Disaster Recovery Plan?..2-97
BCP vs DRP...2-99
Basic Elements of Continuity Planning..2-102
BCP Key Components..2-104
Business Impact Analysis..2-105
BCP-DRP Planning Process Lifecycle..2-107
Top BCP/DRP Planning Mistakes..2-108
Asset Classification (Randy's)
* several machines may be part of a single system, such as an Oracle system
Module 9: Access Control and Password Management..2-112
Access Control Theory..2-115
Key Terms & Principles..2-116
Data Classification by Sensitive and by Type..2-118
Identity, Authentication, Authorization, and Accountability..2-120
Identity
Authentication
Authorization
Accountability
Controlling Access..2-122
Least Privilege
Need to Know
Separation of Duties
Rotation of Duties
Access Control Techniques..2-123 *
Discretionary
Mandatory
Role-based
Ruleset-based
List-based
Token-based
Managing Access..2-125
Single Sign-On (SSO)..2-127
Protocols and Centralized Control..2-128
Password Management..2-131
Reversible and Irreversible Encryption..2-132
Access Control: Passwords..2-134
What is Password Cracking?..2-135
What determines the strength of a Password Hash?..2-137
Quality of algorithm
etc…
Methods of Password Assessment..2-139
John the Ripper vs Linux MD5 Password File..2-143
Windows Passwords..2-146
Cain-Password Cracking..2-148
Rainbow Tables..2-151
Winrtgen..2-152
Cain and Rainbow Tables..2-154
How to protect against password Cracking Hacks..2-155
Enforce a Strong Password Policy..2-156
Use Shadow Passwords..2-159
Use One-time Passwords..2-160
Utilize Biometrics..2-162
Disable LAN Manager Authentication..2-165
Module 10: Incident handling Foundations..2-168
Incident handling Fundamentals..2-171
Why is it Important?..2-173 *
What is an Incident?..2-175
What is an Event?..2-176
Overview of the Incident-Handling Process..2-179
The Six-Step Process for Incedent Handling..2-180
Preparation..2-181
Identification..2-183
Containment..2-188
Eradication..2-190
Recovery..2-192
Lessons Learned..2-194
Key Mistakes in Incident Handling..2-195
Putting the steps together..2-196
Legal Aspects of Incident Handling..2-198
Incident Handling and the Legal System..2-201
Criminal Law
Civil Law
Others
The United States Code, Title 18, Section 1030..2-204
Laws Relating to Incident Handling..2-206
Terrorism, Infrastructure Protection and Espionage..2-208
Search/Seizure with Warrant..2-210
Arrest/False Arrest..2-212
Evidence Must be Admissible..2-213
Chain of Custody..2-215
Evidence Integrity..2-217
Real and Direct..2-218
Best Evidence..2-219
The Threat, Attacks are Increasing..2-225
More Unknowns than knowns..2-226
Example of a blended Threat..2-229
Could the US Presidency be Affected?..2-230
Could a city be destroyed?..2-231
Offshore Coding and SW Engineering 2009..2-232
Terrorism and Economic Warfare (The business of terrorism.)..2-233
Cycle Time..2-237
Indications and Warning..2-238
Indications and Warnings Analysis Model..2-239
Measures of Effectiveness..2-240
Offensive Players..2-241
Offensive Operations Goal..2-242
Increase Value to Offense..2-243
Decrease Value to Defense..2-244
Defense is not Usually Dominant..2-245
Module 12: Web Communications and Security..2-248
Web Application Security..2-251
Web Architecture Hardening..2-255
Web Communication Basics - http..2-257
http transactions..2-259
html-Hypertext Markup Language..2-261 *
Cookies..2-266
SSL/TLS..2-269
Server Side Programming..2-271
Client Side Programming..2-273
Developing Secure Web Applications..2-275
Basics of Secure Coding..2-277
Web Application Service Providers..2-279
Web Application Vulnerabilities..2-281
Web Application Authentication..2-282 *
Access Control..2-286
Session Tracking/Maintaining State..2-288
