PackCapAnal Edition
Details
Release Info
What's on the wire? And above? Only one way to find out. Sniff. In doing so, numerous layers of data are captured. They must be analyzed and labeled. BPF-oriented tools provide such useful facilities to Capture and Analyze flows of information traversing our Net Interfaces. Use WireShark to help filter those packets and make sense of those flows.Release Syllabus
Wireshark® | TCPDump Packet Capturing
Packet Capture Analysis Security feat. Ethereal® - Module VI
- Introduction - Topology - Features
- Discuss course outline
- Explore system configuration
- Identify key network interfaces to be used for captures
- Identify connected interfaces on Cisco Switch
- Explore network topology - IPv4 & IPv6
- Identify Ethereal installation
- Enumerate and discuss key Ethereal features
- Ethereal® Graphical User Interface (GUI)
- Identify installation footprint
- Differentiate between promiscuous and non-promiscuous modes
- Configure X.org to permit non-privileged user to write output to screen
- Launch Ethereal GUI
- Identify the primary GUI components /Packet List | Packet Details | Packet Bytes/
- Discuss defaults
- Explore key menu items
- TCPDump | WinDump - Packet Capturing for /Linux|Unix|Windows/
- Discuss defaults, features and applications
- Use TCPDump on Linux to capture packets
- Log traffic using default PCAP/TCPDump format
- Discuss Berkeley Packet Filters (BPFs)
- Capture and log specific packets using BPFs for analysis with Ethereal
- Connect to Windows 2003 Server using Remote Desktop (RDesktop) utility
- Install WinDump and WinPCAP on Windows 2003 Server
- Identify available network interfaces using WinDump
- Capture and log packets using WinDump
- Capture and log specific packets using BPFs with WinDump for analysis with Ethereal
- Upload captures to Linux system for analysis in Ethereal
- Snort® NIDS Packet Capturing & Logging
- Discuss Snort NIDS's features
- Confirm prerequisites - /PCRE|LibPCAP|GCC|Make/
- Download and Import Snort G/PGP key and MD5SUM for Snort NIDS
- Download, verify, compile and install Snort NIDS
- Discuss BPF directional, type, and protocol qualifiers
- Identify clear-text based network applications and define appropriate BPFs
- Execute Snort NIDS in sniffer mode with BPFs enabled to match interesting traffic
- Log to the active pseudo-terminal console and examine the packet flows
- Combine BPF qualifiers to increase packet-matching capabilities
- Use logical operators to define more flexible BPFs
- Create captures for further analysis with Ethereal
- Sun Snoop Packet Capturing & Logging
- Connect to Solaris 10 system and prepare to use Snoop
- Draw parallels to TCPDump
- Enumerate key features
- Sniff and log generic traffic
- Sniff and log specific traffic using filters
- Sniff using Snoop, HTTP and FTP traffic
- Save filters for analysis by Ethereal
- Snoop various Solaris interfaces for interesting traffic
- Layer-2 & Internet Control Messaging Protocol (ICMP) Captures
- Launch Ethereal
- Identify sniffing interfaces
- Capture Address Resolution Protocol (ARP) Packets using Capture Filters
- Discuss and Identify Protocol Data Units (PDUs)
- Identify default Ethereal capture file
- Peruse packet capture statistics
- Identify Cisco VOIP router generating ARP requests
- Peruse time precision features - deci - nano-seconds
- Discuss time manipulations - relative to first packet - actual time
- Reveal protocol information from layer-1 through 7
- Identify network broadcasts in the packet stream
- Generate Layer-2 ARP traffic using PING and capture and analyze results
- Sniff traffic based on MAC addresses using Ethereal and Capture FIlters
- User Datagram Protocol (UDP) Captures & Analyses
- Discuss UDP Characteristics
- Focus on Network Time Protocol (NTP)
- Setup NTP strata for testing between multiple systems
- Analyze NTP - UDP traffic using Ethereal
