|
|
Line 362: |
Line 362: |
| | | |
| | | |
− | :'''System Hardening in Linux:''' | + | :'''Types of Penetration Testing''' |
− | ::*Purpose | + | ::*Network |
− | ::*Rule of Preventative Action
| + | ::*Access Control |
− | ::*Rule of Separation
| + | ::*Infrastructure / Patching |
− | ::*Rule of Least Privilege
| + | ::*Physical/Building Security |
− | :::*AAA Protocol (Authentication):
| + | ::*Social Engineering |
− | ::::*PKI
| |
− | ::::*PAM
| |
− | ::::*Kerebos
| |
− | | |
| | | |
| | | | | |
| | | |
| | | |
− | :'''Slides (Concepts):''' | + | :'''Slides (Concepts): See Blackboard''' |
| | | |
− | ::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w3_l1b.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w3_l1b.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w3_l1b.pptx pptx] ] Linux Hardening - Part 1
| |
− | ::*[[https://www.digitalocean.com/community/tutorials/how-to-use-pam-to-configure-authentication-on-an-ubuntu-12-04-vps PAM Configuration HOWTO]]
| |
− | ::*[[http://hexten.net/assets/pam_abl_doc/index.html PAM Auto Blacklist Module HOWTO]]
| |
− | :'''Reading References:'''
| |
| | | |
− | ::*[https://www.sans.org/media/score/checklists/ID-Linux.pdf Intrusion Discovery - Linux]
| |
− | ::*[http://lcweb.senecac.on.ca:2063/0596003919 Linux Security Cookbook (E-book)]<br />(Chapter 4 - Pages: )
| |
− |
| |
− | :'''YouTube Videos:'''
| |
− | ::*Linux Hardening
| |
− | :::[http://www.youtube.com/watch?v=GJMKgV8V4FI Part1] | [http://www.youtube.com/watch?v=M9LdGH_AIZo Part 2] | [http://www.youtube.com/watch?v=0tEBXWU6Au4 Part 3]
| |
− | ::*[http://www.youtube.com/watch?v=yy1NR74ttAw&feature=results_main&playnext=1&list=PL48E055817B95897B PAM]
| |
− |
| |
− | :'''Resources:'''
| |
− | ::* [http://www.linuxdoc.org/HOWTO/User-Authentication-HOWTO/x115.html Why Use PAM?]
| |
− | ::* [http://www.ibm.com/developerworks/linux/library/l-pam/index.html Understanding and Configuring PAM]
| |
| | | |
| | | |
Line 400: |
Line 381: |
| | | |
| :'''Lab 6:''' | | :'''Lab 6:''' |
− | ::System Hardening | + | ::Work on vulnerable Windows 7 VM CTF |
− | ::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_6.html Linux System Hardening (part 1)]
| |
| | | |
| | | |
Line 418: |
Line 398: |
| | | |
| | | |
− | :'''System Hardening in Linux / Continued:''' | + | :'''Passwords, Pwn'ing, & Pillaging''' |
− | ::*AAA Protocol (Authorization):
| + | |
− | :::*ACLs
| |
− | :::*SELinux
| |
− | :::*Sudo
| |
− | :::*Cron Jobs
| |
− | :::*Turning Off Xwindows
| |
| | | |
| | | |
Line 431: |
Line 406: |
| | | |
| | | |
− | :'''Slides (Concepts):''' | + | :'''Slides (Concepts): See Blackboard''' |
− | ::* [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w4_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w4_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w4_l1.ppt ppt] ] Linux Hardening - Part 2
| |
| | | |
− | :'''YouTube Videos:'''
| |
− | ::*[http://www.youtube.com/watch?v=6piQXXHTmqk ACLs]
| |
− | ::*[http://www.youtube.com/watch?v=fpXuWhshKVA SELinux]
| |
− | ::*[http://www.youtube.com/watch?v=imnEUvvDxc4 Sudo]
| |
− | ::*[http://www.youtube.com/watch?v=4Icg3MYZZqI Cron Jobs]
| |
− |
| |
− | :'''Reading References:'''
| |
− | ::*[http://lcweb.senecac.on.ca:2063/0596003919 Linux Security Cookbook]<br />(Chapter 5 - Pages: )
| |
− | ::*[http://lcweb.senecac.on.ca:2063/0131963694?uicode=seneca SELinux by Example]<br />(Chapter x - Pages: )
| |
− |
| |
− | :'''Resources:'''
| |
− | ::* [http://www.linuxquestions.org/linux/answers/security/acls_extended_filepermissions How to Use ACLs]
| |
− | ::* SELinux
| |
− | ::* [http://www.sudo.ws/sudo/intro.html Sudo In a Nutshell]
| |
| | | |
| | | |
Line 456: |
Line 416: |
| | | |
| :'''Lab 7:''' | | :'''Lab 7:''' |
− | ::System Hardening | + | ::Continue to work on vulnerable Windows 7 VM CTF |
− | ::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_7.html Linux System Hardening (part 2)]
| |
− | | |
− | | |
− | | |
− | :'''Assignment #2:'''
| |
− | ::*Assignment Instructions (N/A)
| |
| | | |
| | | |
Line 473: |
Line 427: |
| | | |
| | | |
− | :'''System Hardening in Linux / Continued:''' | + | :'''Application Security''' |
− | ::*Complete Labs 6 and 7
| |
| | | |
| | | |
Line 489: |
Line 442: |
| | | |
| :'''Labs:''' | | :'''Labs:''' |
− | ::*Complete Labs 6 and 7
| + | |
| | | |
| | | |
Line 497: |
Line 450: |
| | | |
| | | | | |
− |
| |
− |
| |
− | :'''Intrusion Detection:'''
| |
− | ::*Purpose
| |
− | ::*Logs
| |
− | ::*Monitoring
| |
− | ::*Iptables
| |
− | ::*Using Tripwire
| |
| | | |
| | | |
| | | |
− | :'''Additional Considerations:'''
| |
− | ::*Decoys: Honey-Pots
| |
− | ::*DMZs
| |
− | ::*Disaster Recovery
| |
− | ::*The BIGGER Picture
| |
| | | | | |
| | | |
| | | |
− |
| |
− | :'''Slides (Concepts):'''
| |
− | ::*[ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w9_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w9_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w9_l1.ppt ppt] ] Intrusion Detection / Using Tripwire
| |
− |
| |
− | :'''Reading References:'''
| |
− | ::*[http://www.sans.org/score/checklists/ID_Linux.pdf Intrusion Discovery - Linux]
| |
− | ::*[http://lcweb.senecac.on.ca:2063/0596003919 Linux Security Cookbook]<br />(Chapter 1 - Pages: )
| |
− |
| |
− | :'''YouTube Videos:'''
| |
− | ::*[http://www.youtube.com/watch?v=kUdCsZpt2ew Iptables]
| |
− |
| |
− | :'''Additional Resources:'''
| |
− | ::*
| |
| | | |
| | | |
Line 537: |
Line 464: |
| | | |
| :'''Lab 8:''' | | :'''Lab 8:''' |
− | ::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_8.html Intrusion Detection]
| + | |
| | | |
| |- valign="top" | | |- valign="top" |