Protection from Session Attacks..2-291
Cookbook
Day 3
Module 13: Attack Strategies and Mitigation..3-2
K. Mitnick vs. T. Shimomura..3-6
Reconnaissance (r utilities, rlogin, rshell)
TCP/IP sequence number prediction attack
Two Systems, Trust Relationship..3-8
Starting the Attack..3-9
Silence B with DoS..3-11
Attacker Probes for a Weakness in A's TCP Stack..3-13 *
Attacker Pretends to be B..3-14
Make 'A' Defenseless..3-15
Finish the job..3-16
Sends rshell packet '“echo ++”>/.rhosts' to open the victim to accept any login
Then, Attacker uses '# rlogin -l root' to takover “A”
Detecting and Prevention Techniques?..3-19
Patch Systems..3-21
Hardening the System Disabling Unused Services..3-22
Network Vulnerability Scanner..3-23
Host-based Intrusion Detection..3-24
Network-based Intrusion Detection..3-25
Firewalls..3-26
Mitnick Examples: Lessons Learned *
Common Types of Attacks..3-31
Methods of Attack..3-32
Logic Bombs
Trojan Horses
Trap Doors
Denial of Service..3-35
Smurf
SYN flood
DDoS Attacks
Physical Attack..3-36
Buffer Overflows..3-37
poorly coded applications
extra code placed in buffers can be used to execute attack code
The Shellcoder's Handbook 2nd or 3rd edition
Buffer Overflow concepts..3-38
When the Return Address Points to our Payload, We Win!..3-39
Brute Force..3-40
Remote Maintenance..3-42
Browsing..3-43
Race Condidtions..3-44
Interrupts..3-46
Alteration of Code..3-47
Rootkits..3-48
Module 14: Firewalls and Honeypots..3-51
Why a Firewall?..3-55
How does a Firewall fit in the big picture?..3-57
Benefits of Firewalls..3-58
Shortcomings of Firewalls..3-58
The Default Rule..3-60
Filtering..3-61
Multi-Zone Designs..3-63
Stateless Packet Filter..3-65
No State Inspection ACK Flag Set..3-66
Stateful Firewalls..3-68
Stateful Inspection with FTP..3-70 *
Proxy or Application Gateway..3-72
Desktop Protection Personal Firewalls..3-74
Firewall Complementing and IDS..3-75
Network Address Translation (and Private Addresses)..3-76
Port Address Translation(PAT)..3-78 *
Randy's
Honeypots..3-81
What is a Honeypot?..3-82
Honeypot Example..3-84
Advantages of Honeypots..3-84
Disadvanges of Honeypots..3-86
Classifying honeypots..3-90
Basic honeypot - Netcat Listener..3-93
honeyd..3-94
Sticky Honeypots - LaBrea Tarpit..3-99
Deploying Honeypots..3-102
Honeypot Checklist/Summary..3-104
Module 15: Vulnerability Scanning..3-107
R3: Reconnaissance, Resource Protection, ROI..
5 Vulnerability axioms..3-113
Threat Types and Vectors..3-114
Threat Concerns..3-115
Firewall Subversion..3-117
KaZaA - Firewall Subversion..3-118
Bypassing Firewall Protection..3-120
Firewalls, Wireless Connections, and Modems..3-121
HTTP Tunnels..3-123
Social Engineering..3-125
Social Engineering Defense..3-127
Bypassing Firewall Protection Controls..3-128
Finding Unprotected Shares - Legion..3-131
Hping3 - Spoofing Port Scanner..3-133
Attack History..3-136
Network Scanning..3-139
What is a Port Scan?..3-140
Port Scanning with Nmap..3-142
Simple nmap scan..3-144
nmap scan types..3-146
Operating System Identification..3-149
Vulnerability Scanning..3-151
Vulnerability Scanners..3-152
How to do a Vulnerability Scan..3-154
Nessus..3-156
Alternate Network Mapping Techniques..3-167
Wireless network scanning..3-168
Net Stumbler..3-169
Kismet..3-172
Mitigating Wireless network Mapping..3-176
War Dialing..3-177
War Dialers..3-178
Managing Penetration testing..3-181
Core Impact
metasploit auto pwn
Pen Testing Techniques..3-182
Module 16: Intrusion Detection Technologies..3-189
Intrusion Detection Technologies..3-189
What is IDS?..3-192
IDS Technology..3-194
IDS Alerts..3-197
true positives, False Positive
True Negative, False Negative
NIDS Overview..3-199
