tools for teaching security+ mark ciampa western kentucky university [email protected] 1

112
Tools For Teaching Security+ Mark Ciampa Western Kentucky University [email protected] 1

Upload: nickolas-cross

Post on 19-Dec-2015

220 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

1

Tools For Teaching Security+

Mark CiampaWestern Kentucky University

[email protected]

Page 2: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

2

Cengage Feedback

•Shorter sentences or just key words or phrases instead of longer, complete sentences•No more than 3-5 points per slide•Have 20 slides for entire presentation

Page 3: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

3

Cengage Feedback

Page 4: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

4

Limit of Material

3 𝑥20=60

Page 5: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

5

Teaching, Tools & Presentation Philosophy

Broad vs. Deep

Page 6: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

6

Teaching Security+

• CompTIA Security+ is more broad than deep• No single domain or topic is significantly in depth• When teaching Security+ very important to keep moving• Going too deep in a topic means you won’t be able to cover the

material

Page 7: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

7

Tools When Teaching Security+

• Tools for students likewise need be more broad than deep• Tempting to spend 4 weeks on configuring Server 2012 security• But very important to keep moving• Reflection of Hands-On Projects in Security+ Guide to Network

Security Fundamentals 5e

Page 8: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

8

Presentation Security+ Tools

• This presentation of Tools for Teaching Security+ is more broad than deep• Will not go into deep dive on any single tool; otherwise won’t be able

to cover the material• Few tools demonstrated while most introduced• None of these in Security+ Guide to Network Security Fundamentals

5e Hands-On Projects• Presented where fall in current chapter• Tools for student Hands-On Projects and demos

Page 9: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

9

Security Employment

Tools for Teaching Security+

Page 10: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

10

How To Make Money In Security

Page 11: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

11

Carbanak

• Most cybercrime targets consumers and businesses, stealing account information like passwords and other data that then lets thieves cash out hijacked bank accounts or create fake credit/debit cards• Group now specializes in breaking into banks directly and then use

ways to funnel cash from the financial institution itself• Carbanak deployed malware via phishing scams to get inside of

computers at 100+ banks and steal between $300 million to $1 billion

Page 12: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

12

Worst Data Breaches Last 15 Months

Organization Number of CustomersPremera 11 Million

Staples 1.6 Million

Community Health Systems 4.5 Million

South Korea 40 Million

Home Depot 109 Million

JP Morgan Chase 83 Million

Ebay 152 Million

Anthem 105 Million

Page 13: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

13

Page 14: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

14

Page 15: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

15

Source

Page 16: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

16

Page 17: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

17

Bug Bounties

• Organizations pay for vulnerabilities that are reported by researchers• In 2014 Google paid out $150,000 to a researcher for uncovering a multi-vulnerability

chain that exploited the Google Chrome OS• Google set aside an astonishing $3.14 million (yes, million) for paying for these "bug

bounties."• In 2014 Facebook was able to patch 61 high-severity vulnerabilities, twice as many as the

previous year• Facebook pays a minimum of $500 per reported vulnerability with no upper limit for the

high-value vulnerability (that's right, the sky's the limit)• In 2014 it paid $1.3 million to 321 researchers from 65 countries (India had the most

submissions at 196 while the U.S. was third with 61)• The top five individuals who disclosed a problem to Facebook earned a combined

$256,750.

Page 18: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

18

Hacker Bounty Hunter

• Two U.S. government agencies are offering a $3 million reward for information leading to the arrest or conviction of Evgeniy Mikhailovich Bogachev who is suspected of having served as an administrator for the destructive Gameover Zeus botnet • Over a two-year period Gameover Zeus targeted banking credentials resulted in

financial losses exceeding $100 million. • Bogachev is listed on the FBI's Cyber's Most Wanted list (did you know such a

list even existed?). • The rewards for the other five members on this list are a mere $1 million each. • Here's your first clue in tracking down Bogachev: he's believed to be living in

Russia (good luck).

Page 19: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

19

Finished!

Page 20: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

20

Information Security Specialist

• Mundane job in information security• According to Bureau of Labor Statistics (BLS) Information Security

Analysts with a bachelor's degree and less than five years' experience had median pay in 2013 of $86,130 (the most recent data available)• Over the next seven years these positions are expect to grow at a rate

of 37%, or "much faster than average."

