Monday Week 1
Monday Week 1
Security Concepts
Security Operations Course
Meet the Trainer:
Niall Joseph
• Started through an IT Apprenticeship.
• 3 – 4 years working as a Service Desk Analyst.
• Developed an Interest in InfoSec & began self-study.
• Worked as a Security Operations Engineer at Accumuli Security.
• Incident Response Team Leader (Accumuli was also acquired by NCC Group for 24/7 SOC capabilities)
• Was asked to provide SME for new Network Threat Management Offering, Threat Hunting, etc.
• Developed the offering, delivered to new customers, mentored juniors.
• Left NCC, began working internally with businesses to provide InfoSec.
• Worked in InfoSec in the food manufacturing business.
• Worked in InfoSec in Online Gambling.
• Academy Trainer.
Security Operations Course
Introductions
1. Course Introduction
1. Subject (Arial 20)
4. Accountability
5. Kali Linux
Module 4 FirstModule
Assessment
5
Titleand Procedures
Tactics, Techniques WeekTitle
1 Exam
Module 8
4 FinalModule
Assessment
5
SecurityTitle
Operations WeekTitle
2 Exam
2. 2Introduction
. Subject – onlyto Security
capitalise the Concepts
first word
4. Accountability
5. Kali Linux
• Legality
Introduction to Information Security
Threat Actors
Insiders
Compromised
Phishing Unpatched Software
Credentials
Missing
Patches
Prevention
Response
Introduction to Information Security
Security Controls
Introduction to Information Security
Defence in depth – Layered Security
Keep
Inner Wall
Outer Wall
Moat
Introduction to Security Concepts
Usability Triangle
Functionality
Security Usability
Introduction to Security Concepts
What we’ve covered so far
• Threat Vectors
4. Accountability
5. Kali Linux
Confidentiality
Integrity Availability
Introduction to Information Security
Confidentiality
- Discretionary
- Role-based
Introduction to Information Security
Confidentiality - Permissions - Discretionary Access Control
• DAC properties:
- Decentralized access
- Auditing
- Plaintext
- Ciphertext
- Encryption
- Decryption
- Substitution - Entropy
- Permutation - Confusion
- Key - Diffusion
- Nonrepudiation - Redundancy
- Hashing
Introduction to Information Security
Confidentiality – Symmetric Encryption
• Symmetric encryption uses the same key to encrypt and decrypt data
Hello
Encryption Decryption
Function A$y9Lo-* Hello
Function
User A User B
Introduction to Information Security
Confidentiality – Symmetric Encryption Algorithms
Name Type Block size (bits) Key size (bits)
DES Block 64 56
Hello
User A
User B
Encryption Decryption
A$y9Lo-* Hello
Private Function Function Private
Key - A Key B
Public Public
Key - A Key - B
Introduction to Information Security
Confidentiality – Asymmetric Encryption Algorithms
• Diffie-Hellman
• Diffie-Hellman Ephemeral
• RSA
• DSA
• PGP
Introduction to Information Security
Confidentiality – Asymmetric Encryption - PKI
• If you receive a public key, how can you be sure that it is in fact the intended public key –
How do you know it is FDM Groups Public key? How do you know it is Niall Joseph’s Public
key? How can we trust this?
• This is where Public Key Infrastructure comes in, based on the practical implementation of
keys, PKI enables Confidentiality, Integrity, Nonrepudiation and Authenticity.
• PKI enables trust, so we can be sure that the website we are navigating to in our web
browser, is actually the website we intended to go to.
Introduction to Information Security
Confidentiality – PKI
CRL
Website
VA User
RA CA Validation copy
Approve
Certification
Website
Website
Bind certificate to website
Owner
Introduction to Information Security
Confidentiality – Symmetric vs Asymmetric Encryption
• RSA, Diffie-Hellman and its derivatives, like the elliptic curve versions DHEC and ECDHE,
can be used for key generation and key exchange.
• TLS handshake is an extension of the 3-way handshake and incorporates encryption and
session establishment between a client and server.