- Focus on Domain Name Service (DNS)
- Install a BIND DNS Caching-Only Server
- Analyze DIG queries
- Analyze 'nslookup' queries
- Transmission Control Protocol (TCP) Captures & Analyses
- Discuss TCP Characteristics - Connection-Oriented Services
- Explain TCP connection rules - Socket creation
- Sniff TCP traffic using Capture Filters in Ethereal
- Use Display Filters to parse TCP traffic
- Sniff FTP traffic
- Reconstruct FTP flows using TCP Stream Reassembly
- Differentiate between client and server flows
- Quantify client and server flows
- Discuss embedded Protocol Data Units (PDUs)
- Sniff Internet Protocol Version 6 (IPv6) traffic
- Peruse and discuss the IPv6:TCP:FTP traffic dump
- Analyze TCP Sockets
- Ethereal Display Filters - Post Processing Filters
- Identify previously captured - TCPDump - Ethereal - Snort - Snoop - Dumps
- Discuss features
- Explain Display Filter syntax
- Post-process previously captured traffic dumps
- Identify the various methods to exact display filters
- Filter data using the expression builder
- Filter traffic based on interesting properties
- Filter traffic using logical operators
- Ethereal Statistics
- Discuss features
- Explore the summary (metadata) of captured packets
- Peruse the protocol hierarchy - Layer's 1 - 7 of OSI
- Examine network conversations of captured packets
- Identify Destinations in packet dumps
- Examine ICMP statistics
- Text-based Captures with Tethereal
- Discuss features and applications
- Identify 'tethereal' and invoke
- Enumerate network interfaces
- Sniff generic network traffic
- Suppress capture output
- Apply Capture Filters
- Capture UDP Traffic
- Capture TCP Traffic
- Intranet-based Captures
& Analysis
- Discuss Intranet monitoring objectives
- Analyze the network topology drawing
- Discuss Unicast, Broadcast and Multicast traffic
- Discuss Switch Port Mirroring - SPAN
- Configure Port Mirroring - SPAN on Cisco Switch for interesting ports
- Dedicate a network interface for sniffing traffic
- Configure Snort NIDS to sniff traffic on dedicated network interface
- Analyze Snort NIDS captures in Ethereal
- Sniff traffic between various Intranet hosts
- Internet-based Captures & Analysis
- Discuss Internet monitoring objectives
- Identify key external interfaces to monitor
- Update the Port Mirroring configuration to capture Internet traffic
- Capture external traffic
- Analyze using Ethereal
- Wireless-based Captures & Analysis
- Discuss Wireless monitoring objectives
- Connect to remote system with wireless interface
- Enable wireless interface
- Sniff traffic on wireless network
- Analyze using Ethereal
- Windows-based Captures & Analysis
on Windows
- Download and Install Ethereal for Windows
- Explore interface
- Load previously captured data
- Analyze data
- Compare and contrast with Ethereal for Linux|Unix systems
- WireShark® on MacOSX®
- Download and Install
- Explore interface
- Load previously captured data
- Analyze data
- Capture new data
- Evaluate results
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5Sums Edition
Details
Release Info
Checksums ensure data-integrity, at-rest, cross-transit, and ultimately at-rest. Use them to verify Content as needed.Release Syllabus
Sums
- Various Tools
- Remote Confirmations
- File Metadata
- File Fragments
- Compress Content
- Archive Content
- DIR Hierarchy
- Password Sums
- Shared Secret
- Restrict History
- Downloaded Content
- Encrypt Content
- Site Credentials
- Site COOKIE
- Site COOKIE - Unique
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5Cent9x-Stream Edition
Details
Release Info
CentOS offers a visage into the world of Red Hat Enterprise Linux (RHEL). It is a fork. Unlike its Enterprise counterpart, there are fewer encumbrances, especially vis-à-vis the all-too-important frequently required software updates. Use CentOS to align your Applications and Services with RHEL.Release Syllabus