Page 21: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

21

Page 22: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

Information Security Employment

• In the past security was rarely outsourced – but that now changing• The increased use of cloud computing is particularly concerning• By next year about 10% of overall IT security enterprise capabilities

will be delivered as a cloud service• Gartner says by 2018 over half of all organizations will have to rely on

external security services firms that specialize in data protection, risk assessment, and infrastructure management

22

Page 23: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

23

Value of Degree

Page 24: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

24

Value of Certification

• 72% of employers use IT certifications as a requirement for specific job roles• 66% of employers say that IT certifications are "very valuable"

(increase from 30% in 2011)• 60% of employers often use IT certifications to confirm a candidate's

subject matter knowledge or expertise• 65% of employers said if there are two otherwise equally qualified

candidates for a job then will turn to IT certifications as the deciding factor

Page 25: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

25

Value of Security+ Certification

• Foote Partners recently released its "IT Skills Demand and Pay Trends Report“: Which certifications will carry the most weight throughout 2015 in terms of pay and demand?• Charted pay growth over the last 3, 6 and 12 months for 337 different IT

certifications and came up with the "historical pay premium performance." • Over last 3 months the market pay value of a Security+ certificate

increased 30% (those with Security+ certification earned that much more than without)• Over last 12 months the market pay value for the Security+ certificate

increased a whopping 40%

Page 26: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

26

Page 27: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

27

Network+

Tools for Teaching Security+

Page 28: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

28

Network Security

• There are many different terms that are used when referring to security, like cybersecurity or information assurance• Network security still common• Network viewed as the protecting wall around which client computers

could be kept safe: secure network keep attackers away from devices • Not foolproof

• Too many entry points that circumvent the network and allow malware to enter like infected USB flash drive

• Malware started taking advantage of common network protocols, such as Hypertext Transfer Protocol (HTTP), and could not always be detected or blocked by network security devices

Page 29: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

29

Network Security• Network security still important• Not all applications are designed and written with security and

reliability in mind, so it falls on the network to provide protection• Network-delivered services can scale better for larger environments

and can complement server and application functionality• Attacker who can successfully penetrate a computer network may

have access to hundreds or even thousands of desktop systems, servers, and storage devices• Organizations should make network defenses one of the first priorities

in protecting information• Network security is alive and well

Page 30: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

30

CompTIA Network+ N10-006

• Feb 28 2015 CompTIA released new Network+ exam (N10-006)• Increased emphasis on security• It has a separate domain just on security: "3.0 Network Security" • Although the percentage of the exam that covers network security is

officially listed as 18%, according to CompTIA the overall coverage of security in the new Network+ exam is actually double that at 37%• Exam also has extended coverage of wireless local area networks and

security and covers about 30% of objectives found on Certified Wireless Network Administrator (CWNA) exam

Page 31: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

31

Chapter 1Introduction to Security

Tools for Teaching Security+

Page 32: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

32

Chapter 1 Projects Security+ Guide 5e

• Project 1-1: Examine Data Breaches (The Privacy Rights Clearinghouse)• Project 1-2: Scan for Malware Using the Microsoft Safety Scanner• Project 1-3: Create a Virtual Machine of Windows 8.1 for Security

Testing—Part 1 • Project 1-4: Create a Virtual Machine of Windows 8.1 for Security

Testing—Part 2 (VirtualBox)

Page 34: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

34

Real Time Attack Trackers• FireEye Cyber Threat Map• Norse IPViking• Arbor Networks Digital Attack Map• Kaspersky Cyberthreat Real-time Map• Anubis Network Cyberfeed• F-Secure World Map• Trend Micro Global Botnet Threat Activity Map• Team Cymru Graphs • OpenDNS Global Network• Madiant IPew Attack• Alien Vault Global Dashboard

Page 35: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

35

Create & Run VM from USB Flash Drive

• Fork of VirtualBox called Portable VirtualBox• Run VM from USB flash drive as application running under Windows

(like a virtualized version Windows 8 Enterprise Windows to Go option)• Caveats• Requires administrator privileges to run• Consumes hard drive space, RAM (can adjust), processing power• Need licensed copy of OS• Format USB drive as an NTFS file system (FAT32 on some USB drives have file

size limit to 4GB)

Page 36: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

36

Create & Run VM from USB Flash Drive

• Download Portable VirtualBox (http://www.vbox.me/)• Extract and launch Portable-VirtualBox.exe• Click Download installation files of VirtualBox• Click Extract files box for 32-bit or 64-bit operating systems• Check Start Portable-VirtualBox after the extract and/or compress• IMPORTANT: Click OK button in bottom left corner (NOT Exit button)

