So I am in D.C. & Tomorrow I start my "Ultimate Hacking" Class.

hevnsnt

Lifer
Mar 18, 2000
10,868
1
0
Before anyone says anything, I have to have this training for work.. And I am pretty excited about it as well :p

Here is the Course Description:
Because security is an ever-changing battlefield, Ultimate Hacking exposes you to the latest in network vulnerabilities and defenses. From Windows and UNIX hosts to routers and firewalls, instructors will illustrate each technology's default security posture, installation weaknesses, methods hackers use to circumvent "secure" settings, and countermeasures for each vulnerability.

More than just theory, you will gain critical security skills by practicing with your classmates and instructors in a full-featured computer lab.

Foundstone instructors will walk you through foot-printing an organization's Internet presence to show you how to identify, exploit, and secure popular and little-known vulnerabilities in Windows and Unix systems.

You will also explore common weaknesses in router and firewall installations, learning ways to circumvent both traditional and "hardened" security filters or firewalls. Finally, in a review exercise, you will attempt to exploit a simulated "secure" network with multiple operating systems and security mechanisms requiring you to utilize all of the skills learned throughout the class. This ?capture the flag? exercise ensures that you can immediately use these skills when you return to organization.



Here is my Course Syllabus:

Day one sets the foundation in which penetration tests are performed. Emphasis is placed on the importance of performing the work in a methodical and thorough manner.
Reviewing publicly available information
Network and domain enumeration
"whois" lookups
ARIN lookups
DNS Interrogation
Zone transfers
Network reconnaissance
Scanning / Landscape Discovery
Ping sweeps
Port scanning
Banner grabbing
OS guessing
Footprinting Lab

Use the tools and techniques taught on day one to footprint and scan Foundstone's Footprinting Network in Irvine, California. The Footprinting Network consists of a wide variety of machines on the Internet (Windows, Red Hat, Solaris, HP-UP, AIX, etc.). These machines are specifically made available to the class for the purpose of running live scans. The appropriate entries in ARIN and Network Solutions have also been made so that students can perform actual lookups against those databases. This lab gives students the opportunity to run the tools in a realistic manner against live machines on the Internet.


Day 2 - Windows

The material taught on day two focuses on Windows, and begins with a basic overview of Windows security, followed by Foundstone's methodology for hacking and securing these systems. During the lecture portion of the day, there will also be test machines for student experimentation.

Hacking Windows
Windows security overview
SIDs and RIDs
LSASS
SAM
ACLs
Domain and network relationships
Footprint / scan
Identify OSs
Identify services
Enumerate
Computer roles
Users and groups
Discovering Network Topology
Services and pipes
Hardware
LDAP
Penetrate
Windows passwords
Password guessing
Password sniffing
Password cracking
Escalate
Windows attacks
Named Pipes prediction attack
Pillage
Auditing
Log cleaning
Grabbing the SAM
Windows password cracking
Syskey
Important registry keys
Finding "hidden" plaintext passwords
Get interactive
remote.exe
netcat shells
Expand influence
BO2K
netbus
SubSeven
VNC
The day ends with a hands-on lab involving four target machines. Students will follow the methodology and employ the tools taught during the day in order to compromise the final machine. This "capture the flag" style exercise is best performed in teams and will take a couple of hours to complete.

Day 3 - UNIX

Day three focuses on UNIX. Once again, methodology is emphasized throughout the day. Linux and Solaris machines are available during the day to experiment and test the newly taught techniques.

Hacking UNIX
UNIX landscape discovery
UNIX host enumeration
Remote attacks
Brute force attacks
Remote buffer overflows
Input validation attacks
Creating back channels
Common remote attacks
Local attacks
UNIX passwords
UNIX password cracking
Symlink attacks
Race condition attacks
Local buffer overflows
File and directory permission attacks
Beyond root
Network mapping
Rootkits
Trojans
Backdoors
Sniffers
Loadable kernel modules
This hands-on lab involves four UNIX target machines (Linux and Solaris). Students will be required to use the methodology, tools, and techniques taught earlier during the day in order to successfully complete this multi-hour lab.

