Table of Contents

Cover

Title page

Copyright

Dedication

Chapter 1: Introduction to practical security and performance testing

Abstract

A Baseline Understanding of Security Concepts

Volumetric Attacks and Attack Frequency Across the Internet

Security Network Elements

A Baseline Understanding of Network Performance Concepts

Network Events that can Effect Hard and Soft Errors for Flows

Summary—Before We Start to Harden the Network

Chapter 2: Getting organized with initial audit of the network

Abstract

Goals and Objectives of this Chapter: Positive Identification of Valid Assets

Auditing Host Assets

Installing an NMS: SpiceWorks

Performing Audit of Server Assets

Documenting Network Element Objects

Documenting Topology Zone Assets

Documenting Information Assets

Adding the Network to the NMS

Chapter Summary

Chapter 3: Locking down the infrastructure: Internet, Wi-Fi, wired, VPN, WAN, and the core

Abstract

Locking Down and Optimizing the Core Network

Implementing 802.1x MAC Authentication

Optimizing Performance of the Network Edge and Core

Locking Down and Optimizing the WAN

Summary Putting Optimization and Security Together

Locking Down and Optimizing Organizational Wi-Fi Access

Optimizing Your External Firewall and Internet Connection

Summarizing Infrastructure Security

Chapter 4: Locking down and optimizing the windows client

Abstract

Keeping Windows Patched

Defining Approved Software

Setting User Rights Correctly and Locking Down Install Rights

The Importance of Windows UAC

Hardening Windows Networking

Local Firewalling and Mitigation

Hardening the Browser

Optimizing Windows Client Performance

Installing Windows and Component Software

Chapter 5: Server patterns

Abstract

Better Use of Your Hardware and Infrastructure

Server Clusters Are Software Defined

Virtualized Servers Has Elastic Performance

Virtualization Provides the Best Solution for Disaster Recover

More Intelligent Use of Storage

Some Recommendations and Caveats Regarding Virtualization

Securing the Hypervisor Host

NFV Server Chain Case studies

Hardening SSL

Self-Hosted Cloud File Storage

Chapter 6: Testing for security flaws using penetration testing

Abstract

Data Theft for Profit

Revenge Attacks

Industrial Espionage

Terrorism/Cyber Warfare

Arbitrary Reasons

Prepping Kali Linux for Use

Installing “Empty” for Automation

Metasploit Workflow

Chapter 7: Using Wireshark and TCP dump to visualize traffic

Abstract

Understanding Valid Traffic in the Network

Setting Up a Span Port

Using Capture and Display Filters

Example of Using Display Filters to Detect Reverse HTTP Meterpreter Shell

Using Custom HTTP Headers as a Backup Authentication

Looking for a Malware Signature Using Raw Hex

Debugging SIP Register with Display Filters

Using Built-In Wireshark Analysis Tools

Using Endpoints Statics

Determine Packet Length Distributions

Visualizing Performance With IOGraph

Using FlowGraph to Visualize Traffic

Collecting HTTP Stats in Wireshark

Using Wireshark Command Line Tools

How to Remotely Capture Traffic on a Linux Host

Merging/Slicing PCAP Files Using Mergecap

Getting Information About a PCAP File Using CAPINFOS

Editing a Capture File with Editcap

Using TCPdump

Filter Captures with TCPdump

Chapter 8: Using SNORT

Abstract

Building and IDS Appliance with SNORT

Installing SNORT

Building and Update Script to Update the System and SNORT

Configuring and Using SNORT

Configuring Intrusion Detection Mode

Capturing Packets with DAQ

Snort Basic Output

Actions, Limits, and Verdicts

Running Snort as a Daemon

Configuring snort.conf File

Example SNORT Rules

Installing Snorby: SNORT Visualized

Chapter 9: Live traffic analytics using “Security Onion”

Abstract

Building Security Onion

Updating Security Onion Appliance

Replaying PCAP Traffic in Security Onion

Using Snorby for Threat Visualization

Setting Snorby Preferences

Basic Snorby Usage

Decoding an Attack Event in Snorby

Another Perspective on IDS Using Squert

Using Sguil for Monitoring Post and Real-time Events

Additional Tools in Security Onion

Final Thoughts About Security Onion

Chapter 10: Traffic performance testing in the network

Abstract

Bandwidth, Packet Per Seconds and RFC 2544: Avoiding the False Positive

Optimal Testing Methodology

Testing with Streams: Ostinato

Testing TCP with iPerf3

Using NTOP for Traffic Analysis

Applied Wireshark: Debugging and Characterizing TCP Connections

Emulating the Behavior of the WAN for Testing

Chapter 11: Build your own network elements

Abstract

Building Your Own Router—VyOS

Building Your Own Open Source Switch: Open vSwitch (OVS)

Building Your Own Open Source Server Load Balancer (SLB)

Setting Up a DHCP Server in Ubuntu

Building Your Own LAMP Server

Chapter 12: Request for proposal and proof of concept example usecases

Abstract

Evaluating an L3 Switch

Subject Index