Page 37: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

37

Create & Run VM from USB Flash Drive

• Launch Portable-VirtualBox.exe to enter VirtualBox• Network and USB support are disabled by default• Can create VM of Windows, Linux Mint (http://www.linuxmint.com/),

Android (https://code.google.com/p/android-x86/downloads/list)• Can also be used in Chapter 10 Mobile Device Security

Page 38: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

38

Chapter 2Malware & Social

Engineering Attacks

Tools for Teaching Security+

Page 39: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

39

Chapter 2 Projects Security+ Guide 5e

• Project 2-1: Write-Protecting and Disabling a USB Flash Drive (Thumbscrew)• Project 2-2: Scan for Rootkits Using a Basic Tool (TDSSKiller)• Project 2-3: Scan for Rootkits Using an Advanced Tool (GMER)• Project 2-4: Use a Software Keylogger (Spyrix)

Page 40: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

40

Page 41: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

41

Page 42: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

42

RawDisk

• “RawDisk library offers software developers direct access to files, disks and partitions of the disks (hard drives, flash disks etc.) for user-mode applications, bypassing security limitations of Windows operating systems”• Direct access to disks and protected files from user-mode applications in

Windows 8/7/Vista/XP• Can read/write disks sector by sector without operating-system-imposed

restrictions• “Comes in handy for development of data recovery, undelete and forensic

applications”• https://www.eldos.com/rawdisk/

Page 43: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

43

Microsoft Attack Surface Analyzer

• “Understand how the attack surface of Windows systems change as a result of installing software”• Can take snap shot of multiple security related information elements

on a system, then after the system changes can take another snapshot • Compares the before and after snapshots and show what changed in

an HTML report • http://www.microsoft.com/en-us/download/details.aspx?id=24487

Page 44: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

44

Page 45: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

45

DVWA

• DVWA is PHP/MySQL vulnerable web application• Install Apache Webserver• Install Mysql Server• Install PHP• Install and configure DVWA • Can perform XSS, SQL injection attacks• http://www.dvwa.co.uk/

Page 46: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

46

WebGoat

• WebGoat - Deliberately insecure web application designed to teach web application security lessons• Install and practice with WebGoat in either J2EE or WebGoat

for .Net in ASP.NET. • Users demonstrate their understanding of a security issue by

exploiting a real vulnerability in the WebGoat applications• Example: User must use SQL injection to steal fake credit card

numbers• https://

www.owasp.org/index.php/Category:OWASP_WebGoat_Project

Page 47: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

47

Chapter 3Application & Network-

Based Attacks

Tools for Teaching Security+

Page 48: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

48

Chapter 3 Projects Security+ Guide 5e

• Project 3-1: Scan Web Browser Plug-ins (Qualys Browser Check)• Project 3-2: Configure Microsoft Windows Data Execution Prevention

(DEP) • Project 3-3: Set Web Browser Security • Project 3-4: Hosts File Attack • Project 3-5: ARP Poisoning• Project 3-6: Create an HTTP Header• Project 3-7: Manage Flash Cookies

Page 49: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

49

Enhanced Mitigation Experience Toolkit (EMET)

• Strengthens the security of non-Microsoft applications by using defenses built within Windows • Includes “Attack Surface Reduction” can block some of an

application’s modules or plugins that might be abused• EMET tell Internet Explorer to halt an SSL connection if an untrusted

certificate is detected without sending session data• http://www.microsoft.com/en-us/download/details.aspx?id=43714

Page 50: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

50

Page 51: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

51

Page 52: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

52

Chapter 4Host, Application, and

Data Security

Tools for Teaching Security+

Page 53: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

53

Chapter 4 Projects Security+ Guide 5e

• Project 4-1: Test Antivirus Software• Project 4-2: Setting Windows Local Security Policy • Project 4-3: Viewing Windows Firewall Settings• Project 4-4: Analyze Files and URLs for Viruses Using VirusTotal

Page 54: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

54

pfSense

• Free network firewall distribution• Based on the FreeBSD with custom kernel and including third party software packages• Web interface for the configuration of all included components; no command line

needed• 10-20 Mbps - Less than 4 year old CPU at least 500MHz• 21-100 Mbps - 1.0 GHz CPU• 101-500 Mbps – Server-class hardware with PCI-e network adapters and CPU 2.0 GHz.• 501+ Mbps - Server class hardware with PCI-e network adapters and multiple cores at

