Hands-On INFORMATION SECURITY Lab Manual,.Third Edition
Total Page:16
File Type:pdf, Size:1020Kb
Hands-On INFORMATION SECURITY Lab Manual,.Third Edition Michael E. Whitman, Ph.D., CISM, CISSP, Herbert J. Mattord, CISM, CISSP ""_,_, ........ 'oo ........ _1_'" ............ ,_ ... ... ~ ... .... .. 141461 ~..' COURSE(ENGAGE Learning-TECHNOLOGY 11111111 11 Australia. Brazil. Japan. Korea. Mexico· Singapore· Spain. United Kingdom. United States TABLE OF Contents CHAPTER 1: INFORMATION SECURITY PROCESS FLOWS 1 Flow 1.1 Firewalls 3 Flow 1.2 Remote Access 3 Flow 1.3 Access Controls 4 Flow 1.4 Vulnerability Assessment 5 Flow 1.5 Penetration Testing 6 Flow 1.6 Forensics and Antiforensics 7 Flow 1.7 Client Security 8 Flow 1.8 Perimeter Defense 10 Flow 1.9 Server Security 11 Flow 1.10 Intrusion Detection 12 Flow 1.11 Network Security 13 Flow 1.12 Cyber Defense 14 References 15 CHAPTER 2: BACKGROUND AND THEORY FOR LAB EXERCISES 17 2.1 Footprinting 18 2.2 Scanning and Enumeration 22 2.3 OS Processes and Services 25 2.4 Vulnerability Identification and Research 26 2.5 Vulnerability Validation 28 2.6 Systems Remediatiob. and Hardening 28 2.7 Web Browser Security and Configuration 29 2.8 Data Management 30 2.9 Data Backup and Recovery 31 2.10 Access Controls 31 2.11 Host Intrusion Detection 33 2.12 Log Security Issues 34 2.13 Privacy and Anti-forensics 36 2.14 Software Firewalls 36 2.15 Linksys Firewalls Routers and Access Points 38 2.16 Network Intrusion Detection Systems 38 2.17 Network Traffic Analysis 39 2.18 Virtual Private Networks and Remote Access 41 2.19 Digital Certificates 41 2.20 Password Circumvention 43 2.21 Antivirus Defense 43 2.22 Malware Prevention and Detection 44 CHAPTER 3: WINDOWS LABS 47 Lab 3.1 Footpiinting Using Windows 48 Lab 3.2 Scanning and Enumeration Using Windows 73 Lab 3.3 Windows OS Processes and Services 81 Lab 3.4 Vulnerability Identification and Research Using Windows 91 Lab 3.5 Vulnerability Validation Using Windows 105 Lab 3.6 System Remediation and Hardening Using Windows 113 Lab 3.7 Windows Web Browser Security and Configuration 141 Lab 3.8 Data Management Using Windows 157 Lab 3.9 Data Backup and Recovery Using Windows 171 Lab 3.10 Access Controls Using Windows 185 Lab 3.11 Host Intrusion Detection Using Windows 201 Lab 3.12 Log Security Issues Using Windows 211 Lab 3.13 Windows Privacy and Antiforensics Issues 223 iv Hands-On Information Security lab Manual Lab 3.14 Software Firewalls Using Windows 235 Lab 3.15 Linksys Firewall Routers and Access Points 251 Lab 3.16 Network Intrusion Detection Systems Using Windows 273 t~ Lab 3.17 Network Traffic Analysis Using Windows 285 Lab 3. 18 Virtual Private Networks and Remote Access Using Windows 301 Lab 3.19 Digital Certificates Using Windows 315 Lab 3.20 Password Circumvention Using Windows 323 Lab 3.21 Antivirus Using Windows 331 Lab 3.22 Malware Prevention and Detection Using Windows 347 CHAPTER 4: LINUX LABS 361 Lab 4.1 Footprinting Using Linux 362 Lab 4.2 Scanning and Enumeration Using Linux 373 Lab 4.3 Linux OS Processes and Services 383 Lab 4.4 Vulnerability Identification and Research Using Linux 395 Lab 4.5 Vulnerability Validation Using Linux 401 Lab 4.6 System Remediation and Hardening Using Linux 