ECSA Course Outline
ECSA Course Outline
COURSE OUTLINE
Student Introduction
Certification
ECSA Track
LPT Track
What next after ECSA Training?
Demo - Overview of Available Resources
Lab Sessions
Student Introduction Review
Advanced Googling
Site Operator
intitle:index.of
Demo - Default Pages: tsweb
error | warning
Demo - Google as a Proxy
login | logon
username | userid | employee.ID | “your username is”
password | passcode | “your password is”
admin | administrator
–ext:html –ext:htm –ext:shtml –ext:asp –ext:php
inurl:temp | inurl:tmp | inurl:backup | inurl:bak
Google Advanced Search Form
Categorization of the Operators
allinanchor:
allintext:
Demo - Google Locating Live Cams
Locating Public Exploit Sites
Locating Exploits via Common Code Strings
Locating Vulnerable Targets
Designing a DMZ
Introduction
DMZ Concepts
DMZ Design Fundamentals
Advanced Design Strategies
Types of Firewall and DMZ Architectures
"Inside vs. Outside" Architecture
"Three-Homed Firewall" DMZ Architecture
Weak Screened Subnet Architecture
Strong Screened Subnet Architecture
Designing a DMZ using IPtables
Designing Windows DMZ
Precautions for DMZ Setup
Demo - Designing DMZs
Advanced Implementation of a Solaris DMZ Server
Solaris DMZ Servers in a Conceptual Highly Available Configuration
Hardening Checklists for DMZ Servers and Solaris
Placement of Wireless Equipment
Access to DMZ and Authentication Considerations
Wireless DMZ Components
WLAN DMZ Security Best Practices
Ethernet Interface Requirements and Configuration
DMZ Router Security Best Practice
Six Ways to Stop Data Leaks
Module 7 Review
Snort Analysis
Snort Overview
Modes of Operation
Features of Snort
Configuring Snort
Snort: Variables
Snort: Pre-processors
Snort: Output Plug-ins
Snort: Rules
How Snort Operates
Initializing Snort
Demo - Snort IDS Testing Scanning Tools
Signal Handlers
Parsing the Configuration File
Decoding
Log Analysis
Logs
Events that Need to be Logged
What to Look Out For in Logs
Automated Log Analysis Approaches
Log Shipping
Syslog
Setting up a Syslog
System Error Logs
Kiwi Syslog Daemon
Configuring Kiwi Syslog to Log to a MS SQL Database
Configuring a Cisco Router for Syslog
Configuring a DLink Router for Syslog
Gathering Log Files from an IIS Web Server
Apache Web Server Log
AWStats Log Analyzer
Cisco Router Logs
Analyzing Netgear Wireless Router Logs
Wireless Traffic Analysis Using Wireshark
Configuring Firewall Logs in Local Windows System
Viewing Local Windows Firewall Log
Viewing Windows Event Log
Collecting & Monitoring UNIX Syslog
iptables
Log Prefixing with iptables
Firewall Log Analysis with grep
SQL Database Log
Using SQL Server to Analyze Web Logs
Analyzing Oracle Logs: The Oracle Metric Log File
ApexSQL Log
Analyzing Solaris System Logs
Demo - Splunk
Rules of Engagement
Rules of Engagement (ROE)
Demo - OSSTMM Model
Scope of ROE
Steps for Framing ROE
Clauses in ROE
Demo - ScreenHunter Desktop Capture Tool
Module 13 Review
Information Gathering
What is Information Gathering?
Information Gathering Steps
Step 1: Crawl the Website and Mirror the Pages on Your PC
Demo - HTTrack Website Copier
Step 2: Crawl the FTP Site and Mirror the Pages on Your PC
Demo - Wget and Backtrack 4 Live CD
Step 3: Look up Registered Information in the Whois Database
Demo - CentralOps and Domains by Proxy
Demo - Backtrack and Whois
Step 4: List the Products Sold by the Company
Demo - Firecat (Firefox Addons)
Step 5: List the Contact Information, Email Addresses, and Telephone Numbers
Step 6: List the Company’s Distributors
Step 7: List the Company’s Partners
Vulnerability Analysis
Why Assess?
Vulnerability Classification
What is Vulnerability Assessment?
Demo - Vulnerability Research Resources
Demo - Nessus 4 Windows Install and Wikto Scan Webgoat
Types of Vulnerability Assessment
Demo - Nessus 3 Webgoat Scan BT4
Demo - Nessus 4 Webgoat Scan
Demo - GFI LANguard
How to Conduct a Vulnerability Assessment
How to Obtain a High Quality Vulnerability Assessment
Vulnerability Assessment Phases
Pre-Assessment Phase
Assessment Phase
Post-Assessment Phase
Vulnerability Analysis Stages
Comparing Approaches to Vulnerability Assessment
Characteristics of a Good Vulnerability Assessment Solution
Vulnerability Assessment Considerations
Vulnerability Assessment Reports
War Dialing
War Dialing Techniques
Why Conduct a War Dialing Pentest?
Pre-Requisites for War Dialing Penetration Testing
Software Selection for War Dialing
Guidelines for Configuring Different War Dialing Software
Recommendations for Establishing an Effective War Dialing Process
Interpreting War Dialing Results
List of War Dialing Tools
Demo - New War Dialing Tool: WarVOX
PhoneSweep
THC Scan
ToneLoc