• No results found

Network Traffic and Security Analysis

N/A
N/A
Protected

Academic year: 2021

Share "Network Traffic and Security Analysis"

Copied!
13
0
0

Loading.... (view fulltext now)

Full text

(1)

Network Traffic and

Security Analysis

(2)

Network Traffic and Security Analysis Course – Sample 5-Day Course Outline • Copyright Chappell University Page 1

Course Formats Available

This 5-day course can be provided in two formats: • Online Instructor-Led Training

Generally provided in 3-hour or 6-hour increments over several days or spread over several weeks. An excellent option when students are geographically disbursed. This course can be customized using your own trace files.

Get a course price estimate or formal course quote at www.chappellU.com (Pricing section).

See Training Facility Requirements on page 8 for course setup details.

• Onsite Instructor-Led Training

Offering hands-on lab-based training at your location or a venue convenient for your team, this option is ideal for small or large audience sizes who prefer in-person

instruction and a more personalized training approach. This course can be customized using your own trace files.

Get a course price estimate or formal course quote at www.chappellU.com (Pricing section).

See Training Facility Requirements on page 8 for course setup details.

Also Available – All Access Pass (AAP)

Visit www.lcuportal2.com to learn more about the All Access Pass, • One year subscription (single seat license)

• Online recorded training sessions

• Course progress tracking and transcripts • Course certificates

(3)

Network Traffic and Security Analysis Course – Sample 5-Day Course Outline • Copyright Chappell University Page 2

Course Description

This 5-day course offers hands-on training in network traffic security analysis and network forensics. This course begins with the core tasks and techniques for TCP/IP analysis (IP, TCP, UDP, ARP, DHCP, HTTP, POP/SMTP, ICMP, VoIP, WLAN 802.11 traffic) and moves into capture and analysis techniques for evidence of reconnaissance and breach patterns on the network.

Students must provide their own laptops pre-loaded with the latest stable release of Wireshark (www.wireshark.org/download).

The instructor will provide traffic analysis trace files for use in hands-on labs (on DVD). If you provide trace files for customization of course materials, those trace files will also be distributed as course materials.

Course Outline and Estimated Daily Breaks

The schedule listed is tentative and will fluctuate depending on customer’s needs and focus during the course.

DAY ONE

Course Set Up and Analyzer Testing

1. Network Analysis Overview

1.1. Security Tasks for the Network Analyst

1.2. Application Analysis Tasks for the Network Analyst 1.3. Security Issues Related to Network Analysis

1.4. Legal Issues Related to Listening to Network Traffic 1.5. Overcome the "Needle in a Haystack" Issue

2. Wireshark Functionality Overview

2.1. Capturing Packets on Wired or Wireless Networks 2.2. Open Various Trace File Types – Wiretap Library 2.3. How Wireshark Processes Packets – Dissectors, Filters

2.4. Key Wireshark Techniques – Filter/WLAN Toolbar, Status Bar, Profiles, Right-Click

3. Capturing Wired and Wireless Traffic

3.1. Know Where to Tap into the Network – Wired/WLAN, Duplex Issues, Switches 3.2. Infrastructure Effects – NAT/PAT, QoS Routing, VLANs, APs

3.3. Options for Remote Capture

3.4. Using File Sets and Optimizing for Large Capture Quantity

3.5. Conserve Memory with Command-line Capture (Tshark, dumpcap) 3.6. Using Default and Custom Capture Filters

3.7. Filter by a Protocol, Address or Host Name

(4)

Network Traffic and Security Analysis Course – Sample 5-Day Course Outline • Copyright Chappell University Page 3

4. Define Global and Personal Preferences for Faster Analysis

4.1. Set Global and Personal Configurations 4.2. Customize Your User Interface Settings 4.3. Define Your Capture Preferences 4.4. Define IP and MAC Name Resolution