Introduction to Information Security
Confidentiality – Hybrid Cryptography
Symmetric Private
Shared Key B
Private
Secret
Key - A
Symmetric
Encryption Decryption Shared
User A A$y9Lo-*
Function Function Secret
Public User B
Public
Key - A
Key - B
Decryption Encryption
Message Yn8$vs; Message
Function Function
User A User B
Symmetric shared secret
Introduction to Information Security
Confidentiality – Steganography
• Distinct from cryptography.
• Used to hide information in seemingly normal documents, images, audio or video files.
• Oftentimes threat actors can use steganography to covertly exfiltrate data from secure
networks
Lab Exercise
Confidentiality lab
Spammimic
Steganography example
Questions:
• As well as being used to verify the integrity of a file, hashing is also used to store passwords
without keeping them in plaintext, demonstrating the benefits from a confidentiality
standpoint.
Introduction to Information Security
Integrity – Digital Signatures - Sending
01101001001 10011100100
Hash function Hash Encrypt Hash Encrypted Hash Signature
using Private Key
Data
Send to recipient
Signature Certificate Data
Digitally
Signed
data
Introduction to Information Security
Integrity – Digital Signatures - Receiving
10011100100 01101001001
Decrypt using Hash
Signature
Public Key
Digitally
Received message Signed
data 01101001001
Hash function Hash
Data
Lab Exercise
Hashing
Linux hash
Let’s create our own hashes from data
Questions:
1. What do you notice about the hash once altering a single character?
• Natural Disasters
• Hardware Faults
• HVAC Malfunctions
Introduction to Information Security
What we’ve covered so far
• What is InfoSec / CyberSec • Symmetric Cryptography
4. Accountability
4. Subject
5. Kali Linux
• Application logging
• Audit files
• Log files
Accountability
Threats to Accountability
• Clearing tracks
• Wiping disks
Accountability
What we’ve covered so far
• Logging
• Auditing
• Firewalls
• Proxy servers
• Digital Signatures
• Clearing tracks
• Wiping data
Accountability
Pop Quiz
2.What helps administrators hold users accountable for their actions on applications?
3.What logs help us identify traffic coming in and out of our network?
4. Accountability
5. 5.
Kali Linux
Subject
• These 5 machines will be used at varying times to complete labs during the course.
• 9 hours maximum runtime per day – please shut them down after you’re done!
• Kali Linux
• Metasploitable
• Sophos UTM
• Win7
• EPIROSH
Kali Linux
What is Kali Linux?
• It is free.
• Completely Customizable.
• Multilingual Support.
Explore Kali
Look around on Kali
There should be a lot of interesting tools for you to take a look at…
Lab Exercise
Presentation
Kali’s Tools
Pick 1 tool in Kali Linux
Remember that Kali Linux is not made to be a tool for threat actors…
It’s there to educate and try to level the playing field for defenders~
Kali Linux
Pop Quiz
4. Accountability
5. Kali Linux
Ethernet, Switch,
Do 2 Data Link
MAC
Coax, Fibre,
Please 1 Physical
Wireless, Hubs
Network Fundamentals
Coax, Fiber, Twisted
OSI Model – Layer 1 1 Physical
Pair, Wireless, Hubs
Shielding Cladding
Insulating Jacket
Network Fundamentals
Coax, Fiber, Twisted
OSI Model – Layer 1 1 Physical
Pair, Wireless, Hubs
• Using different types of encoding, all data can be converted to binary, below we
can see a table illustrating how to convert the decimal number thirteen to binary.
8 7 6 5 4 3 2 1
Bit position
Binary 27 26 24 23 22 21 20
Power 25
Decimal 128 64 32 16 8 4 2
Value 1
Bit: 1 or 0? 0 0 0 0 1 1 0 1
Network Fundamentals
OSI Model – Layer 2 2 Data Link NIC’s, Switches, ARP
ARP Request
Source MAC: A4:1F:72:12:34:56
Source IP: 192.168.0.1
Destination MAC: FF:FF:FF:FF:FF:FF
Destination IP: 192.168.0.2
PC 1 PC 2
MAC: A4:1F:72:12:34:56 MAC: A4:1F:72:43:76:67
IP: 192.168.0.1 IP: 192.168.0.2
Network Router
• Layer three of the OSI model is primarily concerned with
addressing things at a global scale with IPv4/IPv6 addressing,
determining the path between a source and destination IP address
using protocols like OSPF, and routing the data packets accordingly.
