Online Tutorials
USENIX is pleased
to announce the second installment of our online tutorial pilot program. Based
on the positive response to our first online tutorial offering, we are launching
this second phase of the pilot program to test the viability of offering our
outstanding tutorials, live over the Web, on a regular basis.
This second installment allows you to participate in complete, full-day
tutorials which, up to now, have only been offered at USENIX conferences. Each
course is designed to last two hours a week for three successive weeks.
Space is limited, so we encourage you to register as
soon as possible.
Please read What You Need To Participate before registering.
Online Registration Form
Table of Contents
P1: Network Security Profiles - Brad Johnson
P3: Syslogs and Network Security -Tina Bird
How To Register
What You Need To Participate
A Note on the Centra Technology Used for the Pilots
Course P1
Network Security Profiles: A Collection (Hodgepodge) of Stuff Hackers Know About You
Brad Johnson, SystemExperts Corporation
Tuesdays, February 26, March 5, and March 12
11am Eastern, 8am Pacific
Who should attend: Network, system, and firewall administrators; security auditors and those who are audited; people involved with responding to intrusions or responsible for network-based applications or systems that might be targets for crackers (determined intruders). Participants should understand the basics of TCP/IP networking. Examples will use actual tools and will also include small amounts of HTML, JavaScript, and Tcl.
Course Description: Network-based host intrusions, whether they come from the Internet, an extranet, or an intranet, typically follow a common methodology: reconnaissance, vulnerability research, and exploitation. This tutorial will review the ways crackers perform these activities, what protocols and tools they use, and a number of current methods and exploits. You'll learn how to generate vulnerability profiles of your systems. Additionally, we'll review some important management policies and issues.
We'll focus primarily on tools that exploit many of the common TCP/IP-
based protocols that underlie virtually all Internet applications, including Web technologies, network management, and remote file systems. Some topics will be addressed at a detailed technical level. We'll concentrate on examples drawn from public-domain tools that are widely available and commonly used by crackers.
Topics include:
- Profiles: what can an intruder determine about your site remotely?
- Review of profiling methodologies: different "viewpoints" generate different types of profiling information
- Techniques: scanning, online research, TCP/IP protocol "mis"uses, denial of service, cracking clubs
- Important intrusion areas: discovery techniques, SSL, SNMP, WWW, DNS
- Tools: scotty, strobe, netcat, SATAN, SAINT, ISS, mscan, sscan, queso, curl, Nmap, SSLeay/upget
- Defining management policies to minimize intrusion risk
Topics not covered:
- Social engineering
- Buffer overflow exploits
- Browser (frame) exploits
- Shell privilege escalation
Course P3
Finding the Forest From The Trees: What System Logs tell you about Your Network Security
Taught By Tina Bird, Counterpane Internet Security
Thursdays, February 28, March 7, and March 14
2pm Eastern, 11am Pacific
Who should attend: The class is designed for the sys admin who has lots and lots of audit data from their network but isn't sure how to interpret it. It is also for System administrators and network managers responsible for monitoring and maintaining the health and well being of computers and network devices in an enterprise environment. Participants should be familiar with the UNIX operating system and basic network security, although some review is provided.
Course Description: The purpose of this tutorial is to illustrate the importance of a network-wide centralized logging infrastructure, to introduce several approaches to monitoring audit logs, and to explain the types of information and forensics that can be obtained with well-managed logging systems. Every device on your network--routers, servers, firewalls, and application software--spits out millions of lines of audit information each day. Hidden within the data that indicates normal day-to-day operation (and known problems) are the first clues that an attacker is starting to probe and penetrate your network. If you can sift through the audit data and find those clues, you can learn a lot about your present state of security and maybe even catch attackers in the act.
During this session Tina will present attack signatures from host operating systems (UNIX and Windows), applications, and intrusion detection systems to help provide
guidance in reading and interpreting log data, These signatures are taken from a variety of sources, including systems compromised in the last several waves of Internet
activity: We'll also cover system events that may indicate hostile activity, and what sort of log data they do (or don't) produce.
Students are expected to be familiar with UNIX syslog and
Windows Event Log data formats.
Topics include:
- The extent of the audit problem: how much data are you generating every day, and how useful is it?
- Logfile content
- Logfile generation: syslog and its relatives
- Log management: centralization, parsing, and storage
- Log analysis: methods for reconstruction of an attack
- Kinds of data in syslog (with samples):
- Normal status messages
- Software misconfigurations
- Hardware errors
- Attack signatures
- Network systems, and the kinds of data they produce:
- Operating systems and applications
- Firewalls, VPN servers, authentication systems
- Alarms: network IDS, host-based IDS
- Signatures of common attacks
- IIS/sadmind
- Other buffer overflows (with obvious signature)
- telnetd buffer with ambiguous signature
- Multi-line signatures
- [If there's time, which seems unlikely] How to Find These
swatch
This class won't teach you how to write Perl scripts to simplify your logfiles. It will teach you how to build a log management infrastructure, how to figure out what your log data means, and what in the world you do with it once you've acquired it.
Instructor Bio
Tina Bird is a Network Security Architect at Counterpane Internet Security, which provides a commercial log monitoring service. She has implemented and managed a variety of wide-area-network security technologies, such as firewalls, VPN packages and authentication systems; and developed, implemented and enforced corporate IS security policies in a variety of environments.
Tina is moderator of the Virtual Private Networks mailing list and the owner of "VPN Resources on the World Wide Web," A highly regarded vendor neutral source of information about VPN technology. Tina has a BS in Physics from Notre Dame and an MS and PhD in Astrophysics
HOW TO REGISTER
Please use our online registration form. You must pay by credit card
(Visa, Mastercard, American Express, or Discover).
Fee per tutorial: $395
If you register on or before February 8, 2002, you save $50 off the above rate.
Cancellation Policy
The fee is fully refundable if cancellation notice is received in writing ten business days before the start of the tutorial.
USENIX Association
Online Tutorial Registration
2560 Ninth Street, Ste 215
Berkeley, CA 94710
Phone 510-528-8649
Fax 510-548-5738
WHAT YOU NEED TO PARTICIPATE
To participate in these tutorials you will need a PC running Windows. It is also
suggested that you use a monaural headset to be able to listen and participate
in class discussions. Headsets are inexpensive and can be purchased at your local electronics store.
Centra requires two ports in order to function properly: Ports 80 and 1709.
Port 80 is needed for the front end portion (login, registration, etc.). Port 1709 uses Centra's proprietary protocol, delivered via
TCP. This is a registered port to Centra. For those behind a firewall
or proxy, only 1709 outbound needs to be open.
To insure your firewalls or other things will not prevent you from participating in the class
you can check the following way:
- Connect to the URL
https://209.202.130.210/usenix/index.jhtml
- Click the System Check
link on the upper right corner of the page.
- The System Check tests your Web browser, network connection, and audio
settings.
A NOTE ON THE CENTRA TECHNOLOGY USED FOR THE PILOTS
This is a pilot program to test the viability of running interactive online tutorials. We are using Centra Software Virtual Classroom Technology to deliver the pilots. It is a technology that requires a PC running Windows.
We are continuing to look for an interactive classroom application that will
run on a browser or under UNIX or another open systems platform. Unfortunately, the interactive virtual classroom programs currently
commercially available with the reliability necessary to run a seamless
classroom environment all require Windows. There are conference
programs that run on a browser, but they lack the interactive elements and most
require multiple phone lines.
This said, USENIX recognizes what a sensitive area this is for our
community. If USENIX implements a program like
this in the future, we will try to accommodate those who run UNIX only with
programs that are designed to be delivered for them.
|