How Signature Analysis Works..3-201
Rules and Signature Criteria..3-202 *
How Anomaly Analysis Works..3-204 *
How Application Protocol Analysis Works..3-205
Deep vs. Shallow Packet Inspection..3-207
Data Normalization..3-209
NIDS Advantages..3-210
NIDS Challenges..3-213
Topology Limitatinos..3-214
Analyzing Encrypted Traffic..3-216
Signature Quality vs Quantity..3-217
NIDS Costs..3-220
TCPdump as NIDS..3-222
Snort as NIDS..3-224
Snort Rule Flexibility..3-227
Writing Snort Rules..3-228
Simple Snort Rules..3-229
Advanced Snort Rules..3-230
Key Points for NIDS..3-231 *
Developments in NIDS..3-233
HR IDS Application - Content Monitoring Systems..3-236
HIDS Overview..3-238
How File Integrity Checking Works..3-241
How Log Monitoring works..3-242
HIDS Network Monitoring..3-244
HIDS Advantages..3-245
HIDS Challenges..3-246
HIDS Recommendations..3-248
Developments in HIDS..3-248
Host and Network-based Intrusion Detection..3-251
Internet Storm Center..3-252
Module 17: Intrusion Prevention Technologies..3-255
What is IPS?..3-259
What IPS is Not?..3-261
HIPS Detail..3-263
HIPS Advantages..3-264
HIPS Challenges..3-265
Application Behavior Monitoring..3-267
HIPS Recommendations..3-269
to test, use hping
Port Sentry
Developments in HIPS..3-271
NIPS Overview..3-273
How NIPS Work..3-274
NIPS Detail..3-275
NIPS Challenges..3-278
Passive Analysis..3-279
Developments in NIPS..3-281 *
IPS Examples..3-284
Randy
Module 18: IT Risk Management..3-291
Risk management Overview..3-295
IT Risk management - Where do I Start?..3-296
Define Risk..3-301
Risk Management Questions..3-302
SLE vs ALE..3-305
Single Loss Expectancy (SLE - one shot)..3-306
Annualize Loss Expectancy (ALE - multi-hits)..3-307
Quantitative vs Qualitative..3-309
Threat Assessment, Analysis & Report to Management..3-311
Business Case for Risk Management..3-312
Business Case - Applications..3-313
Step 1 Threat Assessment and Analysis..3-314
Outsider Attack - Internet..3-316
Insider Attack - Internal Net..3-318
Insider Attack - Honeypot..3-320
Malicious Code..3-321
Step 2 - Asset Identification and Valuation..3-322
Step 3 - Vulnerability Analysis..3-323
Step 4 - Risk Evaluation..3-324
Step 5 - Interim Report..3-325
Acceptable Risk - Who Decides?..3-326
Cost Benefit Analysis..3-327
"Final" Report..3-328
Cookbook - Internet Security Technologies..2-1
Available upon request from Security Office ***
find where ipaddresses originate
ip2location.com
dnsstuff.com
Day 4
Module 19: Encryption 101..4-2
Encryption 101..4-3
What is Cryptography?..4-6 **
means hidden writing
plaintext is a message in its original form
Ciphertext is a message in its encrypted form
David kann, “Codebreaker”
Security by Obscurity is no Security..4-8
Beware of Overconfidence..4-10
Credit Cards Over the Internet..4-11
The Challenges That We Face..4-13
Goals of Cryptography..4-14 *
Digital Substitution (Encryption)..4-16
Digital Substitution (Decryption)..4-18
General Symetric Encryption Technique..4-19
substitution
Permutation
Hybrid
Arbitrary Substitution..4-20
Rotation Substitution..4-21
Permutation..4-23
Block Ciphers..4-24 *
Stream Ciphers..4-26 *
General Types of Cryptosystems..4-28
Types..4-29
Secret Key
Public Key
Hash
One-way transformation
No key encryption
Symetric Key Cryptosystems..4-30
Asymmetric Key Cryptosystems..4-32
“Public-Key” Encryption
RSA
EI Gamal
ECC
Diffie-Hellman Key Exchange..4-35 *
Agree on a large prime number, n
generator number, g
…
algorithms like this are not unbreakable, just not in a reasonable amount of time
Hash Functions..4-37
No Key
Primary Use: Message integrity
“weaknesses in oracle password algorithm”
a weakness involves multiple strings resolving to the same hash.