> 2.0GHz• https://www.pfsense.org/

Page 55: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

55

Chapter 5Basic Cryptography

Tools for Teaching Security+

Page 56: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

56

Chapter 5 Projects Security+ Guide 5e

• Project 5-1: Using OpenPuff Steganography• Project 5-2: Running an RSA Cipher Demonstration• Project 5-3: Installing Command-Line Hash Generators and Comparing

Hashes • Project 5-4: Installing GUI Hash Generators and Comparing Digests • Project 5-5: Using Microsoft’s Encrypting File System (EFS)• Project 5-6: Using TrueCrypt

Page 57: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

57

Febooti Hash & CRC

• GUI-based file hash and CRC generator• http://www.febooti.com/products/filetweak/members/hash-and-crc/

Page 58: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

58

TrueCrypt Alternatives

• TrueCrypt suddenly ceased operations 2014• TrueCrypt v7.1a still available (https://

www.grc.com/misc/truecrypt/truecrypt.htm)• VeraCrypt (https://veracrypt.codeplex.com/)• DiskCryptor (https://diskcryptor.net/wiki/Main_Page)• CipherShed (https://ciphershed.org/)• BestCrypt (http://www.jetico.com/)

Page 59: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

59

Chapter 6Advanced Cryptography

Tools for Teaching Security+

Page 60: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

60

Chapter 6 Projects Security+ Guide 5e

• Project 6-1: SSL Server and Client Tests • Project 6-2: Viewing Digital Certificates• Project 6-3: Viewing Digital Certificate Revocation Lists (CRL) and

Untrusted Certificates• Project 6-4: Downloading and Installing a Digital Certificate• Project 6-5: Using a Digital Certificate for Signing Documents

Page 61: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

61

Virtru

• End-to-end email and attachment encryption using existing email (Chrome, Firefox, Outlook, Mac Mail, iOS and Android)• Install Virtru in browser, mobile device, or email application using Trusted

Data Format (TDF)• When composing “flip the Virtru switch” to encrypt message and

attachments• Recipients can read your message without installing software after verify

identity• Sender can revoke messages at any time, see and control forwarding, set

expiration dates• https://www.virtru.com/get-secure-email

Page 62: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

62

End-To-End

• End-To-End is Chrome extension to encrypt, decrypt, digital sign, and verify signed messages within the browser using OpenPGP• Built on JavaScript-based crypto library• Enables key generation, encryption, decryption, digital signature, and

signature verification• https://github.com/google/end-to-end

Page 63: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

63

Fiddler

• Web Debugging - Debug traffic to ensure the proper cookies, headers and cache directives are transferred between the client and server (supports .NET, Java, Ruby, etc. framework)• Performance Testing – View HTTP caching and compression • HTTP/HTTPS Traffic Recording - Web debugging proxy that logs all HTTP(s)

traffic between computer and Internet• Web Session Manipulation - Edit web sessions by setting breakpoint to pause

the processing of the session and permit alteration of the request/response; can also compose own HTTP requests to run through Fiddler• http://www.telerik.com/fiddler

Page 64: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

64

Chapter 7Network Security

Fundamentals

Tools for Teaching Security+

Page 65: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

65

Chapter 7 Projects Security+ Guide 5e

• Project 7-1: Configuring the Windows Firewall • Project 7-2: Using Behavior-Based Monitoring Tools • Project 7-3: Using an Internet Content Filter • Project 7-4: Configure a Windows Client for Network Access

Protection

Page 66: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

66

GlassWire

• Network monitor - Visualizes current and past network activity by traffic type, application, geographic location; can go back in time up to 30 days

• Threat monitoring - Reveals hosts that are known threats, unexpected network system file changes, unusual application changes, ARP spoofing, DNS changes; can remotely monitor servers or other computers and block activity

• Firewall – Shows new application or service accessing the Internet for the first time• Detailed log - Shows current and past servers communicating with• Remote server monitoring - Monitor all server network activity• Internet/Bandwidth usage monitoring - Can see amount bandwidth using; can block

bandwidth hogging apps or privacy violators• Incognito mode – Prevents network activity from being logged• https://www.glasswire.com/

