Internet Security: A Hands-On Approach

Posted By: ELK1nG

Internet Security: A Hands-On Approach
Last updated 6/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 17.14 GB | Duration: 19h 26m

Network security, attacks on ARP, TCP/IP, DNS, & BGP protocols; Sniffing/Spoofing; Firewall; VPN; How the Internet works

What you'll learn

Study classic network attacks and gain in-depth understandings of their technical details

Study how the Internet and the TCP/IP protocols work

Understand the security problems in the design and implementation of the TCP/IP protocols

Master the fundamental attack (ethical hacking) and defense skills in network security

Gain hands-on experiences through 11 labs (SEED Labs) developed by the instructor

Implement Firewall, VPN, sniffer, spoofing, and various network security tools using C or Python

Requirements

Have basic programming background

Understand basic operating system concepts, such as process, memory, kernel etc.

Description

From Morris worm to Mitnick attack; from Mafia boy to Kaminsky attack; from Pakistan's hijacking of YouTube to Syria's shutting down of its own Internet. These are so many attacks on the Internet. If you want to learn how the Internet works, how it can be attached, and more importantly, how you can defend against these attacks, then this course is for you.In this course, we systematically study each layer of the TCP/IP protocols, discuss the vulnerabilities in its design and implementation, and demonstrate how to exploit the vulnerabilities in attacks. Many classic attacks are covered in this course, with great technical details. The course won't just teach you the high-level concepts and theories; it would dive into the low-level technical details and fundamentals, so you can fully understand how exactly things work.The course emphasizes hands-on learning. For each attack covered, students not only learn how the attack works in theory, they also learn how to actually conduct the attack, in a contained virtual machine environment. The hands-on exercises developed by the instructor are called SEED labs, and they are being used by over 1000 institutes worldwide. The course is based on the textbook written by the instructor. The book, titled "Computer & Internet Security: A Hands-on Approach, 2nd Edition", has been adopted by over 210 universities and colleges worldwide.

Overview

Section 1: Course Overview, Lab Setup, and Network Basics

Lecture 1 Course Overview (Part I)

Lecture 2 Course Overview (Part II)

