SEC561: Hands-on Penetration Testing for the InfoSec Pro
- Contents | Schedule | Additional Info
- Instructor: Joshua Wright
- 36 CPE/CMU
- Laptop Required
Today, many information security practitioners are expected to leverage cross-disciplinary skills in complex areas. Analysts are no longer able to specialize in just a single skill area, such as vulnerability assessment, network penetration testing, or web app assessment. To face todays threats, organizations need employees that add value to the team across varying focus areas, contributing to both operations and security teams.
Few practitioners have the time to build broad skills across many different security areas. The best way to pick up new skills quickly is to practice them in hands-on, real-world scenarios designed to challenge and guide a participant. The Hands-On Security Practitioner course creates a learning environment where participants can quickly build and reinforce skills in multiple focus areas, including:
- Network security assessment, identifying architecture weaknesses in network deployments
- Host-based security assessment, protecting against privilege escalation attacks
- Web application penetration testing, exploiting common flaws in complex systems
- Advanced system attacks, leveraging pivoting and tunneling techniques to identify exposure areas deep within an organization
The Hands-On Security Practitioner course departs from most lecture-based training models to help practitioners quickly build skills in many different information security focus areas. Using the NetWars challenge platform, participants engage in practical and real-world defensive and offensive Capture the Flag (CtF) exercises that are fun and exciting. By maximizing hands-on time in exercises, participants build valuable skills that are directly applicable as soon as they return to the office.
Participants who complete the Hands-On Security Practitioner participate in realistic scenarios to quickly build skills that are difficult to achieve independently. After completing the course, participants will be able to apply these skills to various areas within their own organizations, significantly increasing their ability to take on cross-disciplinary projects and tasks.
| Course Contents | Instructors | Schedule |
|---|---|---|
| SEC561.1: Security Platform Analysis | Joshua Wright |
Mon Sep 16th, 2013 9:00 AM - 5:00 PM |
OverviewThe first day of the course prepares students for real-world security challenges by giving them hands-on practice with essential Linux and Windows server and host management tools. First, students will leverage built-in and custom Linux tools to evaluate the security of host systems and servers, inspecting and extracting content from rich data sources such as image headers, browser cache content, and system logging resources. Next, students will turn their focus to performing similar analysis against remote Windows servers using built-in Windows system management tools to identify misconfigured services, scrutinize historical registry entries for USB devices, evaluate the impact of malware attacks, and analyze packet capture data. By completing these tasks, students build their skills in managing systems, applicable to post-compromise system host analysis, or defensive tasks such as defending targeted systems from persistent attack threats. By adding new tools and techniques to their arsenal, students are better prepared to complete the analysis of complex systems with greater accuracy in less time. CPE/CMU Credits: 6 TopicsLinux Host and Server Analysis
Windows Host and Server Analysis
|
||
| SEC561.2: Enterprise Security Assessment | Joshua Wright |
Tue Sep 17th, 2013 9:00 AM - 5:00 PM |
OverviewIn this section of the class, students investigate the critical tasks for a high-quality penetration test. Well look at the safest, most efficient ways to map a network and discover target systems and services. Once the systems are discovered, we look for vulnerabilities and reduce false positives with manual vulnerability verification. Well also look at exploitation techniques including the use of the Metasploit Framework to exploit these vulnerabilities, accurately describing risk and further reducing false positives. Of course, exploits are not the only way to access systems, so we also leverage password related attacks including guessing and cracking techniques to extend our reach for a more effective and valuable penetration test. CPE/CMU Credits: 6 TopicsNetwork Mapping and Discovery
Enterprise Vulnerability Assessment
Network Penetration Testing
Password and Authentication Exploitation
|
||
| SEC561.3: Web Application Assessment | Joshua Wright |
Wed Sep 18th, 2013 9:00 AM - 5:00 PM |
OverviewThis section of the course will look at the variety of flaws present in web applications and how each of them is exploited. Students will solve challenges presented to them by exploiting web applications hands-on with the tools used by professional web application penetration testers every day. The websites students attack mirror real-world vulnerabilities including Cross-Site Scripting (XSS), SQL Injection, Command Injection, Directory Traversal, Session Manipulation and more. Students will need to exploit the present flaws and answer questions based on the level of compromise they are able to achieve. CPE/CMU Credits: 6 TopicsRecon and Mapping