Steganography..4-39
Steganography (Stego)..4-40
Crypto vs Stego..4-41
Detecting Cryptography..4-43
Historgrams..4-44
How Steganography Works..4-45
General Types of Stego..4-46
Injection..4-47
Substitution..4-49
Generate New File..4-46
Module 20: Encryption 102..4-53
Concepts in Cyptography..4-57
Symmetric & Asymmetric Cryptosystems..4-64
DES..4-65
DES Weakness..4-66
DES Advangage..4-68
Meet-in-the-middle Attack..4-69 *
Triple DES..4-70
AES..4-72
AES Algorithm..4-74 *
AES Basic Functions..4-75
AES (2)..4-76
RSA..4-77
AES vs. DES (Asymetric vs Symmetric)..4-78
Elliptic Curve Cyptosystems (1)..4-79
Elliptic Curve Cyptosystems (2)..4-80
Comparing Key Length..4-82 *
Crypto Attacks..4-83
Birthday Attack..4-87
Module 21: Applying Cryptography..4-90
Applying Cryptography..4-91
Objectives..4-92
Data in Transit - VPN's
data at rest - PGP
Key Management - PKI
Virtual Private Networks (VPN's)..4-95
Confidentiality in Transit..4-96
Virtual Private Network (VPN)..4-97
VPN Advantage - "Flexibility"..4-98
VPN Advantage - "Cost"..4-99
VPN Breakdown..4-100
Types of Remote Access..4-101
Security Implications..4-103
IPSec Overview..4-105
Types of IPSec Modes..4-109 *
SSL VPN's..4-112
Examples of Non-IPSec VPN's..4-114
Pretty Good Privacy (PGP)..4-116
Confidentiality in Storage..4-117
On-the-Fly Encryption..4-120
Establishing a Key..4-121
Choosing a Passphrase..4-122
Encrypting Outbound Email..4-123
Sample PGP-Encrypted E-mail..4-125
Decrypting Inbound E-mail..4-126
Signing Outbound E-mail..4-127
Confirming a Signed E-mail..4-128
Public Key infrastructure (PKI)..4-129
What is the business Value of a Public Key Infrastructure?..4-130
How PKI Works..4-132
Operational Goals of PKI..4-135 *
Digital Certificates..4-139 *
Secure Web Traffic (SSL)..4-141
PKI SSL Crypto: An Illustration..4-143 *
Client Web Request
Server Responds
Client validates certificate & Crypto ( this is the step the client can cause failure by accepting the cert)
Client encrypts the session dey
Session key exchange
Server decrypts the session key
Encrypted messages are exchanged
Secure E-mail (S/MIME)..4-145
Partial or Whole Disk encryption..4-147
Other Uses of PKI..4-150
PGP as 'Web of Trust'..4-151
Problems with PKI..4-154
Certificate Authorities
expense
certification of the CA
Applying Cryptography: Summary..4-156
Module 22: Wireless Network Security..4-158
Wireless Network Security..4-159
PDA's
Mobile Phones
Laptops
Pagers
HVAC Control Units
traffic signals
power meters
Wireless Advantages..4-163
Vertical Markets..4-165
Bluetooth..4-168
Bluetooth..4-169
Bluetooth Specification..4-170
Bluetooth Security..4-172
4-16 byte pin
default 0000 or 9999
Bluetooth Security Issues
blueScanner..4-176
Bluesnarf Attacks..4-177
Bluetooth Sniffing Impact..4-178
Protecting Bluetooth..4-180
ZigBee Wireless..4-182
ZigBee Specification..4-183
ZigBee Security..4-185
802.11..4-187
IEE 802.11 Wireless..4-188
WEP Security..4-190
IEEE 802.11i, 802.1x, EAP..4-192
802.1x Authentication..4-193 *
Wi-Fi Protected Access..4-195
Wireless Security..4-196
General Misconceptions..4-197
Top 4 Security Risks for WLAN's..4-203
Eavesdropping..4-204
Eavesdropping Mitigation..4-205
Masquerading..4-207
Masquerading Mitigation..4-209
Denial-of-Service Attacks..4-210
DoS Attack Mitigation..4-212
Rogue AP's..4-213
Rogue AP Mitigation..4-214
Steps to Planning a Secure WLAN..4-216 *
Protecting Wireless Networks..4-218 *
Module 23: Voice over IP..4-220
VoIP..4-221
VoIP Functionality & Architecture..4-223
VoIP Overview..4-224
Phone can be routed and transmitted over the network.
can be any combination of analog telephone adapter, IP telephone and Computers.