4.5. Define ARP, TCP, HTTP/HTTPS and Other Protocol Settings 4.6. Use Colors to Distinguish Traffic

4.7. Marking Packets of Interest

5. Defined Time Values and Interpret Summaries

5.1. Use Time to Identify Network Issues 5.2. Create Additional Time Columns

6. Interpret Basic Trace File Statistics to Identify Trends

6.1. Launch Wireshark Statistics for Protocols and Applications 6.2. Identify the Most Active Conversations/Endpoints

6.3. List Endpoints and Map Them on the OpenStreetMap 6.4. List Conversations or Endpoints for Specific Traffic Types 6.5. List All UDP and TCP Ports Used

6.6. Graphic Flow of Traffic 6.7. Analyze HTTP Statistics 6.8. Analyze WLAN Statistics

7. Create and Apply Display Filters for Efficient Analysis

7.1. Create Display Filters Using Auto Complete 7.2. Create and Apply Saved Display Filters 7.3. Use Expressions for Filter System

7.4. Combine Display Filters with Comparison Operators 7.5. Alter Display Filter Meaning with Parentheses 7.6. Filter on Specific Bytes in a Packet

7.7. Avoid Common Display Filter Mistakes 7.8. Manually Edit the dfilters File

DAY TWO

8. Follow Streams and Reassemble Data

8.1. Follow and Reassemble UDP and TCP Conversations 8.2. Identify Common File Types

(5)

Network Traffic and Security Analysis Course – Sample 5-Day Course Outline • Copyright Chappell University Page 4

9. Use Wireshark's Expert System to Identify Anomalies

9.1. Launch Expert Info Quickly 9.2. Colorize Expert Info Elements

9.3. Filter on TCP Expert Information Elements 9.4. Define TCP Expert Information

10. TCP/IP Analysis Overview

10.1. Define Basic TCP/IP Functionality 10.2. Define the Multistep Resolution Process 10.3. Define Port Number Resolution

10.4. Define Network Name Resolution

10.5. Define Route Resolution for a Local Target

10.6. Define Local MAC Address Resolution for a Target 10.7. Define Route Resolution for a Remote Target

10.8. Define Local MAC Address Resolution for a Gateway

11. Analyze Common TCP/IP Traffic Patterns

11.1. Analyze Normal/Unusual DNS Queries/Responses 11.2. Analyze Normal/Unusual ARP Requests/Responses 11.3. Analyze Gratuitous ARP

11.4. Dissect the ARP Packet Structure 11.5. Analyze Normal/Unusual IPv4 Traffic 11.6. Set Your IP Protocol Preferences 11.7. Analyze Normal/Unusual ICMP Traffic 11.8. Dissect the ICMP Packet Structure 11.9. Analyze Normal/Unusual UDP Traffic

11.10. Analyzed Normal/Unusual TCP Communications 11.11. Define the Establishment of TCP Connections 11.12. Define How TCP-based Services Are Refused 11.13. TCP Sequential Packet Tracking

11.14. Define TCP Flow Control 11.15. Analyze TCP Problems 11.16. Set TCP Protocol Parameters

11.17. Analyze Normal/Unusual DHCP Traffic

11.18. Analyze Normal/Unusual HTTP Communications 11.19. Filter on HTTP or HTTPS Traffic

11.20. Export and Display HTTP Objects

11.21. Graph HTTP Traffic Flows and Set HTTP Preferences 11.22. Analyze HTTPS Communications

11.23. Decrypt HTTPS Traffic

11.24. Analyze Normal/Unusual FTP Communications 11.25. Reassemble FTP Data Transfers

(6)

Network Traffic and Security Analysis Course – Sample 5-Day Course Outline • Copyright Chappell University Page 5