Lecture 3 Lab Exercises and Setup

Lecture 4 Network Basics: IP Addresses

Lecture 5 NAT and Summary

Section 2: Packet Sniffing and Spoofing

Lecture 6 Introduction

Lecture 7 Socket Programming and Sending Packets

Lecture 8 Receiving Packets

Lecture 9 Packet Sniffing

Lecture 10 Sniffing Using PCAP

Lecture 11 Sniffing Using Scapy

Lecture 12 Packet Spoofing

Lecture 13 Packet Spoofing Using Scapy

Lecture 14 Scapy v.s. C

Lecture 15 Byte Order

Lecture 16 Summary and Lab Exercise

Lecture 17 Lab Exercise

Section 3: The MAC Layer and Attacks

Lecture 18 Introduction

Lecture 19 The MAC Layer

Lecture 20 The ARP Protocol

Lecture 21 ARP Cache Poisoning Attacks

Lecture 22 Man-In-The-Middle Attacks Using ARP Cache Poisoning

Lecture 23 MITM Attack Demo

Lecture 24 Question, Countermeasure, and Summary

Lecture 25 Lab Exercise

Section 4: Network Layer: IP, ICMP and Attacks

Lecture 26 Introduction

Lecture 27 The IP Protocol

Lecture 28 IP Fragmentation

Lecture 29 Problem: Attacks Using IP Fragmentation

Lecture 30 Solution: Attacks Using IP Fragmentation

Lecture 31 Routing

Lecture 32 Spoofing Prevention on Routers

Lecture 33 The ICMP Protocol

Lecture 34 ICMP Redirect Attack

Lecture 35 Smurf Attack and Other ICMP Attacks

Lecture 36 Summary

Lecture 37 Lab Exercise

Section 5: The UDP Protocol and Attacks

Lecture 38 Introduction

Lecture 39 Transport Layer

Lecture 40 The UDP Protocol

Lecture 41 UDP Attacks

Lecture 42 Summary

Section 6: The TCP Protocol and Attacks

Lecture 43 Introduction

Lecture 44 TCP Overview

Lecture 45 Send and Receive Buffers

Lecture 46 Sequence Number, Flow and Congestion Control

Lecture 47 SYN Flooding Attack

Lecture 48 TCP Reset Attack

Lecture 49 TCP Session Hijacking

Lecture 50 How Reverse Shell Works

Lecture 51 Redirecting IO to TCP Connection

Lecture 52 Creating Reverse Shell

Lecture 53 The Mitnick Attack

Lecture 54 The Mitnick Attack Demo

Lecture 55 Countermeasures and Summary

Lecture 56 Lab Exercise

Section 7: DNS and Attacks

Lecture 57 Introduction

Lecture 58 DNS Zone Hirarchy

Lecture 59 The DNS Query Process

Lecture 60 DNS Root Servers

Lecture 61 Experiment Setup

Lecture 62 Constructing DNS Packets

Lecture 63 Overview of the Attack Surface

Lecture 64 Local Cache Poisoning Attack

Lecture 65 The Kaminsky Attack

Lecture 66 Demo of the Kaminsky Attack

Lecture 67 Fake Response Attack

Lecture 68 DNS Rebinding Attack

Lecture 69 Reverse DNS Lookup and Attacks

Lecture 70 Denial of Service Attacks on DNS

Lecture 71 Summary

Lecture 72 Lab Exercises

Section 8: Virtual Private Network

Lecture 73 Introduction

Lecture 74 Why VPN, an Analogy, and Tunelling

Lecture 75 IP Tunneling

Lecture 76 TUN/TAP Virtual Interface

Lecture 77 Create TUN/TAP Interface (Part 1)

Lecture 78 Create TUN/TAP Interface (Part 2)

Lecture 79 Going to Private Network

Lecture 80 At the VPN Server

Lecture 81 How Packets Return

Lecture 82 Review of How VPN Works

Lecture 83 A Case Study

Lecture 84 Bypassing Firewall Using VPN

Lecture 85 Summary and Lab Exercises

Lecture 86 Lab Exercise

Section 9: Firewall

Lecture 87 Introduction

Lecture 88 Netfilter

Lecture 89 Build a simple firewall

Lecture 90 Linux Firewall iptables

Lecture 91 Use iptables to Build Source NAT

Lecture 92 Use iptables to Build Destination NAT

Lecture 93 Using iptables' Match and Target Extensions

Lecture 94 Stateful Firewall and Connection Tracking

Lecture 95 Bypassing Firewalls Using SSH and VPN Tunnels

Lecture 96 Summary and Lab Exercise

Lecture 97 Lab Exercise

Section 10: BGP and Attacks

Lecture 98 Introduction

Lecture 99 High-Level Picture

Lecture 100 Autonomous Systems and Peering

Lecture 101 How BGP Works

Lecture 102 Path Selection

Lecture 103 IBGP and IGP

Lecture 104 Overlapping Routes

Lecture 105 IP Anycast

Lecture 106 BGP Tools and Utilities

Lecture 107 BGP Attacks

Lecture 108 Case Studies of BGP Attacks

Lecture 109 Summary

Lecture 110 Lab Exercise (New)

Section 11: Heartbleed Attack

Lecture 111 Introduction and the Heartbeat Protocol

Lecture 112 How the Attack Works

Lecture 113 Lab Exercise

Anybody who is interested in ethical hacking,Anybody who is interested in learning how the Internet works,Anybody who is interested in learning how the Internet can be attacked,Students who are interested in learning the theories and practices in the field of network security,Graduate and upper-division undergraduate students in computer science, computer engineering, and IT-related fields