Take your first steps into testing client defenses. Learn about firewalls, network simulation using GNS3, special-purpose perimeter devices, and intrusion response techniques.
Overview
Syllabus
Introduction
- Finding weaknesses in the perimeter
- What you should know
- Course disclaimer
- Understanding Firewalls
- Apply the basics of the Windows firewall
- Use advanced features in the Windows Firewall
- Review firewall logs
- Understand Linux IPTables
- Set up an IPTables firewall
- Manage rules with Firewall Builder
- Port testing
- Set up a Cisco PIX firewall
- Create a secure enclave
- Install GNS3
- Obtain network device images
- Set up a network
- Simulate the ASA firewall
- Integrate Kali into GNS3
- Understand Web Application Firewalls
- Protect API services with the WSO2 gateway
- Understand honeypots
- Run the Cowrie honeypot
- Intrusion response techniques
- xListing sites
- Snort rules
- Detect intrusions with Security Onion
- Extend IDS with reputation
- EINSTEIN
- Evading antivirus detection
- Obfuscating payloads with msfvenom
- Hiding payloads in benign files
- Custom packaging of software
- Fileless attacks with PowerShell
- Hiding with the cloak of invisibility
- Embedding malware in an alternate data stream
- Checking for oversight
- Next steps
Taught by
Malcolm Shore