409 Lab 4~ 7 Linux Web Browser Security 419 Lab 4.8 Data Management Using Linux 427 Lab 4.9 Data Management Using Linux 433 Lab 4.10 Access Controls Using Linux 443 Lab 4.11 Host Intrusion Detection Using Linux 455 Lab 4.12 Log and Security Using Linux 461 Lab 4.13 Privacy and Antiforensics Issues Using Linux 467 Lab 4.14 Software Firewalls Using Linux 471 Lab 4.15 Linksys Firewall Routers and Access Points 483 Lab 4.16 Network Intrusion Detection Systems Using Linux 485 Lab 4.17 Network Traffic Analysis Using Linux 493 Lab 4. 18 Virtual Private Networks and Remote Access Using Linux 505 Lab 4.19 Digital Certificates Using Linux 511 Lab 4.20 Password Circumvention Using Linux 523 Lab 4.21 Antivirus Using Linux 533 /"- ~ Lab 4.22 Malware Prevention and Detection 541 • INDEX 545 Index * (wildcard), 376 Advanced tab Attack Surface Reduction (ASR), 29, - (tilde), 389 Firefox, 153-154 113,409 Windows Firewall, 237-238, 242 attacks, Web-based, 29-30 A Advanced Tools, Microsoft Vista, attrib command, 181 A (address) record, 20 84-85 audible alerting, Snort, 280-281 -A flag Advanced Wireless Settings subtab, audit account logon events, 214 iptable command, 472 Linksys WAP, 266-267 audit policies, Local Computer ps command, 384 adware Policy, 213 AAAA (address) record, 20 Ad-Aware, detecting with, Audit Policy, 118-119 absolute mode, chmod command, 350-352 :J authentication, 4 447-449 Adblock Plus, detecting with, Automatic Lock settings, ZoneAlarm, ACCEPT policy, 474 353-354 245-246 access control lists (ACLs), 3 overview, 44 Autoruns, 86-87 access controls Spybot - Search & Destroy, AVG antivirus software, 335-339 file system access controls, Linux, detecting with, 347-348 445-452 Alert rule, Snort, 487 B overview, 4-5, 31-33, 443 alerts backdoors, 18, 44 user access controls, Linux, Snort, 280-281 backup and recovery 443-445 ZoneAlarm, 243, 246-247 Backup or Restore utility, Windows, 185-200 amap, 374-375 Windows, 171-178 Access Point mode, Linksys WAp, 264 anti-forensics of drive images, 436-437 Access Restrictions, Linksys, issues in Windows, 223-233 overview, 31 253-255 issues using Linux, 467-469 recovering deleted files, 437-440 Ack option, Snort, 488 overview, 7-8, 36 with SyncToy, 178-180 ACLs (access control lists), 3 antivirus software using Linux command-line tools, Activate rule, Snort, 487 existing antivirus evaluation, 433-436 Active Directory, 42, 189-191 Windows, 331-332 Windows Recovery Console, active stack fingerprinting, 23, free tools, Windows, 332-343 180-182 77-78, 376-379 for Linux, 533-537 Backup and Restore Utility, Ad-Aware, 350-353 overview, 331 Windows, 176-178 Adblock Plus add-on, 353-357, types of malicious codes, 43-44 Basic Settings window, Linksys 420-421 AP Client mode, Linksys W AP, 264 WAP,258 Add A Port option, Windows AP Mode subtab, Linksys W AP, Bastille Linux, 414-416 Firewall, 237 263-264 batch command, 181 Add-ons dialog box, Firefox, Apache Web server Benchmark Report, CIS NG Scoring 420-421 hardening, 411-412 Tool, 92-93 address (A) record, 20 overview, 29 BHOs (Browser Helper Objects), 350 address (AAAA) record, 20 requesting certificates through, Ibin directory, 32, 446 ADMIN$ share, 186, 190 515-520 Bind, hardening, 412-413 