National CCDC

CNIT 140: IT Security Practices

Fall 2016 - Sam Bowne

Scores

Schedule · Lecture Notes · Projects · Links · Home Page


77301  Sat 10 am - 1:00 pm, Cloud 218 Note: room and time changed

Purpose of Class

Training students for cybersecurity competitions, including CTF events and the Collegiate Cyberdefense Competition (CCDC). This training will prepare students for employment as security professionals, and if our team does well in the competitions, the competitors will gain recognition and respect which should lead to more and better job offers.

The primary focus of this class is hands-on defense of systems. Students will work in groups configuring servers, firewalls, routers, switches, and other systems to resist attacks.

Online Attendees

We will use videoconferencing, Slack, and other tools vigorously to ensure that students who cannot physically attend the class are able to participate as much as possible in the training and competitions.

Textbook

There will be no textbook. We will use online tutorials and presentations instead.

Catalog Description

This course explores techniques used by hackers to access protected data. Students will learn about cybercrime laws, penalties and organizations defending civil liberties of citizens. Students will learn about the various methodologies hackers use to gain access to confidential data such stealthy network recon, passive traffic identification, etc. CSU

Advisory: CNIT 123 or equivalent familiarity with hacking techniques




Schedule (may be revised)

Date Report Topic


Sat 8-13
Introduction to Cybercompetitions and the CCDC
Visiting Speaker: Tim Krugh
Class Structure and Grading


Sat 8-20 1. Networking


Sat 8-27Progress Plan Due 2. Perimeter Security


Fri 9-2Last day to add


Sat 9-3Holiday: No Class


Sat 9-10 3. Flashing/Patching; REGISTER FOR WRCCDC


Sat 9-17Report 1 Due 4: Unix


Sat 9-24 5. Windows


Sat 10-1 Class cancelled for Code Camp


Sat 10-8 The Penetration Testing Execution Standard


Sat 10-15Report 2 Due Windows Internals


Sat 10-22 Fail2Ban
PHP Security
Auth Logs
IPTstate


Sat 10-29CCDC Info & Rekall


Sat 11-5

Rochester, NY

Teams image

RESULTS

WRCCDC Virtual Invitational
10:30AM-2:30PM PDT
SCIE 214, CCSF


Sat 11-12Report 3 Due

CCDC Plans

Three teams: Windows, Linux, Palo Alto

By Next Week

1. 1. Make VMs of the machines
2. Prepare cheat sheet for securing them
3. Demonstrate ability to secure them in 15 min.


Sat 11-19 CCDC Prep Schedule:

Mon 11-21 4 PM meet in S214
Tue 11-22 4 PM meet in S214

Mon 11-28 4 PM meet in S214
Tue 11-29 4 PM meet in S214
Wed 11-30 4 PM meet in S214
Thu 12-1 4 PM meet in S214


Sat 11-26Holiday: No Class


Sat 12-3Report 4 Due Last Class: TBA

WRCCDC Virtual Invitational 10:30AM-2:30PM PDT


Sat 12-10 Final Exam Day: Make-Up & Extra Credit





Lecture Topics (May Be Revised)

Grading Policy

Tim Krugh's Slides (ODP) · Tim Krugh's Lecture (YouTube)

1. Networking -- Traffic flow, switching, and routing. · KEY · PDF

2. Perimeter Security -- Network and Host based firewalls, how they work and how to configure them, as well as Intrusion Detection Systems, Virtual Private Networks, and DMZs.· KEY · PDF

Write-Up for "Judgement", from Tokyo Westerns / MMA CTF 2nd 2016

3. Flashing/Patching -- Both Hardware and Software Flashing/Patching
OpenWrt in VMware Fusion
JTAG powerpoint
Write-Up for "Judgement"a, from Tokyo Westerns / MMA CTF 2nd 2016
CTF Flow Chart