DAY THREE

12. Graph I/O Rates and TCP Trends

12.1. Generate Basic and Advanced I/O Graphs 12.2. Filter I/O Graphs

12.3. Graph Round Trip Time and Throughput Rates 12.4. Interpret TCP Window Size Issues

12.5. Interpret Packet Loss, Duplicate ACKs and Retransmissions

13. 802.11 (WLAN) Analysis Fundamentals

13.1. Analyze Signal Strength and Interference

13.2. Capture WLAN Traffic - Compare Monitor Mode and Promiscuous Mode 13.3. Set up WLAN Decryption

13.4. Prepend a Radiotap or PPI Header

13.5. Compare Signal Strength and Signal-to-Noise Ratios 13.6. Describe 802.11 Traffic Basics

13.7. Analyzed Normal 802.11 Communications 13.8. Filter on All WLAN Traffic

13.9. Analyze Frame Control Types and Subtypes

14. Voice over IP (VoIP) Analysis Fundamentals

14.1. Define VoIP Traffic Flows and Analyze VoIP Problems 14.2. Examine SIP and RTP Traffic

14.3. Play Back VoIP Calls

14.4. Create a VoIP Profile and VoIP Filters

DAY FOUR

15. Network Forensics Fundamentals

15.1. Gather Packet Evidence

15.2. Methods for Avoiding Detection 15.3. Recognize Unusual Traffic Patterns 15.4. Color Unusual Traffic Patterns

15.5. Check out Complementary Forensic Tools

16. Detect Scanning and Discovery Processes

16.1. Detect ARP Scans (aka ARP Sweeps) 16.2. Detect Various Types of TCP Port Scans 16.3. Detect UDP Port Scans

16.4. Detect IP Protocol Scans 16.5. Define Idle Scans

16.6. Know Your ICMP Types and Codes 16.7. Analyze Traceroute Path Discovery 16.8. Detect Dynamic Router Discovery 16.9. Define Application Mapping Processes 16.10. Use Wireshark for Passive OS Fingerprinting 16.11. Detect Active OS Fingerprinting

(7)

Network Traffic and Security Analysis Course – Sample 5-Day Course Outline • Copyright Chappell University Page 6

17. Analyze Suspect Traffic

17.1. Describe What Is Suspect Traffic

17.2. Identify Vulnerabilities in the TCP/IP Resolution Processes 17.3. Identify Unacceptable Traffic

17.4. Find Maliciously Malformed Packets

17.5. Identify Invalid or Dark Destination Addresses

17.6. Differentiate between Flooding or Standard Denial of Service Traffic 17.7. Find Clear Text Passwords and Data

17.8. Identify Phone Home Behavior

17.9. Catch Unusual Protocols and Applications 17.10. Locate Route Redirection That Uses ICMP 17.11. Catch ARP Poisoning

17.12. Catch IP Fragmentation and Overwriting 17.13. Spot TCP Splicing

17.14. Watch Other Unusual TCP Traffic 17.15. Identify Password Cracking Attempts 17.16. Know Where to Look: Signature Locations

DAY FIVE

18. Use Command-Line Tools

18.1. Use Wireshark.exe (Command-Line Launch) 18.2. Capture Traffic with Tshark

18.3. List Trace File Details with Capinfos 18.4. Edit Trace Files with Editcap

18.5. Merge Trace Files with Mergecap 18.6. Convert Text with Text2pcap 18.7. Capture Traffic with Dumpcap

(8)

Network Traffic and Security Analysis Course – Sample 5-Day Course Outline • Copyright Chappell University Page 7

Course Customization: Trace Files

Courses can be customized based on the customer’s requirements and trace files provided in a timely manner.

The goal of the course is to teach students a more efficient analysis method for spotting the cause of performance problems using Wireshark’s capabilities for capture and analysis. Using the customer’s own trace files provide students with experience analyzing their own traffic. Some things to keep in mind when supplying trace files to use in your course:

• We must receive the files at least 30 days before the course in order to integrate them into the course.

• Trace files should be no larger than 50MB each. If you have larger trace files, we can provide instructions on how to split them into file sets or we can arrange a special upload area to accommodate larger files.

• Trace files should not be taken just by “plugging into a switch and capturing.” This would only allow us to see broadcast and multicast traffic. Consider running Wireshark on a client during the capture sequence.