VoIP Risks..4-225
External attacks
Internal Misuse
Theft
System Malfunction
Service interruption
LAN VoIP..4-227
WAN VoIP..4-228
VoIP Networking..4-229
Advantages of VoIP..4-231
Disadvantages of VoIP..4-234
VoIP Architecture..4-238
VoIP Components..4-240
VoIP Traffic Patterns..4-242
VoIP Protocols..4-243
VoIP Signaling H.323..4-245 *
VoIP Signaling - SIP..4-247
SIP Packet Details..4-248
SIP Exchange..4-249
VoIP and TCP vs UDP..4-252
Skype..4-253
VoIP Challenges..4-254
VoIP Operation Challenges..4-255
VoIP Security Challenges..4-257
VoIP Security Challenges..4-259
Securing VoIP..4-261
other services
Module 24: Operations Security..4-264
Operations Security (OPSEC) Defensive and Offensive Methods..4-265
Management Application - Operations Security (OPSEC)..4-268
The three Laws of Defensive OPSEC..4-270
OPSEC Weekly Assessment Cycle..4-271
Employee Issues..4-273
Employment Agreements..4-275
Need to Know..4-277
Putting it all together..4-278
Offensive OPSEC..4-282
Society for Competitive Intelligence Professionals Code of Ethics..4-290
Edgar Search..4-293
Wayback Search..4-298
Company Financials..4-302
What does this mean to me..4-306
How to Apply OPSEC - Summary..4-307
pgp
netstumbler
Invisible Secrets
xsteg/stegdetect
wireshark
wireshark and VoIP
Day 5
Module: 25 The Windows Security Infrastructure..5-2
The Windows Security Infrastructure..5-3
Windows Operating Systems..5-5
Windows XP..5-6
Windows Server 2003..5-9
Windows Vista & Windows 7..5-11
Windows Server 2008..5-14
same code base as vista
Powershell
Hyper-V
Windows Mobile..5-17
no raw socket support, so no sniffer cannot be written for it
therefore, no IDS would be available
showing up in embedded systems
Windows Mobile security Best Practices..19 *
Windows Workgroups and Accounts..5-21
Workgroups..5-22
Workgroups..5-24 Benefits
Workgroups..5-25 Drawbacks
Managing Local Accounts..5-26
Security ID Numbers (SIDs)..5-27
SIDs for common accounts are well known, like Administrator and Everyone
changing the name of these common accounts is a minimal security gain
Your Security Access Token (SAT)..5-29
Windows Active Directory and Group Policy..5-33
Active Directory Domains..5-34
Authentication Protocols (1 of 3)..5-37
Authentication Protocols: Kerberos (2 of 2)..5-39
Forests and Trusts..5-42
The Nature of Trust..5-44
Cross-Forest Trusts..5-46 *
Group Policy..5-48
How Group Policy Works..5-49
Module 26: Service packs, Hotfixes and Backups..5-53
Service Packs..5-56
Slipstreaming..5-58
Hands-Free Service Packs..5-59
Hotfixes..5-61
E-mail/Newsfeed Bulletins..5-62
Installing Multiple Hotfixes..5-63
Organize Hotfixes..5-64
BATCH.BAT..5-65
Microsoft Update..5-67
Windows Update..5-68
Windows Server update Services (WSUS)..5-69
How does WSUS work..5-71
WSUS Administration..5-72 *
3rd-Party Patch Management..5-74
Windows Backup and Restore..5-76
Importance of Backups for Security..5-77
Windows XP/2003 Backup..5-78 *
System State Backup..5-80
Windows Vista/2008/7 Backup..5-81
robocopy (Vista/2008/7)
wbadmin (2008)
Third-Party Backup Solutions..5-84
Binary Disk Images..5-85
System Restore..5-86 *
