Module I: Survey of Hacking Attacks
High profile attacks detected recently
Classification of threats
Eves Dropping
Back Doors
Virus attacks
Worms
Phishing Attacks
Port Scanning
Password Scanning
Man-in-the-middle attacks
Denial of Service
Module II: Review
of Security
Review of layered protocols
Application and network service layers
Identifying Ethernet security issues
Addressing Issues
Ethernet Addressing
IPv4 addressing
Analyzing IP fragmentation
Identifying ICMP security issues
Implementing basic traffic capture and analysis
Module III: IP and
ARP Vulnerability Analysis
Identify IP security issues
Describe IP routing and routing protocol security
Protect against IP abuse
Identify ARP security issues
Execute attacks against ARP
Protect against ARP abuse
Implement advanced packet capture and analysis
Module IV: UDP/TCP
Protocol Vulnerability Analysis
Discuss characteristics of UDP and TCP
Identify TCP security issues
Common TCP abuses:
SYN attack, sequence guessing, connection hijacking
Discuss characteristics of TELNET
Identify TELNET security issues
Execute attacks on TCP and TELNET
Protect against TCP and TELNET abuse
Module V: FTP
and HTTP Vulnerability Analysis
Characteristics of FTP
Analyzing FTP transfer methods and modes
Identifying FTP security issues
Common FTP abuses: FTP bounce attack, port stealing, brute force
Characteristics of HTTP
HTTP proxy servers and HTTP authentication
Identifying HTTP security issues
HTTP abuses: path name stealing, header spoofing, proxy poisoning
Attacking FTP and HTTP
Protecting against FTP and HTTP abuse
Module VI: DNS
Vulnerability Analysis
Characteristics of DNS
Identifying DNS security issues
DNS abuses: DNS spoofing, DNS cache poisoning, unauthorized zone transfers
Attacking DNS
Protecting against DNS abuse
Module VII: SSH
and HTTPS Vulnerability Analysis
Characteristics of SSH
Differences between SSH1 and SSH2 protocol
Identifying SSH security issues
SSH abuses: insertion attack, brute force attack, CRC compensation attack
Characteristics HTTPS (SSL)
Other SSL enabled protocols
Common SSL abuses: man-in-the-middle and version rollback attack
Module VIII: Network Attack Techniques and Basic Attack Detection
Identify sources of network attacks
Discuss methods of intrusion
Describe common network attacks: denial-of-service, software buffer overflow, poor system configuration, password guessing/cracking
Describe a typical intrusion scenario
Introduce the concept of an Intrusion Detection System (IDS)
Some popular IDS tools: Snort, Security Center, ThreatSentry
Implement basic scan detection
Types of IDS implementation: hybrid NIDS and honeypots
Components of a NIDS using the snort NIDS
Advanced features: "real time response" and log monitors
Module IX: Intrusion
Risk Minimization and Best Practice
Top 7 key actions to take
Elements in staff best practice
Controlling Keys, passwords and permissions
Separation of Services
Actions for Audit
Evaluation
and Review