• Provide us with the following information on each trace file submitted: o Method of capture (e.g., spanned a switch port)

o Capture location (e.g., close to user x who complains of performance issues) o Key IP address/host names (e.g., UserX is 10.3.4.2)

(9)

Network Traffic and Security Analysis Course – Sample 5-Day Course Outline • Copyright Chappell University Page 8

Training Facility Requirements

Onsite Instructor-Led Courses

Ms. Chappell will need to project her laptop throughout the presentation. Appropriately-sized projection screens should be placed in the room to ensure full visibility of the projected screens. A single projection screen (minimum 12’ height) is suggested for smaller audience sizes (less than 50 students); larger and additional projection screens are required for larger audiences.

Inadequate screen visibility for attendees will have a serious negative affect on attendee performance and success.

In larger venues (typically hosting over 50 attendees), a wireless microphone will be required. Note that wired microphones/stand microphones will not work as Ms. Chappell is typing on her keyboard and walking the room through much of the event.

Whiteboards are suggested in smaller venues (hosting less than 50 attendees); they are not used in larger venues.

Please notify Ms. Chappell if she will be joined by assistants for the hearing impaired. Ms. Chappell speaks very quickly and at least two interpreters are suggested for the event.

Online Instructor-Led Courses

There are three different options for student access to the Online Instructor-Led courses. • Option 1: Conference Room/Projector/Speaker

In this configuration all students are at a single facility. One computer is connected to the Internet and webinar service. That computer projects the lesson video while feeding audio to the audience via speakers.

Note: In order for students to ask individual questions of the instructor, each student

(10)

Network Traffic and Security Analysis Course – Sample 5-Day Course Outline • Copyright Chappell University Page 9

• Option 2: Two-Computers per Student; Headset Required

In this configuration all students have two computers - One computer is connected to the Internet and webinar service. That computer projects the lesson video while feeding audio to the audience via headset. The second Computer is the Wireshark computer. This option may not work for long class hours as the headsets can become

uncomfortable.

Note: In order for students to ask individual questions of the instructor, each student

must be logged in to the online training system during the class.

• Option 3: Single Computer per Student; Headset Required (Option Not

Recommended)

In this configuration all students have a single computer and headset. Students must toggle back and forth between Wireshark and the webinar. This is not an ideal situation, but it has been used before. This option may not work for long class hours as the headsets can become uncomfortable.

(11)

Network Tra

Abou

also a me energy a Hewlett-P Ms. Chap delivers o network t Laura’s n Access P Clients

affic and Security

ut the

ember of the nd clarity ha Packard, Hig ppell is the F onsite and o tools. network ana Pass at chap Ms. C state a • • • • • • • • • • • • • • y Analysis Course

Instruc

Laura Cha industry tit Nickname of State, F members, Ms. Chapp Associatio Electrical a e FBI’s Infra ave earned h gh Technolo Founder of C online trainin lysis, trouble ppellU.com a Chappell’s cli and local law

United Sta United Sta United Sta Hong Kon Apple Lockheed Cisco Sys Salesforce Netflix Dell, Inc. IBM Corpo Microsoft C Sutherland United Ba e – Sample 5-Da

ctor

appell is a hi tles on netw d “Glenda, t Federal and engineers, pell is a mem on (HTCIA) a and Electron gard organiz her a top spo ogy Crime Inv Chappell Un g in the area In 2007, Ms educational wiretapping/ TCP/IP ana eshooting an and through ent base is w enforceme ates Navy ates Arsenal ates Court of g Police Dep Martin tems e oration Corporation d Asbill & Br nk of Switze ay Course Outlin ghly-energe ork commun the Good Wi internationa network adm mber of the H and an Asso nic Engineer zation. Her b ot as an indu vestigation A iversity (www as of networ s. Chappell fo firm devote /communica lysis and ne nd security tr customized global and in ent agencies f Appeals partment rennan, LLP erland e • Copyright Ch etic speaker nications, an Witch,” Laura l law enforce ministrators, High Techno ociate Memb rs (IEEE) sin blend of hum ustry speake Association w.chappellU rk protocols, founded Wire d to teachin ations interce etwork troubl raining is av online/onsit ncludes num s. happell University and author o nalysis and s has present ement office technicians ology Crime ber of the Ins nce 1989. M mor, persona er at Microso and US Cou U.com) which network for eshark Univ g the art of eption, netw leshooting. vailable onlin te analysis a merous Fortu y P of numerous security. ted to thousa ers, judicial s and develo Investigatio stitute for s. Chappell al experience oft, Novell, urt conferenc h develops a rensics and ersity, an work forensic ne through th and training. une 100, fed Page 10 s ands opers. on is es, ces. and cs, he All deral,