Previous Versions..5-89
Device Driver Rollback..5-91
Summary..5-92
Module 27: Windows Access Controls..5-94
Windows Access Controls..5-96
NTFS Overview..5-98 *
NTFS DACL's..5-100
Advanced Security Settings for ACE's *
NTFS Owners..5-104
Principle of Least Privilege..5-106
AGULP..5-108,5-109 *
AD Users and Computers..5-110
Shared Folder Permissions..5-112
Hidden and Administrative Shares..5-115
Combining NTFS and Share DACL's..5-117 *
What is the Registry?..5-119
Remote Registry Service..5-120
Registry DACL..5-122
Active Directory Permissions..5-123
Delegation of Authority in AD..5-125
Mandatory Integrity Control (MIC)..5-127 *
User Rights..5-129
Encypting File System..5-137
EFS Implementation Details..5-139 *
EFS Key Recovery..5-140
EFS Best Practices..5-142
BitLocker Overview..5-144
BitLocker TPM Options..5-148
Disabling vs Turning Off..5-150
Emergency Recovery..5-151,5-153 *
Module 28: Enforcing Security Policy..5-156
Security Templates..5-159 *
SCA Snap-In..5-164
SECEDIT.EXE..5-166
Local Group Policy Object..5-167
GPO Security Settings..5-169
GPO Scripts..5-170
Administrative Templates..5-171
Domain Group Policy Objects..5-173
Default Domain and OU GPO's..5-175
Checklist of GPO Settings..5-176 * (for audit)
GPO > Passphrase Policy..5-177
GPO > Lockout Policy..5-179
GPO > Security Options..5-180,5-183
Anonymous Access..5-184 ** check
net.exe use \\address\IPC$ "" /user:""
* null users not used as much on later OS's
Kerberos & NTLMv1..5-186
Kerberos & NTLMv2..5-187
The Guest Account..5-188
Administrative Accounts..5-190
Software restriction Policies..5-192
User Account Control..5-195
Internet Explorer Security..5-198 *
Internet Explorer Security..5-201
Module 29: Windows Network Services..5-207
The Best Way to Secure a Service..5-210
How to disable Service..5-211
Service Applet
Security Template
GPO
SC.EXE
Security Configuration Wizard..5-214
Server Manager..5-218
Network Adapter Bindings..5-220
Do I Still Need NetBIOS?..5-222
Key Protocols..5-226
More Key Protocols..5-228
The Windows Firewall in Vista/2008/7..5-230
Network Location Types..5-232 *
Managing Firewall Rules..5-234
Windows IPSec & other VPN's..5-238
Internet Protocol Security..5-239
IPSec & Group Policy..5-242
Group Policy Example..5-243
Virtual Private Networking..5-245
Routing and Remote Access Service..5-249
Windows IIS Security..5-251
Use a Minimal Patched Install..5-253
Separate NTFS Volumes for Web Content..5-255
very important
makes backup easier
Remove Unused Handler Mapping..5-259
Folders Not to Have..5-261
IIS Access Controls..5-263
Some Questions for Your Web Developers..5-267,5-270 *
SQL SErver Security Tips..5-271,5-272 *
Remote Desktop Services..5-273
Remote Desktop Services..5-274
RDP Best Practices..5-278
Module 30: Automation, auditing and response..5-285
Windows Automation and Auditing..5-286
Automation..5-289
Microsoft Resource Kits..5-292
WMIC.EXE..5-297
wmic.exe process list full
Microsoft PowerShell..5-310
Push Scripts with Group Policy..5-312
Scheduling Jobs..5-314
Auditing..5-316 *
Verifying Policy Comliance..5-317
The SCA Snap-In Again..