Day 4 - Network Hacking & Web Hacking

The material taught on day four is not operating system-specific. Router and firewall vulnerabilities and weaknesses are covered in the network hacking module. Port redirection in also covered in detail with a hands-on exercise. Hacking web-based applications and a discussion of Foundstone's eCommerce application review methodology are covered in the web hacking module.

Network Hacking
Router issues
Vulnerabilities
Services
Passwords
Routing issues
Path integrity
IP spoofing
Denial of service
Firewall architectures
Firewall attack scenarios
Insider
Vulnerable services
Firewall identification and enumeration
Banner grabbing
ACL enumeration
Port identification
Liberal ACLs
Port redirection
datapipe
fpipe
Web Hacking


E-commerce primer
Information gathering
Port scanning
Web reconnaissance
Enumeration
Vulnerability checking
Site duplication
Source sifting
Key field enumeration
Viewing source
Active server pages
Common gateway interface
Cold fusion
File system traversal
Dot dot bugs
Dot listings
Tilde usage
CIM
Input validation
Metacharacters
Field overflows
Application buffer overflows
Server side includes
Hidden tags
IIS unicode
Local command execution
Ultimate Lab

The course concludes with a lab involving routers, Windows, UNIX, and web hacking. It is a multi-OS lab that will require using tools and techniques from all four days. Teamwork is essential in order to complete the lab. This lab typically takes several hours to complete.

Hands On Exercises

Extensive hands-on exercises provide detailed, practical experience in attacking and securing various operating systems. The exercises allow students to immediately experiment with concepts introduced in each portion of the course.

UNIX Exercises
Enumerating UNIX hosts
UNIX brute force attacks
Execution of buffer overflow attack
Execution of input validation attack
Attacking SSL servers
Creating back channels using reverse telnets and X-windows
Execution of remote attacks
Abusing nfs
Exploiting X-windows insecurities
Grabbing keystrokes from another machine
Cracking UNIX password files
Hiding TCP traffic in ICMP packets
Perform network sniffing
Perform session hijacking
Windows Exercises
Enumerating Windows hosts
Enumerate Windows host, group, and hardware information
Determine Windows network topology, architecture, and trust relationship
Automated Windows password guessing
Escalating privilege from user to Administrator
Wiping Windows audit logs
Grabbing Windows password hashes
Sniffing Windows password hashes
Cracking Windows password hashes
Getting remote interactive cmd.exe shells
Hiding tools and files in NTFS (streams)
Using trojans and backdoors (BO2K, netbus, SubSeven, VNC)
Network Hacking Exercises
Router identification and enumeration
SNMP vulnerabilities
Decrypting Cisco passwords
Port identification
Determining firewall filtering rules
Taking advantage of liberal firewall rules
Using port redirection to bypass firewall and router rules
 

Aves

Lifer
Feb 7, 2001
12,232
29
101
That sounds like a cool class but it seems like a lot of material to cover in just a few days. I'd be worried that they're just gonna skim a lot of it.

Since it's for a work I guess it really doesn't matter since you'll have to go anyway.
 

UNCjigga

Lifer
Dec 12, 2000
24,816
9,026
136
whoa, just saw this at SARC!!!
W32.Hevnsnt.A@mm

Discovered on: January 19, 2004
Last Updated on: January 19, 2004 03:08:41 PM

W32.Hevnsnt.A@mm is a mass-mailing worm that will only work until 28th of January. This worm will insert several files and registry keys on the system. It will also access remote websites, and email all contacts it can find. The emails sent by this worm will have the following characteristics:

Subject: AT0T pwns j00!!1one!
Message:
w00t
<Random characters>
--
Test, yep.
Filename: <Random>.exe
Filesize: 16Kbytes

Also Known As: I-Worm.hevnsnt [Kaspersky], WORM_HEVNSNT.A [Trend]