(12)

Network Traffic and Security Analysis Course – Sample 5-Day Course Outline • Copyright Chappell University Page 11

• Federal Home Loan Bank of San Francisco • McAfee Corporation

• Qualcomm Incorporated • Symantec Corporation • Riverbed Technologies

• Naval Criminal Investigative Services (NCIS) • Northern Indiana Power Company

• Microchip Technology, Inc. • CapitalOne Financial Services • City of Canberra (Australia) • Macau Police Department

• Australian High Tech Crime Centre • Fidelity National Information Services • City of San Francisco

• … and several unnamed Federal agencies

Conferences Ms. Chappell is consistently a top-rated speaker at numerous industry and

private conferences including: ƒ Microsoft TechEd US ƒ Microsoft TechEd Europe

ƒ Microsoft TechReady (Internal Technical Conference)

ƒ High Technology Crime Investigation International Conference ƒ IEEE Regional Conference (California)

ƒ Novell BrainShare Conference

ƒ Novell Advanced Technical Training Conference ƒ US Courts Technical Training Conference

ƒ United States Secret Service Electronic Crimes Task Force Quarterly Meetings

ƒ OpenSourceWorld/LinuxExpo US ƒ European Forensics Conference

Publications Ms. Chappell has authored numerous industry titles.

ƒ Wireshark Network Analysis: The Official Wireshark Network Analyst Study Guide (Chappell University)

ƒ Wireshark Certified Network Analyst: Official Exam Prep Guide (Chappell

University)

ƒ Guide to TCP/IP (Pearson; co-Author Ed Tittel) ƒ Introduction to Network Analysis (podbooks) ƒ Network Analysis Case Studies (podbooks)

ƒ Introduction to Cisco Router Configuration (Cisco Press) ƒ Advanced Cisco Router Configuration (Cisco Press) ƒ Multiprotocol Internetworking (Novell Press)

(13)

Network Traffic and Security Analysis Course – Sample 5-Day Course Outline • Copyright Chappell University Page 12

Contact Information

Coordinator: Brenda Cardinal

brenda@chappellU.com Phone: +1 408-378-7841

Fax: +1 408-378-7891

Mail: 5339 Prospect Road, #343 San Jose, California 95129 USA

Websites: www.chappellU.com - Chappell University www.lcuportal2.com - Online Training Portal www.wiresharkU.com - Wireshark University

References

Related documents

The Higher Education Learning Partnerships Centre for Excellence in Teaching and Learning (HELP CETL) supports staff involved in the delivery of higher education level

Based on the reviewed literature, the following hypotheses were tested: The correspondence of sexual orientation, genital response, pupil dilation, and subjective arousal to

The diagram depicts the influence of genetic polymorphisms on the drug transport activities of ABC transporters. ABC transporter, ATP-binding cassette transporter; MDR1,

Following TAM thus, we postulate the perception of social media sites usability for B2B marketing (PUsability) does not only influence intention to use (IUSE) but it

Lailat al Miraj (ISLAM) [Regional customs or moon sightings may cause a variation of the date for Islamic holidays.]. INTERNATIONAL DAY OF FAMILIES (UN) Parashat

Enterprise Project Team Module 12 months (billed monthly) 5GB MAGNET Cloud Storage 12 months**.. 5GB MAGNET Cloud Storage 12 months (billed monthly) MAGNET Relay 12 months

Learning was believed by Confucius to be the foundation of tradition, and filial piety was the foundation of the Three Bonds and Five Relationships.. In Confucianism, tradition was

Major considerations in constructing the project included to provide clear guidelines, video record the scenarios, limit number of students participating in a scenario, keep