Overview
This class will provide the students with a unique perspective on network intrusion investigations and analysis. Students will begin the course by compromising a system ("ethical hacking") leveraging techniques that have been seen in the wild by attackers. Once in, they will walk through the stages of an intrusion, from compromise to entrenchment, and exfiltration of data. The course then takes a unique spin in that students will review the captured network traffic looking for artifacts of their compromise, combing through packet captures to see the footprint that they, as the attacker, have left. Not stopping there, students will then learn the principles of an incident response, leveraging the tools of the trade to collect volatile data as well as forensic imaging of a compromised host. Finally, class attendees with complete the course by performing forensic analysis of the acquired artifacts, rounding out the lifecycle of an intrusion investigation.
Audience
This course will significantly benefit security professionals, network administrators, systems administrators, auditors, cyber investigators and anyone who is concerned about the integrity and security of their systems and network infrastructure. This course will also be extremely beneficial to anyone with a firm technical background who might be asked to investigate a data breach incident, intrusion case.
Prerequisites
- Required - Familiarity with the core TCP/IP protocols (e.g., FTP, TCP, HTTP)
- Required - Windows and Linux command-line interfaces
- Recommended ¡V Ethical Hacking
Course duration
5 days
Course Objectives
Upon successfully completing the course, students will be able to:
- Scan and exploit a remote target
- Identify network traffic and log entries related to scanning and exploitation
- Use automated tools to perform exploitation
- Perform a Vulnerability Analysis
- Analyze a Network Intrusion
- Utilize hacker Methodologies and Anti-Forensic techniques
Course outline
Day 1 Windows network intrusions overview Outline
- Overview of Windows networking
- Variety of operating systems
- Servers, (Windows, Linux, email, web, file, print)
- Network devices and their logs
- What devices are in the path from infection to Internet
- So called witness devices
- What can you see on your network?
- Where are the holes in your visibility?
- Current security posture of most organizations
- Open source vs commercial
- Open source vs commercial
- Attackers, their objectives and their tools
- What are they after and why
- Where to look for signatures
- Tipping off the attackers
- Communication channels (out of band)
- Frequent locations and data sets.
Day 2 Attacker tools, methods and tactics
- Frequency of malware with intrusions
- What do they look for and why?
- How and why do they entrench
Day 3 Incident Response
- Notification of an incident
- How do incidents get reported?
- OS types within your network
- Non-Volatile data collection
- What can the CIRT team do?
- How to elevate permissions
Day 4 Media Analysis (forensics)
- Windows Registry Analysis
- Unallocated Space/Data Carving
- Compromised account tracking
Day 5 Putting it all
- Series of hands on exercises
|