SECEDIT.EXE..5-320
Microsoft Baseline Security Analyzer..5-322,5-323 *
MBSACLI.EXE..5-326
Windows Defender..5-328
Creating Snapshots..5-330
Snapshot Batch Script..5-334,5-335,to 5-338
Gathering Ongoing Data..5-339
Security Event Log and Audit Policies..5-341 *
NTFS, Registry and Printer SACLs..5-343
What Objects Should be Audited?..5-346 *
Log Size and Wrapping Options
Log Consolidation..5-350
IIS Logging..5-352
Change Detection and Analysis..5-355
Cookbook - Windows Security..5-358
nmap scans
nmap SYN: -sS, UDP: -sU, Xmas: -sX, FIN: -sF
Cookbook
SCA
BSA
CIS
Linux Security - Day 6
Module 31: Securing Linux/Unix..6-3
fog
Securing Linux/Unix..6-3
Operating System Overview..6-5
Kernel..6-6
File system Structure..6-7
File System Strucure..6-8
Shell..6-9
Examples of Shells..6-10
sh
csh
bash
ksh
tcsh
for windows, COMMAND.COM
Commands You Need to Know..6-11,6-12 *
pwd..6-13
cd..6-14
ls..6-15
touch / clear..6-16
cat..6-17
mv..6-18
cp..6-19
mkdir..6-20
rmdir..6-21
rm..6-22
su..6-23
find..6-26
grep..6-27
man
Unix File Permissions..6-29
ls -l
- regular file
d directory
l link
c
v
Unix File Permissions..6-31 *
Group Management..6-40
/etc/group..6-41
uid=500(steve) gid=500(steve) groups=500(steve) context=user_u:system_r:unconfined_t
passwd File "good old days"..6-45
Passwd/shadow..6-46
AIX
/etc/passwd
/etc/security/passwd
Free BSD
/etc/passwd
/etc/master.passwd
HP-UX
/etc/passwd
/etc/files/auth/root
LINUX(RedHat) & Solaris
passwd File..6-47 *
shadow File..6-48 *
useradd..6-49
Enabling Password Aging..6-50
/etc/login.defs
/etc/default/useradd
Account Password Info..6-52
Enforce stronger Passwords..6-53
Restricting Use of Previous Passwords..6-54
Locking User Accounts After To Many Login Failures..6-55
Process Status (ps)..6-56
Process Status (ps)..6-57
User
PID
%CPU
%mem
vsz
stat
start
time
command
netstat..6-59
Backup with dd..6-61
Module 32: Securing Linux/Unix..6-63
How Unix Systems Boot..6-65
1st stage is MBR
2nd stage
Boot Loader..6-69
Run Levels..6-70,6-71 *
inittab..6-72
Run condition directory..6-73
init.d..6-74
service management..6-75
Patch a Disabled Service?..6-76
service command..6-77
chkconfig..6-78
How are services started..6-79
Common Services..6-80
Network File System..6-81
NFS..6-82.6-83
Samba..6-84
DNS Basic..6-85
DNS server check cache first the goes out to root servers
Remote Procedure Call..6-88
Remote Procedure Call in action..6-89
Port Mapper..6-90
Other RPC Services..6-91
lockd
statd
automountd
rsh
rcmd and rexd
Inetd/ xinetd..6-92
inetd..6-93
xinetd..6-95
xinetd Key files/Directory..6-96 *
tcpwrappers..6-98
Module 33: Securing Linux/Unix..6-106
Logs and Log Management
Important Log Files..6-108
WTMP Log..6-109
UTMP Log..6-110
w, finger and who
updated by login program
utmp "w" output..6-112
Lastlog..6-113
SULOG..6-114
HTTP Logs..6-116,6-117 *
Messages (SYSLOG)..6-118
Messages..6-119 *
The syslogd..6-120
syslog.conf..6-122
Facilities..6-123
Levels..6-124
Actions..6-125
Secure Log..6-126
Example of a Secure Log after a Scan..6-127
FTP Logs..6-128
Maillog..6-132
Module 34: Securing Linux/Unix..6-136
Patch Management
Why Patch..6-138
Be Careful..6-139
Finding Out About Patches..6-140
Using apt..6-141
RPM..6-143
rpm -q <pkgname>
rpm -initdb
rpm -rebuilddb
Other O/S..6-146
Module 35: Securing Linux/Unix..6-148
Security Enhancement Utilities
Tripwire..6-150
Tripwire Attribute Tracking..6-151
Tripwire Common Commands..6-152
iptables..6-153
Mangle..6-154
filtering..6-155
nat..6-156
Custom Chains..6-157
rules..6-158,6-159 *
iptables -L (list)..6-160
iptables -F (flush)..6-161
Additional Security Options..6-162
Boot Loader Password
ps
Netstat
SELinux
AppArmor
Security-Enhanced Linux (SELinux)..6-164
Parts of SELinux..6-165
How to Enforce..6-166
DAC & SELinux Policy..6-167
MLS/MCS..6-168
SELinux COmmands..6-169
sestatus..6-170
chcon & semanage..6-171
restorecon..6-172
audit2allow..6-173
getenforce..6-174
setenforce..6-175
Other Approaches..6-176
Glossary of Terms..6-181
Other