Server-side Web Application Attacks
Client-side Web Application Attacks
Web Application Vulnerability Exploitation
|
||
| SEC561.4: Mobile Device and Application Analysis | Joshua Wright |
Thu Sep 19th, 2013 9:00 AM - 5:00 PM |
OverviewWith the accelerated growth of mobile device use in enterprise networks, organizations find an increasing need to identify expertise in the security assessment and penetration testing of mobile devices and the supporting infrastructure. In this component of the course, we examine the practical vulnerabilities introduced by mobile devices and applications, and how they relate to the security of the enterprise. Students will look at the common vulnerabilities and attack opportunities against Android and Apple iOS devices, examining data remnants from lost or stolen mobile devices, the exposure introduced by common weak application developer practices, and the threat introduced by popular cloud-based mobile applications found in many networks today. CPE/CMU Credits: 6 TopicsMobile Device Assessment
Mobile Device Data Harvesting
Mobile Application Analysis
|
||
| SEC561.5: Advanced Penetration Testing | Joshua Wright |
Fri Sep 20th, 2013 9:00 AM - 5:00 PM |
OverviewThis portion of the class is designed to teach the advanced skills required in an effective penetration test to extend our reach and move through the target network. This extended reach will provide a broader and more in-depth look at the security of the enterprise. Well utilize techniques to pivot through compromised systems using various tunneling/pivoting techniques, bypass anti-virus, and built-in commands to extend our influence over the target environment and find issues that lesser testers may have missed. Well also look at some of the common mistakes surrounding poorly or incorrectly implemented cryptography and ways to take advantage of those weaknesses to access systems and data that are improperly secured. CPE/CMU Credits: 6 TopicsAnti-Virus Evasion Techniques
Advanced Network Pivoting Techniques
Exploiting Network Infrastructure Components
Exploiting Cryptographic Weaknesses
|
||
| SEC561.6: Capture the Flag Challenge | Joshua Wright |
Sat Sep 21st, 2013 9:00 AM - 5:00 PM |
OverviewThis lively session represents the culmination of the course, where attendees will apply the skills they have mastered throughout all the other sessions in a hands-on workshop. Attendees will participate in a larger version of the exercises present in the class to independently reinforce skills learned throughout the course. Attendees will apply their newly developed skills to scan for flaws, use exploits, unravel technical challenges, and dodge firewalls, all while guided by the challenges presented to you by the NetWars Scoring Server. By practicing the skills in a combination workshop where multiple focus areas are combined, participants will have the opportunity to explore, exploit, pillage, and continue to reinforce skills against a realistic target environment. CPE/CMU Credits: 6 |
||
| Additional Information | ||
| Laptop Required | ||
|
Throughout the course, students will participate in hands-on lab exercises. Students must bring their own laptops to class that meet the requirements described below. Windows Students must bring a Windows 7, Windows Vista, or Windows XP laptop to class, preferably running natively on the system hardware. It is possible to complete the lab exercises using a virtualized Windows installation, however, this will result in reduced performance when running device emulators within the virtualized Windows host. If you are a Windows XP user, make sure you also have the .NET 3.5 framework installed, which can be downloaded from http://www.microsoft.com/en-us/download/details.aspx?id=21 . Administrative Windows Access For several tools utilized in the course, students will be required to perform actions with administrative privileges. Students must have administrative access on their Windows host, including the ability to unload or disable security software such as anti-virus or firewall agents as necessary for the completion of lab exercises. VMware Students will use a virtualized MobiSec Linux VMware guest for several lab exercises. VMware Workstation or VMware Player is recommended. Note that there is no cost associated with the use of VMware Player, which can be downloaded from the VMware website. While some students successfully use VMware Fusion for the exercises, the relative instability of VMware Fusion may introduce delays in exercise preparation, preventing the timely completion of lab exercises. VirtualBox and other virtualization tools are not supported at this time. Hardware Requirements Several of the software components used in the course are hardware intensive, requiring more system resources than what might be required otherwise for day-to-day use of a system. Please ensure your laptop meets the following minimum hardware requirements:
If you have additional questions about the laptop specifications, please contact laptop_prep@sans.org. |
||
| Who Should Attend | ||
|
||
| Prerequisites | ||
Participants must have introductory-level experience with information security. (SEC401) |
||
| What You Will Receive | ||
|
||
| You Will Be Able To | ||
|
||