Windows Internals KEY · PDF

NECCDC Materials & Rekall KEY · PDF

4. UNIX -- Multiple flavors of UNIX such as Fedora Core, Solaris, Gentoo, BSD, Ubuntu, etc.

5. Windows Workstations and Servers -- NT, 2000, 2008, 2012, XP, 7, 8, 10

6. User Management -- Adding and deleting users on multiple Operating Systems and managing those user accounts

7. Services and Applications -- Email, DNS, HTTP, HTTPS, SQL, Web applications

8. Tools - Port Scanners, Vulnerability Scanners, MD5, and Software based firewalls and IDSs.

9. Authentication -- Beyond just knowing how to change passwords in multiple environments, also understanding other forms of authentication such as multi-factor, biometrics, and tokens

10. General - Performing admin duties such as installing, securing, updating, troubleshooting, and maintaining the functionality of computer systems on a network.

Click a lecture name to see it on SlideShare. If you want to use other formats, you may find this useful: Cloud Convert.


Back to Top

Projects (under development)

Palo Alto Virtual Firewall

Downloading the Virtual Machines

Suggested Project Topics

  • picoCTF
  • Splunk
  • Bro
  • Snort
  • Router ACLs & Switching configs (Packet Tracer?, Juniper, Cisco, Vyatta, Endian)
  • Pix and ASA firewalls (pfSense)
  • Write a report: incident response, security audit

Networking Equipment

Configuring routers and switches; using Packet Tracer
Configuring firewalls

Windows Servers

Common Services: IIS, SQL Server, Exchange, and Domain Controllers
Finding and Patching Vulnerabilities: MBSA

Linux Servers

Essential Versions: Ubuntu, Fedora, FreeBSD, and Solaris
Services: Apache, Bind, and Sendmail

Protocols

HTTP, HTTPS, DNS, SMTP, POP3, SSH, FTP, SQL

Intrusion Detection

Snort, Splunk, Configuring Logging, Network Monitoring

Injects

Migrate a Website from IIS to Apache

Tools (may be revised)

Assessment Tools:
Kali, Codescout, Metasploit Framework, Microsoft Baseline Security Analyzer, Nessus, Netcat, Nikto, Nmap, Paros Proxy, Superscan

Forensics Utilities: Coroners Toolkit

DNS Utilities: Dig, Nslookup, Whois

Packet Analysis: Ettercap, TCPDUMP, Wireshark

Compression Utilities: Gzip, 7-Zip, Tar, Zip

Perimeter Security: Iptables/TCP Wrappers, Snort

Password Auditing: John the Ripper, L0pht Crack, Cain and Abel

Miscellaneous Tools: GCC, Make, MD5, Microsoft Update, Nagios, PGP, PHPMyAdmin Ping, Sysinternals, Traceroute, Tripwire

Training: Hackme Bank, Books, Casino, Shipping, or Travel, WebGoat, WebMaven


Links

CCDC 1: CCDC Team Preparation Guide -- GOALS FOR CLASS
CCDC 2: Preparing for the Collegiate Cyber Defense Competition (CCDC): A Guide for New Teams and Recommendations for Experienced Players
CCDC 3: Web Application Defender's Cookbook: CCDC Blue Team Cheatsheet
CCDC 4: Tips - How-To Guide for the CCDC
CCDC 5: How to Win CCDC

Net 1: Wireshark 101: Essential Skills for Network Analysis
Net 2: WCNA Certification
Net 3: laura chappell wireshark - YouTube
Net 4: Warriors of The Net
Net 5: Popular port numbers Flashcards
Net 6: WARRIORS OF THE NET [Full] - YouTube

Perimeter 1: Project - Snort
Perimeter 2: The Top 20 Free Network Monitoring and Analysis Tools for Sys Admins
Perimeter 3: Top FREE Network Monitoring Tools
Perimeter 4: 7 free tools every network needs
Perimeter 5: Phantom Cyber Network Monitoring

