3 Day (Wednesday - Friday)
Instructor : Ryan & Desiree Lindfield
Instructor Bio:
Ryan Lindfield has been working with network security for over 2 decades. He holds dozens of certifications and loves sharing his knowledge of offensive and defensive networking. Ryan has served as a consultant, instructor, author, and technical editor for Cisco, HP, VCE, and other vendors, providing training to civilians and military.
Desiree Lindfield has delivered technical training for network and data center technologies to customers around the globe. In addition to training, Desiree serves on a team of consultants providing design, installation, and troubleshooting services. Recent implementations include Nexus 7000 switches and Cisco's Unified Computing System. Desiree is a regular attendee of Cisco Live, B-Sides, and Defcon annual conferences.
Course Description:
Exploitation of network infrastructure is the holy grail of hacking, as data-in-motion is a helpless passenger of the underlying protocols.
The modern computer was designed for warfare, we’ve seen rapid innovation of offensive and defensive capabilities, and it's accelerating. Like any participant in conflict, natural or artificial, a single unit has limitations and gains strength by leveraging peers. After thousands of years of conflict, the old saying remains true “strength in numbers”. People and computers are both dependent upon network communication, especially in times of conflict. Whether it’s a coordinated attack, distributed resources, or centralized data analytics. The disruption of infrastructure can render the actors in any theater inoperable, as the command and control cannot communicate it’s will, nor receive feedback from agents or sensors.
Networks remain the soft underbelly of this technical revolution, from transportation, to banking, data centers, to desktops, to smartphones. Regardless of capacity, none of this stuff is much use without a network. We’ll review the foundations of networking, and then proceed with attacking once we've built a solid foundation. With this refreshed understanding of networking, we’ll take a deeper look into how the mechanisms can be exploited in most networks globally. We’ll learn how carefully swapping a specific 1 or 0 in a data stream, can redirect the information to the location of our choosing. Finally, we'll look at countermeasures that can implemented for defense.
Exploitation techniques against standards-based protocols ensure that these attacks are effective against all operating systems and vendors.
Attendees will learn to hijack the control flow of data, allowing them to inspect, modify and disrupt the transmissions of others. We’ll begin with simple attacks will have local effects and escalate complex yet practical techniques that could have global significance.
We will illustrate differences in TCP/ UDP, ICMP, IPSec, GRE and OSPF, compare nuances of IPv4 and IPv6, then go deeper into concepts ARP, VLANs, Trunking, Spanning Tree, 802.1q tagging, DHCP, and finally the signal of 1's and 0's itself.
Network Technologies:
DNS / TCP / UDP/ OSPF/ GRE / DHCP / IPv6 / IPv4 / 802.1Q / ARP / Switching / Routing and more.
Network Exploitation Techniques:
Rogue DHCP, Rogue DNS, Root Bridge hijacking , Route poisoning, ARP poisoning, VTP poisoning, MAC flooding, MAC Spoofing, HSRP Hijacking, Rogue IPv6, Rogue Wireless and more.
Class will consist of lecture, labs, packet captures, and prizes.
Requirements:
Laptop required.