Linux Training Overview
This extremely popular class focuses on network security, and makes an excellent companion class to the Enterprise Linux Security Administration course. After a detailed discussion of the TCP/IP suite component protocols and Ethernet operation, the student practices using various tools to capture, analyze, and generate IP traffic. Students then explore the tools and techniques used to exploit protocol weaknesses and perform more advanced network attacks. After building a thorough understanding of network based attacks, course focus shifts to the defensive solutions available. Students install, configure, and test one of the most popular and powerful NIDS solutions available. Finally, students create a Linux based router / firewall solution, including advanced functionality such as NAT, policy routing, and traffic shaping.
Linux Training Prerequisites
Prerequisites: Since the tools used in class are compiled and run on a Linux system, Linux or UNIX system experience is helpful, but not necessary. A solid background in networking concepts will greatly aid incomprehension. This is an intense class that covers many topics.
Courseware supports latest versions of Red Hat Enterprise Linux, Fedora Core, SUSE LINUX Professional, and SUSE LINUX Enterprise Server.
Linux Training Course duration
40 Hours
Linux Training Course outline
Section 1 Ethernet and IP Operation
- OSI Network Model
- Application Layers
- Network Services Layers
- Moving Data Through The Stack
- Data Link Layer Format
- Ethernet Operation
- Hub and Switch Operation
- Ethernet Security Issues
- Detecting Promiscuous NICs
- Network Packet Capture
- tcpdump
- Ethereal
- IPv4
- IP Addressing
- Differentiated Services
- IP Fragmentation
- Path MTU Discovery
- ARP
- ICMP
- ICMP Redirects
- Important ICMP Messages
- ICMP Security Issues
- Protecting Against ICMP Abuse
Lab 1 - Basic Traffic Generation, Capture, and Analysis
- Capture and analyze ARP traffic with a variety of tools
- Capture and analyze ICMP echo, unreachable, and redirect messages
- Explore the differences between a variety of traffic capture utilities and their interfaces and options
Section 2 IP and ARP Vulnerability Analysis
- IP Security Issues
- IP Routing
- Routing Protocol Security
- Protecting Against IP Abuse
- RP Security Issues
- Cache Poisoning with ARP Replies
- Cache Poisoning with ARP Requests
- ARP Cache Poisoning Defense
Lab 2 - Advanced Traffic Generation, and Capture
- Learn to use a variety of tools to generate traffic, including forged headers.
- Use ARP cache "poisoning" to capture traffic on a switched LAN
- Use various techniques to discover if a NIC is in promiscuous mode
Section 3 UDP/TCP Protocol and TELNET Vulnerability Analysis
- User Datagram Protocol
- UDP Segment Format
- Transmission Control Protocol
- TCP Segment Format
- TCP Port Numbers
- TCP Sequence / Acknowledgment #’s
- TCP Three-way Handshake
- TCP Window Size
- The TCP State Machine
- The TCP State Transitions
- TCP Connection Termination
- TCP SYN Attack
- TCP Sequence Guessing
- TCP Connection Hijacking
- Telnet
- Telnet Concepts - Options
- Telnet Concepts - Commands
- Telnet Security Concerns
Lab 3 - Attacks on TCP
- Use forged packets to slow and kill TCP sessions.
- Monitor and hijack a telnet session
Section 4 FTP and HTTP Vulnerability Analysis
- FTP
- Modes
- Transfer Methods
- Security Concerns
- The Bounce Attack
- Minimizing Risk
- FTP - Port Stealing
- Brute-force Attacks
- Access Restriction
- Privacy
- HTTPv1.1
- HTTP Protocol Parameters
- HTTP Message
- HTTP Request/Method Definitions
- Response/Status Codes
- Proxies
- Authentication
- Security Concerns
- Personal Information
- Attacks On File and Path Names
- Header Spoofing
- Auth Credentials and Idle Clients
- Proxy Servers
Lab 4 - Attacks on FTP and HTTP
- Use dsniff to capture FTP and HTTP passwords
- Bonus exercise: Use urlsnarf and webspy to monitor a web browser
Section 5 DNS Protocol Vulnerability Analysis
- DNS
- DNS Basic Concepts and Terms
- DNS Resolution
- DNS Zone Transfers
- DNS Spoofing
- DNS Cache Poisoning
- DNS Security Improvements
Lab 5 - Attacks on DNS
- Use dnsspoof to forge DNS responses to redirect web traffic
- Use forged DNS responses to circumvent host based access security
Section 6 SSH and HTTPS Protocol Vulnerability Analysis
- SSH Concepts
- Initial Connection
- Protocols
- SSH1
- SSH2
- Encryption Vulnerabilities
- SSH Vulnerabilities
- SSH1 Insertion Attack
- SSH Brute Force Attack
- SSH1 CRC Compensation Attack
- Bleichenbacher Oracle
- SSH1 Session Key Recovery
- Client Authentication Forwarding
- Host Authentication Bypass
- X Session Forwarding
- HTTPS Protocol Analysis
- SSL Enabled Protocols
- SSL protocol
- SSL Layers
- The SSL Handshake
- SSL Vulnerabilities
- Intercepted Change Cipher Spec
- Intercepted Key Exchange
- Version Rollback Attack
Lab 6 - HTTPS and SSH
- Perform a man-in-the-middle attack on secure web connections.