CentOS9x Stream Administration
- Initial Environment
- ls, pwd, cd, cp, mv, rm, mkdir, rmdir, whoami
- alias, cat, file, chmod, chown, history
- STD(IN|OUT), Pipes, Redirection, Command Chaining
- ps, df, top, free
- Pagers, W-Commands
- Checksums
- Awk | Sed | Grep Usage
- BASH SHELL Environment
- Compression | Archival Tools
- SSH Equivalence
- SHELL Quoting
- Propagate Environment
- Secure Clients
- Identify Standard File Types
- Standard File Permissions
- Symbolic Links
- Transfer Permissions
- Identify SWAP environment
- Provision dedicated SWAP partitions
- Add | Remove SWAP from pool as needed
- Provision File System-based SWAP
- SWAP Share
- SWAP Persistence
- Identify default storage configuration
- Provision new storage as needed
- XFS - File System
- XFS - Grow File System
- Identify LVM defaults
- Add new partitions to LVM management
- Allocate storage to LVM Volume Groups
- Create Logical Volumes (LVs) as needed
- Overlay File System and mount where applicables
- LVM - Resize
- LVM - Mixed FS
- LVM - SWAP
- Features
- Install
- Defaults
- General Usage
- Update Accounts
- Defaults
- Shared PASS Gen
- Unique PASS Gen
- Encrypted PASS Gen
- Update Accounts
- Groups
- Discuss features | limitations
- Identify default system-wide schedule
- Peruse various default Cron Jobs
- Schedule simple job and monitor recurrence
- Evaluate results
- Peruse Default CONF
- Discuss Syslog Rules
- Explore Log Rotate defaults
- Ensure rotated logs are compressed
- Extend default retention scheme
- Force Log Rotation as needed
- Explore Default environment
- Install PKGs
- Dump important metadata from packages
- Apply Updates
- Default CONF
- Add | Confirm IPs as needed
- Install
- Copy Configuration
- SELinux - Confirm
- TLS | SSL Services
- cURL Client Tests
- Virtual Hosts
- ENC Sites Only
- SFTP Only USER
- SFTP Only USER - NOLOGIN
- SFTP Only Group - Control
- NMap Intro
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5SysLogD Edition
Details
Release Info
Traditional visibility into daemon | service | program communications, activities, errors, etc., relies upon SysLOG. SysLog has migrated over the years towards JournalD via SystemD services, however, SysLOG remains intrical to many services within and without Nix Instances. In this edition, explore some of the key features of rSysLogD, the defacto SysLOG engine.Release Syllabus
SysLOG with rSysLogD
- Discuss Features
- Default Environment
- Kernel Firewall LOG
- Split LOGs by Priorities
- UDP | TCP Logging
- Dual L4 Logging
- Multiple Hosts
- Basic Queueing
- Reliable Event Logging Protocol (RELP)
- RELP - Remote Only
- RELP Only
- Traditional to RELP
- SysLOG Clear-Text - Confirm
- Property Filters
- Expression Filters
- Relay Chain
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5NFTables Edition
Details
Release Info
NFTables (nft) provides a streamlined packet classification environment.Release Syllabus
Netfilter Tables
- Features
- SSHGuard
- Ruleset Basics
- Persistence
- Sample Rules
- Inbound Filtering
- Dormant Table
- Manage Tables | Chains | Rules
- Counters
- Sets
- LOG Basics
- LOG with Sets
- Closed-Port LOGs
- LOG Options
- Re-Route LOGs
- Jump Targets
- Chain Jumping
- GoTo Chains
- Meta Selectors
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5Deb12x Edition
Details
Release Info
Among the longstanding and well-maintained Distros is Debian. Its 'apt' package management framework is legendary; as is its commitment to supply por gratis, recurring security updates over a long horizon. Indeed, this distinguishes Debian and its relatives as the leading Linux Distros available.Release Syllabus
Debian 12x Administration
- Features
- Download
- Graphical Install
- Text Install
- Post-Install Tweaks
- Explore usage of the following useful commands
- tty | /dev/pts | w | whoami | who
- set | env | export | unset
- cat | echo | touch | rm
- pwd | ls | cd | mkdir | alias | umask