Routing Table
Loopback 127.0.0.0 -
Private address ranges
127.255.255.255
Class Private Address Range
B 255.255.0.0 65000 16000 128.0.0.0 - 191.255.255.2
55 A 10.0.0.0 to 10.255.255.255
C 255.255.255.0 254 2 Million 192.0.0.0 B 172.16.0.0 to 172.31.255.255
- 233.255.255.255 C 192.168.0.0 to 192.168.255.255
D Reserved for multicast groups 224.0.0.0 -
239.255.255.255
E Reserved for future use, or research 240.0.0.0
and Development purposes - 254.255.255.255
Network Fundamentals
OSI Model – Layer 3 - Network Address Translation (NAT)
10.0.0.254 104.20.181.25
• The two main protocols you will encounter at this layer are the
Transmission Control Protocol (TCP) and the User Datagram
Protocol (UDP).
Network Fundamentals
OSI Model – Layer 4 – Transmission Control Protocol
Client Server
• The transmission control protocol is concerned with providing
SYN
reliable, ordered, and error checked delivery of data, between
applications on hosts connected to an IP network. Details of how SYN/ACK
this is done can be found in RFC 9293. Whilst not an exhaustive list,
some Important fields in a TCP header are below: ACK
Protocol Path
https://careers.fdmgroup.com/vacancies/113/uk--returners-programme.html
Domain File
Network Fundamentals
OSI Model – Layer 7 – HTTP Requests
• We can see an example of a HTTP request above, HTTP uses request methods in order to interact with
web servers and perform specific actions, there are 8 request methods, but the most common are GET
and POST.
Request Method Description
GET Requests a representation of a specific resource.
POST Submits an entity to the specified resource.
HEAD Requests a resource, without the response body (Just the HTTP headers)
TRACE Performs a loopback test along the path to a resource
PUT Replaces a resource with the content in the request body
DELETE Deletes a resource
CONNECT Creates a tunnel to the server specified by specified resource
PATCH Applies partial modifications to a resource
OPTIONS Describes the communication options for a specified resource
Network Fundamentals
OSI Model – Layer 7 – HTTP Responses
• HTTP Responses contain the resources that we’ve just requested by sending a request to a specific URL,
more often than not this response contains some HTML, CSS sheets, client-side script and more.
• HTTP Uses response codes to indicate the type of response that’s being sent, we can see some ranges of
HTTP response codes below:
7
1 8
5
TLD
Server
4
User
2
Recursive
Server Authoritative
Server
6
Network Fundamentals
Other Protocols – DNS
Record Type Description
A Maps domain names to IPv4 addresses
NS Provides a list of the authoritative name servers responsible for the domain
MX Provides the domain names of mail servers that receive emails on behalf of a domain
SOA Provides important details about a DNS zone; required for every DNS zone
• DHCP is the dynamic host configuration protocol and is used to automatically assign IP addresses to
hosts as they join a network.
Client Server
Discover
Offer
Request
Acknowledge
Network Fundamentals
Other Protocols – SMTP, POP3 & IMAP
• The protocols on this slide are all mail protocols, SMTP – The simple mail transfer protocol is used to
transfer emails from one mail server to another.
• POP3 is the post office protocol, and IMAP is the Internet message access protocol, both of which are
concerned with fetching mail from a mail server to an email client (Mail Transfer Agent).
INTERNET
• It is the protocol that supports network troubleshooting tools like PING and Traceroute.
Network Fundamentals
What we’ve covered so far
• OSI Layer 3 – Router’s, IP, OSPF, NAT • Mail Protocols – POP3, IMAP, SMTP
• OSI Layer 5
• OSI Layer 6
Network Devices and Security Features
What we’ve covered so far
• Firewalls
• Forward Proxy
• Reverse Proxy
• NIDS/NIPS
OSI Model and Networking Concepts
Pop Quiz
3. Name the two most common protocols that run at layer 4 of the OSI model
and