Administration utility Application Log Properties window, blocking Linksys Firewall, 255 Event Viewer, 212 adware, 355-357 Linksys WAP, 261-269 Application logs, Microsoft Event content, Firefox, 149-150 administrative shares, 186, 190 Viewer, 35 ident probes, 478 administrator, systems application-level proxy firewall, 37 Iboot directory, 32 maintaining log files, 217 applications. See software bootcfg command, 181 obtaining SAM file, 323 ARIN Web site, 57-58 bots, 347, 541 Advanced mode, Backup and ASR (Attack Surface Reduction). Browser Helper Objects (BHOs), 350 Restore Utility, 176-178 See Attack Surface Reduction browsing history, deleting, 223 Advanced Settings window, (ASR) buffer overflows, 26 ZoneAlarm, 244 asterisk (*) wildcard, 376 Bugtraq, 101-102 545 546 Index c clearlogs, 218-219 Create Supervisor Password window, -c flag, WinDump, 285 file system access controls, Linux, IE Content Advisor, 146-147 -c option 445-450 Critical Objects, Ad-Aware, 351 ( ping command, 366 log files, Linux, 461-462 cross-site scripting (XSS), 29, 30 useradd command, 526 network reconnaissance, Linux, CS Lite Options dialog box, I C switch, chkntfs command, 162 362-370 422-423 C$ share, 186, 190 network reconnaissance, Windows, CVE (Common Vulnerabilities and cables, Ethernet, 252 48-54 Exploits),98-100 Capture Filters screen, Wireshark, running chkdsk from, Windows, 292-293 157-160 D scanning and enumeration, Capture Interfaces screen, Wireshark, -D flag, iptable command, 473 Windows, 73-74 292 -d option, useradd command, 526 security default reset, Windows, 113 CAs (certificate authorities), 41-42, ID switch, chkntfs command, 162 315-319,511 system hardening, Linux, 409-411 daily backup, 173 CCleaner, 226-228 user management, Linux, 445 Darik's Boot and Nuke (DBAN), cd command, 181 using TrueCrypt, 450-452 230-231 Center for Internet Security (CIS) wipe tool, Linux, 467-468 data backup and recovery. See tools, 91-94, 395-397 command-line tool, SCW, 129, backup and recovery certificate authorities (CAs), 41-42, 133-134 data management 315-319,511 Common Vulnerabilities and Exploits certificate publishers, 41 (CVE),98-100 drive management, Linux, 427-429 Certificate Services, Microsoft, 42, 127 Computer Management window, drive management, Windows, certificates. See digital certificates Windows, 306-307 157-169 chage command, 526-527 Computer scanner tab, AVG, 337 exploring file systems, Linux, chains, 471-474 configuration files 429-430 channel, Linksys W AP, 259 file-integrity tool, 34 overview, 30-31, 427-431 chdir command, 181 Snort, 488-489 data storage options, SyncToy, chkdsk command, 157-161, 181 Confirm Attribute Changes dialog 179-180 ( chkntfs command, 161-162 box, 192-193 DBAN (Darik's Boot and Nuke), chkrootkit command, 541 Connection Manager window, 230-231 chmod command, 447-448, 524 N essus WX, 97 dd tool, Linux, 436-437 chown command, 525 console users, 190 DDoS (distributed denial-of-service) CIDR format, 488 container files, TrueCrypt, 450-452 attacks, 33 cipher command, 193-194 Content Advisor, Internet Explorer, Default Web Site Properties, lIS, 122 circuit-level proxy firewa1ls, 37 146-148 . del command, 181 CIS (Center for Internet Security) Content option, Snort, 488