Type: Worm
Infection Length: 16 Kbytes

Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP
Systems Not Affected: DOS, Linux, Macintosh, Microsoft IIS, OS/2, UNIX, Windows 3.x
 

hevnsnt

Lifer
Mar 18, 2000
10,868
1
0
Originally posted by: Jigga
whoa, just saw this at SARC!!!
W32.Hevnsnt.A@mm

Discovered on: January 19, 2004
Last Updated on: January 19, 2004 03:08:41 PM

W32.Hevnsnt.A@mm is a mass-mailing worm that will only work until 28th of January. This worm will insert several files and registry keys on the system. It will also access remote websites, and email all contacts it can find. The emails sent by this worm will have the following characteristics:

Subject: AT0T pwns j00!!1one!
Message:
w00t
<Random characters>
--
Test, yep.
Filename: <Random>.exe
Filesize: 16Kbytes

Also Known As: I-Worm.hevnsnt [Kaspersky], WORM_HEVNSNT.A [Trend]

Type: Worm
Infection Length: 16 Kbytes

Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP
Systems Not Affected: DOS, Linux, Macintosh, Microsoft IIS, OS/2, UNIX, Windows 3.x

lol. Very well done.
 

Bullhonkie

Golden Member
Sep 28, 2001
1,899
0
76
My girlfriend took their Ultimate Hacking class a few years ago and she says it was excellent. At the time the class was basically the only one of its kind, but these days a lot of different places also offer these kinds of classes. It wasn't quite as in-depth as she had hoped for (check out some of the SANS courses for that if you can swing it by your employer - she highly recommends them), but she says it served very well as a basic primer to everything that you need to know.

She says if you aren't very familiar with network intrusion/security in general, to try and follow closely because it can be easy to get overwhelmed with information. Especially if you aren't familiar with Windows and/or UNIX. Other than that it was quite enjoyable.

Just curious, what position are you in at work?
 

hevnsnt

Lifer
Mar 18, 2000
10,868
1
0
Originally posted by: Bullhonkie
My girlfriend took their Ultimate Hacking class a few years ago and she says it was excellent. At the time the class was basically the only one of its kind, but these days a lot of different places also offer these kinds of classes. It wasn't quite as in-depth as she had hoped for (check out some of the SANS courses for that if you can swing it by your employer - she highly recommends them), but she says it served very well as a basic primer to everything that you need to know.

She says if you aren't very familiar with network intrusion/security in general, to try and follow closely because it can be easy to get overwhelmed with information. Especially if you aren't familiar with Windows and/or UNIX. Other than that it was quite enjoyable.

Just curious, what position are you in at work?


CIRT.. It will mostly be a refresher, plus I am sure I will learn some new stuff...
 

Savij

Diamond Member
Nov 12, 2001
4,233
0
71
Counter Hack: A step by step guide to Computer attacks and Effective Defenses by Ed Skoudis

It's a few years old now but still mostly relevant

Text

Edit: For poorer people who don't want to pay that much $$$$$$ for a class
 

sygyzy

Lifer
Oct 21, 2000
14,001
4
76
Originally posted by: Savij
Counter Hack: A step by step guide to Computer attacks and Effective Defenses by Ed Skoudis

It's a few years old now but still mostly relevant

Text

Edit: For poorer people who don't want to pay that much $$$$$$ for a class

Thanks. Added that to my Amazon Wish List, although that is one mighty expensive book!
 

Derango

Diamond Member
Jan 1, 2002
3,113
1
0
Originally posted by: sygyzy
Originally posted by: Savij
Counter Hack: A step by step guide to Computer attacks and Effective Defenses by Ed Skoudis

It's a few years old now but still mostly relevant

Text

Edit: For poorer people who don't want to pay that much $$$$$$ for a class

Thanks. Added that to my Amazon Wish List, although that is one mighty expensive book!

Not really, its actually kinda on the cheap side compared to a lot of other 600 page computer related books.
 

Balt

Lifer
Mar 12, 2000
12,674
482
126
please don't h4x0r my b0x0rs :( :( :(

Sounds like a cool class, have fun! I hope your employers didn't stick you with the $4k bill. ;)