- head | tail
- dd
- find
- history
- STDIN, STDOUT, STDERR, UNIX Pipes, Redirection, Command Chaining
- ps, df, free, top, dd
- stat, which, w, who
- tar | gzip | bzip2 | xz
- ZSH Setup
- Explore SSH defaults
- Use SSH to connect to targets
- Transfer data with: scp | sftp | rsync
- Explain common Linux file permissions
- chmod | chgrp | chown
- Discuss various Linux file attributes | features
- SETUID | SETGID | STICKY Bit
- SymLinks: Hard | Soft
- Features
- useradd | adduser | usermod | userdel
- groupadd | groupmod | groupdel
- Create $USERs in Parallel
- $USER Passwords | mkpasswd | python3
- Generate Random Passwords
- Store Randomly-generated Passwords for Reference
- Encrypted Pass - Unique Users
- Default SHELL
- NO TTY Access
- Disable SSH Access
- Features
- Installation Defaults: File System Table
- Provision Storage
- GPT Label | Create Partition(s) | File System | Mount | Persistence
- Duplicate Drives
- Duplicate Varied Sizes
- Online Resizing (Up-Sizing)
- Provision SWAP
- Logical Volume Management (LVM)
- LVM Features
- Allocate Storage to LVM
- LVM | VG Resizing
- Fix sudo PATH
- Point-Release Upgrade
- Cron Features
- Cron Job Execution
- Journal Control Features
- Booted Kernels
- SystemD Features
- Explore default APT configuration
- Identify commonly-used package management tools
- Enumerate installed packages
- Identify package owners based on system binaries
- Discuss 'apt' and 'dpkg' options
- Install | Remove various packages
- Network Tools | IP Configuration
- Examine default IP configuration
- Extend IP configuration to facilitate additional addresses
- Static IP Config
- Dual: Dynamic | Static Config
- Multiple Interfaces
- Dual Network Services
- Confirm communications
- Features
- Restrict $USER to SFTP Access
- Confirm limited $SHELL
- SFTP-Only Group
- SFTP-Only Password AUTH
- Identifiy key NMAP configuration files
- Identify commonly used NMAP options/switches/parameters
- Scan Server resource
- Perform default TCP Connect-based ethical scans of local and remote resources
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5PHP-One-Liners Edition
Details
Release Info
PHP is more commonly known as a CGI processor; for Web-Applications. Perhaps you could call it a Middle-Tier. However, PHP also offers simple, but powerful CLI processing for common needs often provided via a hodgepodge of well-known $SHELL utilities. Either way, PHP makes it facile to achieve accounting where necessary, and simply via One-Liners.Release Syllabus
PHP One-Liners
- General Usage
- Count Lines
- Word Count
- Count Chars
- Split Lines into ARRAY
- Count Instances of Fields
- Transform Delimiters
- Anonymize LOGs
- Extract Unique SRCs
- Lines by Error Code
- LOG By Code
- Summarize Error Codes
- Pre-Seed Error Codes
- Random Strings
- Varied Passwords
- Expose Undefined Passwords
- Outdated Passwords
- Hash | Un-Hash
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5GlusterFS Edition
Details
Release Info
GlusterFS provides simple, cost-effective, scalable and reliable network-distributed volume | disk aggregation services. Quickly and effectively allocate storage for your applications with GlusterFS.Release Syllabus
Cloud Storage with GlusterFS
- Discuss Features:
- Default Volume Type
- Common Volume Types
- Transport Types
- File System Support
- Storage Model
- Features
- Provision Storage
- Allocate GlusterFS Brick
- Persistence
- Generate IO
- Multiple File Systems
- Various Sizes
- Stop | Remove Volume
- Reconstitute Volume
- Server Mount
- Evaluate
- Features
- Provision Storage
- Partition | FS | Mount | Brick
- Extend Volume
- Monitor IO Distribution
- Shrink Volume
- Confirm Reallocation
- Remove Bricks
- Add | Replace Bricks
- Confirm Data Transfer
- UUID Mounts
- Migrate Mounts
- Features
- Probe Storage Instances
- Provision Storage
- Extend Shared Volume
- Mount any Server
- List Storage Spread
