CS581 Computer &
Network Security (Winter 2012)
Lectures: Tuesdays 6:10-9:50pm Engineering, Computer Science, &
Technology Bldg. Room A210 and C245
Instructor: Edmund Gean Email:
egean@calstatela.edu
Phone: (323) 343-4395 Office: Library
Office
Hours: Tuesdays 5:00-6 pm Library North B18
Description: This
course exposes students to various techniques related to defending your
computers and networks. Topics covered include Denial-Of-Service attacks,
packet analyzers, host-based intrusion detection, firewalls, and VPN. Lab exercises and projects will be included
to foster greater understanding in this field.
Course Goals: At the end of
the course, students will be able to:
-perform a security assessment of an
organization’s network via
penetration test and identify vulnerabilities
-harden MS Windows and Unix
operating systems
-install intrusion detection systems,
firewalls, and VPNs
Prerequisites: CS447 (computer networks) or CS470 (computer
networking protocols)
http://www.calstatela.edu/faculty/egean/cs447/cs447%20syllabus.htm
http://www.calstatela.edu/faculty/egean/cs447/lecture-notes-sybex2007/
Required
textbook:
Counter Hack Reloaded by Ed Skoudis (lecture notes available online at
http://www.calstatela.edu/faculty/egean/cs581/lecture-notes
)
Recommended
textbooks: Network
Security Principles and Practices by Saadat Malik (lecture notes online)
(http://www.calstatela.edu/faculty/egean/cs581/network-security-principles-and-practices.pdf
)
Network
Security Technologies and Solutions by Yusuf Bhaiji
(http://www.calstatela.edu/faculty/egean/cs581/Network_Security_Technologies_and_Solutions.pdf
)
References: Free packet capture and decode software at http://www.wireshark.org/
Free
ebooks at http://mimas.calstatela.edu/login?url=http://proquest.safaribooksonline.com/
Documentation
of Cisco equipment at http://www.cisco.com
Topics:
Denial-Of-Service attacks & hacker
techniques
Port scanning, penetration, and
vulnerability testing
packet analyzers and
sniffers
host and network-based
intrusion detection
firewalls, packet filters, and
access control lists
securing Unix and Window
systems
authentication, authorization, and
accounting
data integrity checking
& encryption schemes
Projects:
Students will gain practical
experience through the following lab projects
-
scan
a network to locate machines and open ports
-
find
vulnerabilities on machines
-
configure
firewall & setup VPN
-
setup
network-based detection system
Grading
policy: Overall grade will be
comprised of the following components
- lab assignments 40%
- final exam 60%
A 90-100
B 80-89
C 65-79
D 50-64
F 0-49
Academic Integrity: Cheating will not be
tolerated. Cheating on any assignment or exam will be taken seriously. All parties involved will receive a grade of
F for the course and be reported to the Academic Senate
CS581
Reading and Lab Project Assignments
|
1 |
Chapters 1,2 (Counter Hack) Introduction Network Overview |
|
|
2 |
Chapters 3,4,6 (Counter Hack) Unix Overview Windows NT/2000 Overview Scanning (eg nmap, Nessus) |
Port scanning
Install
nmap (or nmapfe) (http://nmap.org) port scanner onto your laptop or
home computer and perform a TCP port scan and a UDP port scan of another
computer. Submit reports generated by
nmap (or Zenmap)
containing list of open TCP & UDP ports. Also submit output of “netstat –na” command on
computer that was scanned. Be sure to temporarily turn off any host-based
firewall software if needed so that outputs of nmap
and “netstat –na” indicate the same
number of open ports. |
|
3 |
Chapter 5,7 (Counter Hack) Reconnaissance Gaining Access via application/OS attacks |
Penetration and
Vulnerability testing
Install
a network-based vulnerability scanner Nessus (www.nessus.org) onto your computer and perform a
vulnerability scan of another. Submit vulnerability report of services that
pose medium or high security risk. Be
sure to temporarily turn off any host-based firewall software if needed to
get meaningful output. |
|
4 |
Chapters 5-8 (Malik) Secure Switching NAT PIX firewall |
Firewall Place
one computer on the outside interface and a server on inside interface of a Cisco Pix
firewall. Configure the firewall to block outside users from initiating any connection
to the inside server except through TCP port 22 (ssh).
Turn on logging and submit copy of firewall config
file and output of “show logging” as evidence that firewall is blocking all
conversations initiated from outside except for ssh.
You
may need to download from the Internet a free ssh
server. http://www.cisco.com/en/US/docs/security/pix/pix63/quick/guide/63_501qk.html
http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/index.htm |
|
5 |
Chapter 8,9 (Counter Hack) Gaining access via network attacks Denial-of-Service attacks |
|
|
6 |
Chapters 10, & 13 (Malik) VPN IPSEC |
IPSec VPN
Setup
a site-to-site IPSec
VPN tunnel between your Cisco router and your Cisco PIX firewall. Submit (i) the
configuration files used on the two Cisco devices and (ii) evidence that the
IPSec tunnel works via output of debug ipsec, show crypto
isakmp sa, and show crypto ipsec
sa on both Cisco PIX firewall and on Cisco
router |
|
7 |
Chapters 9, 14, & 15 (Malik) IOS firewall Network Intrusion Detection |
Network intrusion
detection system
Install
Snort (http://www.snort.org) onto your
computer. Simulate two different
network attacks against your computer. Turn in a listing of two different alerts that the snort IDS
detected and submit printout of the
two signature definitions Snort used from its signature definition files to
detect the two types of attack. |
|
8 |
Chapters 16-18 (Malik) AAA TACACS+ RADIUS |
AAA Configure
your Cisco router to use AAA for user authentication via a TACACS+ or RADIUS server (such as Clearbox) that you installed on your computer. Submit the
configuration files used on the Cisco router.
Submit screenshots of decoded packet capture of TACACS+ or RADIUS
packets as evidence that AAA
authentication works whenever you telnet to your router. |
|
9 |
Chapter 10,11 (Counter Hack) Maintaining Access Covering Tracks and Hiding |
Exploit
code generation Create
an exploit using Metasploit that can be
successfully used against a vulnerability (install a
vulnerable application if needed) on your computer using tools provided at http://www.metasploit.com/framework/
. Which vulnerability was exploited?
Which server port number was vulnerable? Provide
evidence that this exploit was successful via screenshots, packet captures,
and output of “netstat –a” |
|
10 |
TBD |
|
|
11 |
Final Exam (March 20, 2012
7:30pm) |
|