- Perform a man-in-the-middle attack on SSH v1 connections.
- erform a timing and packet length attack on SSH v1 and SSH v2 connections.
Section 7 Remote Operating System Detection
- OS Detection
- Banners
- Commands
- Less-direct Approaches
- TCP/IP Stack Fingerprinting
- Remote Fingerprinting Apps
- nmap
Lab 7 - Using nmap
- Use the Nmap utility to perform general network sweep scans.
- Use Nmap to perform a wide variety of scans on a host.
- Use Nmap to perform TCP/IP fingerprinting for remote OS detection.
Section 8 Attacks and Basic Attack Detection
- Sources of Attack
- Denial-of-Service Attacks
- Methods of Intrusion
- Exploit Software Bugs
- Exploit System Confiuration
- Exploit Design Flaws
- Password cracking
- Typical Intrusion Scenario
- Intrusion Detection
- IDS Considerations
- Attack Detection Tools
- Klaxon
- PortSentry
- PortSentry Design
- Snort
Lab 8 - Basic Scan Detection
- Examine standard system logs and statistics for signs of attack
- Configure portsentry to log port scans from nmap
- Configure portsentry for active response to port scans
Section 9 Intrusion Detection Technologies
- Intrusion Detection Systems
- Host Based IDS
- Network Based IDS
- Network Node IDS
- File Integrity Checkers
- Hybrid NIDS
- Honeypots
- Focused Monitors
- Snort Architecture
- Snort Detection Rules
- Snort Logs and Alerts
- Snort Rules
Lab 9 - Exploring Snort
- Install snort
- Test Snort to see if it detects Nmap scans
- Use Snort to examine network traffic in decoded text format
- Use Snort to capture all network packets in tcpdump-style binary logs
- Use tethereal to analyze captured packets
- Setup Snort to log to SYSLOG
Section 10 Advanced Snort Configuration
- Advanced snort Features
- snort Add-ons
- ACID Web Console
- The ACID Interface
- SnortCenter Management
Lab 10 - Snort Tools
- Set up a new MySQL database for use with snort
- Configure snort to log to the new database
- Set up and test the ACID analysis tool
- Setup and configure SnortCenter
- Install and configure the Linux SnortCenter Sensor Agent
- Observe how snort and ACID respond to attacks.
Section 11 Snort Rules
- Snort Rules Format
- Snort Rules Options
- Writing Snort Rules
- Example Rules
Lab 11 - Custom Snort Rules
- Capture packet from exploit that Snort does not currently detect
- Write a custom rule for snort to detect the exploit
- Verify exploit detection
Section 12 Linux and Static Routing
- Linux As a Router
- Linux Router Minimum Requirements
- Router Focused Distributions
- Router Specific Settings
Lab 12 - Static Routing
- Configure your host to act as a router
- Configure and test "automatic" anti-spoofing protection
- Configure the system to implement the above automatically on reboot
Section 13 Linux Firewalls
- Types of Firewalls
- Application Firewalls:TCP Wrappers
- Application Firewalls: Squid
- Packet Filter: ipchains
- Stateful Packet Filter: iptables
- Firewall Topology
- Recommended Firewall Rules
- Firewall Limitations
- iptables Concepts
- Using iptables
- Advanced iptables Actions
- iptables: A More Secure Approach
Lab 13 - IPtables
- Use iptables to filter traffic destined to your host
- Use iptables to log traffic destined to a specific port on your host
Section 14 Network and Port Address Translation
- Address Translation
- Configuring NAT and PAT
- NAT Limitations
|