Page 67: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

67

Page 68: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

68

Page 69: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

69

Page 70: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

70

Page 71: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

71

Chapter 8Administering a Secure

Network

Tools for Teaching Security+

Page 72: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

72

Chapter 8 Projects Security+ Guide 5e

• Project 8-1: Using an Application Sandbox• Project 8-2: Create a Virtual Machine from a Physical Computer • Project 8-3: Load the Virtual Machine • Project 8-4: View SNMP Management Information Base (MIB) Elements• Project 8-5: Viewing Logs Using the Microsoft Windows Event Viewer• Project 8-6: Creating a Custom View in Microsoft Windows Event Viewer • Project 8-7: Creating a Subscription in Microsoft Windows Event Viewer

Page 73: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

73

DNS Services

• Recursive (not authoritative) DNS services are “middlemen” between browser and website content with offer additional functionality for both users and network administrators• Content filtering - Block adult sites and other unwanted content, while

requiring no software on the computers and devices• Malware and phishing blocking - Block sites containing malware, scams and

other dangerous content• Protection against botnets - Blocks communication with known botnet

servers• Advertisement blocking - Another type of content filtering• URL typo correction – Change gogle.com correct to google.com

Page 74: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

74

DNS Services

• Commodo Secure DNS (https://www.comodo.com/secure-dns/)• Dyn Internet Guide (http://dyn.com/labs/dyn-internet-guide/)• FoolDNS (

http://www.fooldns.com/fooldns-community/english-version/)• Green Team DNS (http://members.greentm.co.uk/)• Norton ConnectSafe (https://dns.norton.com/)• OpenDNS (https://www.opendns.com/)

Page 75: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

75

Chapter 9Wireless Network Security

Tools for Teaching Security+

Page 76: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

76

Chapter 9 Projects Security+ Guide 5e

• Project 9-1: Viewing WLAN Security Information with Vistumbler• Project 9-2: Substitute a MAC Address Using SMAC• Project 9-3: Use Microsoft Windows 7 Netsh Commands • Project 9-4: Configuring Access Points—WPA2 and WPS

Page 77: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

77

Kali Linux• www.kali.com• Formerly “Backtrack”• Open source Debian Linux distribution• Designed for penetration testing: has 300 built-in pen testing tools• Regularly updated and customizable• Different options• Bootable ISO (Live Distro)• Virtual machine• Natively installed• ARM devices (Raspberry Pi)

Page 78: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

78

Kali Linux Wireless Tools

• Kismet – Display wireless networks• Airmon-ng – Capture wireless packets, inject packets into wireless

network• Ifconfig/iwconfig – Part of Linux for configuration of wireless

interfaces• Wireshark – Protocol analyzer• Nmap – Network scanner (ZenMap GUI)• Kali Linux menu

Page 79: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

79

Page 80: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

80

Wireless Adapters for Kali Linux

• Wireless USB adapter• Hawking HD45U 3x3x3 USB 3.0• Uses Ralink chipset• $40• 802.11n only

• Edimax AC-1200 • Edimax EW-7822UAC

Page 81: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

81

Organizational Systems Wireless Auditor (OSWA-Assistant)

• Associated certifications• Wi-Fi, Bluetooth, and RFID penetration testing tools• Supports web interface• http://securitystartshere.org/page-training-oswa-assistant.htm

Page 82: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

82

OSWA-Assistant: Wi-Fi

• Afrag; Aircrack-ng; Airfart; Airpwn; Airsnort; Airsnarf; Airtraf; AP-Hopper; AP-Radar; AP-Utils; Asleap; ChopChop; CoWPAtty; EapMD5pass; FakeAP; Freeradius Pwnage Edition; HostAPD; Hotspotter; Karma; Kismet; Leapcracker; MDK3; MoocherHunter; Probemapper; Pyrawcovert; Rcovert; Ska; SSIDsniff; SSLstrip; Wardrive; Wavemon; WEPlab; WEP0ff; Wi-Find; Wi-Spy Tools; WifiTap; WifiZoo; WPA-attack; WPA Buddy; WPA Supplicant; Wireless Extensions & Wireless Tools package (iwconfig/iwpriv, etc); Zulu

Page 83: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

83

OSWA-Assistant: Bluetooth

• Bluebugger; Bluediving Suite; Bluemaho Suite (lite); Blueper; Blueprint; Bluescanner; Bluesmash; Bluesnarfer; Bluesquirrel Suite; BT-Audit; Btfs; Btscanner; Carwhisperer; Ghettotooth; Obexpush-dos; HIDattack; Redfang; Spooftooph; T-Bear; Ussp-push; Vcardblaster; Bluez Bluetooth package with hcitool/hciconfig

