Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Strategies for Defeating Distributed Attacks

Black Hat via YouTube

Overview

This course aims to teach strategies for defeating distributed attacks. The learning outcomes include understanding IP addressing, basic system administration, attack recognition problems, changing attack patterns, defensive techniques like stateful inspection firewalls and modified kernels, DMZ server recommendations, firewall rules, intrusion detection systems, and spoofed packet defenses. The course employs a lecture-based teaching method. It is intended for individuals interested in cybersecurity, network security, and defending against cyber threats.

Syllabus

Intro
Assume basics - Understand IP addressing - Understand basic system administration
Attack Recognition Problems Blended "patter" and "effect" attacks • Sniffing attacks Decoys and false identification of attack source
Attack Recognition Problems • Blended "patter" and "effect" attacks • Sniffing attacks Decoys and false identification of attack source
Changing Attack Patterns • More large-scale attacks • Better enumeration and assessment of the target by the attacker
Two Basic Distributed Attack Models • Attacks that do not require direct observation of the results • Attacks that require the attacker to directly observe the results
Defensive Techniques Cont. Minimal ports open Stateful inspection firewalls Modified kernels/IDS to look for fingerprint packets
Defensive Techniques Cont. Limit ICMP inbound to host/destination unreachable Limit outbound ICMP
DMZ Server Recommendations Split services between servers Current patches • Use trusted paths, anti-buffer overflow settings and kernel patches • Use any built-in firewalling software • Make use of built-in state tables
Firewall Rules Limit inbound to only necessary services • Limit outbound via proxies to help control access • Block all outbound to only necessary traffic
Intrusion Detection Systems • Use only IDS's that can be customized • IDS should be capable of handling fragmented packet reassembly • IDS should handle high speeds
Spoofed Packet Defenses Get TTL of suspected spoofed packet • Probe the source address in the packet Compare the probe reply's TTL to the suspected spoofed packet
Late Breaking News • HackerShield RapidFire Update 208

Taught by

Black Hat

Reviews

Start your review of Strategies for Defeating Distributed Attacks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.