Windows 1: Free Intrusion Detection and Prevention software
Windows 2: Detecting Security Incidents Using Windows Workstation Event Logs
Windows 3: How to close TCP and UDP ports via windows command line
Windows 4: CurrPorts: Monitoring TCP/IP network connections on Windows
Windows 5: TCPView for Windows

OpenWrt 1: OpenWrt
OpenWrt 2: What Is OpenWrt And Why Should I Use It For My Router?
OpenWrt 3: Installing OpenWrt [OpenWrt Wiki]
OpenWrt 4: How to create Openwrt on VMWARE Workstation

PTES 1: Introduction to Penetration Testing -- Slides
PTES 2: The Penetration Testing Execution Standard
PTES 3: PTES Technical Guidelines - The Penetration Testing Execution Standard

Windows Internals 1: Book (PDF)
Windows Internals 2: Tricks in Assembly Language (pdf)

Resources

Arizona Cyber Warfare Range -- USE FOR PROJECTS
CPTC: Collegiate Pentesting Championship
Path to OSCP -- Many resources
CCSF-Hacking - Google Groups

Miscellaneous Links

THE SECOND INTER-COLLEGIATE PENETRATION TESTING COMPETITION
osx - Is there a quick and easy way to dump the contents of a MacOS X keychain?
Nagios - Network, Server and Log Monitoring Software
Vulnerable By Design ~ VulnHub -- GOOD CTF PRACTICE
Security Onion -- NETWORK MONITORING PROJECT
Network Security Toolkit (NST 24) -- USEFUL FOR A PROJECT
Skynet Solutions : EasyIDS -- POSSIBLE PROJECT
WRCCDC Reg Here
UNIX / Linux Tutorial for Beginners
Penetration Testing Tools Cheat Sheet
Datanyze -- Fingerprints technologies
Cheat Engine--Modify Windows Games

New Unsorted Links

Windows Internals 3: Process Explorer
Windows Internals 4: PsGetSid
Windows Internals 5: Original PPT slides from Solomon, 2007
Windows Internals 6: PsExec
How to Update Ubuntu Kernel: 7 Steps (with Pictures)
CCDC 6: Raytheon Cyber: Bracketology: Breaking down the NCCDC championships
PHP 1: 25 PHP Security Best Practices For Sys Admins
PHP 2: PHP Security Cheat Sheet - OWASP
CCDC 7: How To Monitor System Authentication Logs on Ubuntu
CCDC 8: IP Tables State
Protecting SSH with Fail2Ban
Reversing Firmware Part 1
Rekall Memory Forensic Framework
SANS Rekall Cheat Sheet
SANS Digital Forensics Cheat Sheets
2014 rekall workshop Slides
GitHub google/rekall: Rekall Memory Forensic Framework
12 units is full-time at CCSF
EasyIDS
2015-2016 WRCCDC Guides - Xploit Cybersecurity Club
Palo Alto Firewall Free 15-day Trial on AWS
PAN 1: PAN-OS® Command Line Interface (CLI) Reference Guide
PAN 2: PAN-OS� 7.0 CLI Quick Start
PAN 3: CLI Cheat Sheets
PAN 4: Use the Command Line Interface (CLI)
PAN 5: Importing an OVA file into VMware Fusion
Linux: Where can I get the repositories for old Ubuntu versions? - Super User
PAN 6: Configure Interfaces and Zones
Shopping List for Lab -- SHOW TO CLASS
PAN 7: How to Change the Management IP Address via the Console
PAN 8: CLI Commands for Troubleshooting Palo Alto Firewalls
CCDC Eligibility for our CCSF team
How to Create an Application Override for FTP - Live Community
How To Configure BIND as a Private Network DNS Server on Ubuntu 14.04 | DigitalOcean
How secure is authentication in mysql protocol?
CCDC Lessons Learned
Why is sudo not installed by default in Debian?



Last Updated: 11-19-16 11:21 am