Page 84: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

84

OSWA-Assistant: RFID & Other

• RFID Tools: Rfdump; RFIDiot; Rfidtool•Miscellaneous: Macchanger; Metasploit Framework; SET;

Wireshar

Page 85: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

85

Reaver

• Reaver implements a brute force attack against Wi-Fi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases • On average Reaver can recover the target AP's plain text WPA/WPA2

passphrase in 4-10 hours• May only take half this time to guess the correct WPS pin and recover

the passphrase• https://code.google.com/p/reaver-wps/

Page 86: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

86

Wifiphisher

• Social engineering attack that as easy way for obtaining credentials from captive portals and third party login pages or WPA/WPA2 secret passphrases.

• Attack in three phases:• Victim deauthenticated from AP: Wifiphisher continuously jams all target AP devices by

sending deauth packets to the client from the AP, to AP from client, and to broadcast address

• Victim joins a rogue access point: Wifiphisher copies target AP settings to creates rogue AP; sets up a NAT/DHCP server and forwards the right ports so clients start connecting to the rogue AP

• Victim served a realistic router configuration page: Wifiphisher sets up web server that responds to HTTP & HTTPS requests; when victim requests Internet page Wifiphisher responds with a realistic fake page that asks for credentials due to router firmware upgrade

• https://github.com/sophron/wifiphisher

Page 87: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

87

Chapter 10Mobile Device Security

Tools for Teaching Security+

Page 88: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

88

Chapter 10 Projects Security+ Guide 5e

• Project 10-1: Creating and Using QR Codes • Project 10-2: Software to Locate a Missing Laptop • Project 10-3: Installing Bluestacks Android Emulator• Project 10-4: Installing Security Apps Using Bluestacks Android

Emulator

Page 89: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

89

Mobile Tracking Software

• Monitoring Software• mSpy (www.mspy.com)• MobileSpy (http://www.mobile-spy.com/)• Mobistealth (http://www.mobistealth.com/)• MBL Stealth (http://www.mblstealth.com/main/)

Page 90: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

90

Prey

• Lock down devices• Delete stored passwords• https://preyproject.com/

Page 91: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

91

Confide

• Free iOS & Android app• Can send email along with an attached document/photo (Word, Excel,

PowerPoint and PDF files stored on Dropbox, Box, Google Drive, OneDrive and other document-storage services) that gets encrypted• When the recipient opens it the content is blurry and unreadable• Can only be read by touching the screen, and only the line under the

finger is readable• If someone snaps a picture of the screen only the one exposed line is

captured (cannot see whole message at once)• When recipient finished and taps "close" message is deleted irretrievably

Page 92: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

92

Confide

• If recipient not have Confide app installed a button on the message opens the Apple App Store or Google Play Store on the Confide page so can download• Both the recipient and the sender have the ability to delete a message• Sender can change the amount of time a message will last before it

self-destructs (set message to be viewable for week but change mind after sending it you can adjust life span remotely or instantly delete it • Confide for Business will have address book integration, distribution

lists and other features and desktop version coming• https://getconfide.com/

Page 93: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

93

Dstrux

• Dstrux similar to Confide to send messages & documents encrypted and self-destructing• It enables sharing over Facebook or Twitter, but only a link to the

secure content in the cloud is shared• Can apply controls to a message before you send it (how long before

it self-destructs, whether it's blurry upon opening, if recipient can forward)• Message can be viewed, but not printed, copied, saved or captured

with a screen capture

Page 94: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

94

Dstrux

• Before sending decide how long the message will last before it self-destructs (days, hours or minutes), to blur content, allow/disallow forwarding• To see a full image have to rapidly swipe all over the screen, then look

fast before it vanishes• Confide more polished, Dstrux more options• https://dstrux.com/

Page 95: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

95

Disconnect

• Blocks malicious tracking and malvertising threats disguised as legitimate ads• Privacy icons - See how websites collect and use data• Disconnect - Visualize & block invisible websites that track• https://disconnect.me/disconnect

Page 96: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

96

Other Android Apps

• VT View Source – View HTML, CSS, JavaScript, XML sources of webpages and remotely located files (https://play.google.com/store/apps/details?id=com.tozalakyan.viewsource)• kWS Android Web Server - https://

play.google.com/store/apps/details?id=org.xeustechnologies.android.kws• Hacker’s Keyboard – Full keyboard (https://

play.google.com/store/apps/details?id=org.pocketworkstation.pckeyboard&feature=search_result)