- Dismantle Volume
- Confirm Data-Availability
- Volume Reconstruction
- Features
- Existing Bricks
- Re-Use Allocated Storage
- Define New Bricks
- Create Volume
- Generate | Monitor IO
- Fail NODEs
- Evaluate
- Features
- Explore Environment
- Create New Replica Volume
- Mount on Web Servers
- Ensure Persistence
- Update NginX Web Server Config
- Fetch Content
- Down Storage NODE | Test
- Restore NODE | Confirm Content
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5OpenPGPII Edition
Details
Release Info
GPG - OpenPGP - Provides a standard PKI Framework, supporting common Algorithms, for securing your data at-rest and in-transit.Release Syllabus
OpenPGP with GPG
- Discuss Features:
- Primary Tool
- Private | Public Keys
- Public Key Cryptography Standards (PKCS)
- Encryption | Decryption
- Signing | Verification
- Features
- General Usage
- Create Content
- Encrypt
- PassPhrase Protect
- Binary | Text Encryption
- Share
- Decrypt
- Features
- Vary Algos
- Compare Results
- Caveats
- Random PassPhrases
- Store PassPhrases
- Encrypt | Decrypt | Confirm
- Use Case
- Generate Keypairs
- Export | Import
- Share
- Sign
- URI Import
- Features
- Identify Public Keys
- Encrypt to Recipients
- Vary Key Identifcation
- Share Content
- Confirm Decryption
- Confirm Invalid Recipient
- Features
- Encryption | Decryption Distinction
- Sign | Share Content
- Confirm Signatures
- Missing Public Key
- Sign | Encrypt | Decrypt | Verify
- Encrypt | Sign | Verify | Decrypt
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5SSL-TLS Edition
Details
Release Info
Transport Layer Security (TLS) provides standards-based asymmetric and symmetric cryptographic solutions for your application needs.Release Syllabus
SSL-TLS with OpenSSL
- Discuss Features:
- Primary Tool
- Private | Public Keys
- Certificate Signing Requests (CSRs)
- Self-Signed Certificates
- Public Key Cryptography Standards (PKCS)
- Encryption | Decryption
- Random String Generation
- Message Digests
- SSL-TLS Client
- Features
- General Usage
- Retrieve Site Certificates
- Determine OCSP Configuration
- Probe supported TLS Versions
- Extract Certificate for local usage
- Retrieve Certificate with NMap
- Retrieve Certificate Chain
- Fetch Certificate
- x509 Query Fields
- Fingerprints
- One-Liner
- Export Public Key from Certificate
- Dump Public Key
- Generate Random Bytes
- Yield various Formats
- Create Random Files on Target
- Define Random $USERs
- Track defined $USERs
- Features
- Generate Digests
- Install SHA3-SUM
- Vary Content
- Compare Digests
- Remote Digests
- Store Digests
- Features
- Common Algorithms
- Generate Multiple Private Keys
- Export Public Keys
- Confirm Keys
- Remove and Re-Export Public Keys
- Generate Non-Default RSA Keys
- Password-Protected Keys
- Share PRIV_KEY and Confirm
- Features
- Base64 Encode | Decode
- AES-256 Encryption | Decryption
- Base64 Representation
- Decode | Decrypt
- Deterministic Examples
- Asymmetric Encrypts | Decrypts
- Features
- "pkeyutl" Sub-Command
- RSA Signatures
- ED(448|25519) Signatures
- RSA-PSS Signatures
- Eliptical Curve Signatures
- "-rawin" effect
- Encrypt | Sign | Verify | Decrypt
- Sign | Encrypt | Decrypt | Verify
- Discuss
- Generate Private Keys
- Generate Correlating CSRs
- Confirm Keys | CSRs
- Self-Signed Certificates
- Generate
- CA Store
- Root CA
- Various ALGOs
- Internal Domain
- SYMLINK Keys
- Password-Protected PRIV_KEY
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5$SHELL-Vars Edition
Details
Release Info
The $SHELL (all incarnations), provide a plethora of useful mechanisms that facilitate smoother and more automated operations. Core to reduced computing friction is $SHELL-Mastery.Release Syllabus
SHELL Variables
- Discuss Features
- Terminal (TTY)
- CLI Arguments
- Process ID
- Backgrounded
- SHELL Local
- Environment
- Persistence
- Aliases
- Command Substitution
- Increment | Decrement
- Dynamism