Page 97: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

97

Chapter 11Access Control Fundamentals

Tools for Teaching Security+

Page 98: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

98

Chapter 11 Projects Security+ Guide 5e

• Project 11-1: Using Windows Local Group Policy Editor • Project 11-2: Using Discretionary Access Control to Share Files in

Windows• Project 11-3: Enabling IEEE 802.1x• Project 11-4: Explore User Account Control (UAC)

Page 99: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

99

Chapter 12Authentication and

Account Management

Tools for Teaching Security+

Page 100: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

100

Chapter 12 Projects Security+ Guide 5e

• Project 12-1: Use an Online Rainbow Table Cracker • Project 12-2: Keystroke Dynamics• Project 12-3: Download and Install a Password Management Program• Project 12-4: Use Cognitive Biometrics• Project 12-5: Create an OpenID Account• Project 12-6: Use an OpenID Account

Page 101: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

101

Useless User Tricks - 1

• Even when users attempt to create stronger passwords, they generally follow predictable patterns• Appending - Typically only add a number after letters (caitlin1 or

cheer99); if they add all more it in sequence letters+punctuation+number (amanda.7 or chris#6). • Replacing – A zero is used instead of the letter o (passw0rd), the digit

1 for the letter i (denn1s), or a dollar sign for an s (be$tfriend). • Attackers are aware of these patterns in passwords and can search for

them, dramatically weakening passwords and make it easier for attackers to crack them.

Page 102: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

102

Useless User Tricks - 2

1. Take the first letter of the site’s name in lower case (Gmail.com -> g)2. Add the last two digits of your birth year but reverse them (1993 -> 93 -> 39)3. Add a +4. Add the next four letters of the site’s name in upper case ("gmail.com" ->

MAIL)5. Add a -6. Add the last four digits of your phone number backwards (877-555-1234 ->

4321)• Your new secure password is g93+MAIL-4321 : SECURE!• Your new secure password is y93+AHOO-4321 : NOT SECURE

Page 103: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

103

Useless User Tricks - 3• The Qwerty Card is a simple plastic card laid out like a

Qwerty keyboard and also has a unique code like sh(/J3Hq. • You add your own secret password (shine) to the code

and then append the encoded version of the site’s name using the character map on the card•Amazon becomes .u.rqf which is added to the

previous strings to generate the complete password sh(/J3Hqshine.u.rqf

Page 104: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

104

Useless User Tricks - 3• Spacebar code + Secret word + Site name

Page 105: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

105

Password Principles

1. Any password that can be memorized is a weak password

2. Any password that is repeated is a weak password

3. Use technology instead of brain

Page 106: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

106

Length Over Complexity

•How Secure Is My Password•Password Strength Calculator•Haystack•Password Meter

Page 107: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

107

Password Management Applications

• Dashlane• LastPass• KeePass• 1Password• Blur• PasswordBox• RoboForm• StickyPassword

Page 108: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

108

HashCat

• Optimum password cracking program• Brute-Force attack, combinator attack, dictionary attack, fingerprint

attack, hybrid attack, mask attack, permutation attack, rule-based attack• Multi-GPU (up to 128 gpus)• Multi-Hash (up to 100 million hashes)• Multi-OS (Linux & Windows native binaries)• http://hashcat.net/oclhashcat/

Page 109: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

109

Security+ 5e• Security+ Guide to Network Security Fundaments, 5e from Cengage Learning

(9781305093911)• Published August, 2014• Maps completely to new SY0-401 exam objectives• Retains popular format• Increased from 14 to 15 chapters (new chapter on Mobile Device Security)• Increased chapter length by 2-3 pages

Page 110: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

110

Security+ 5e• Cryptography moved up to Chapters 5-6• New “Today’s Attacks & Defenses” openers• New sectional units• New and updated Review Questions, Hands-On Projects, Case Projects• New lecture videos• New material on companion web site to be updated regularly• Cengage MindTap for Security+ 5e released Mar 18 2015

Page 111: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

111

MindTap

Page 112: Tools For Teaching Security+ Mark Ciampa Western Kentucky University mark.ciampa@wku.edu 1

112

Tools For Teaching Security+

Mark CiampaWestern Kentucky University

[email protected]