VMware: Advanced Security



Similar documents
Pen Testing Methodology Gueststealer TomCat Zero Day Directory Traversal VASTO

Vulnerability Assessment and Penetration Testing

Build Your Own Security Lab

VMware vsphere-6.0 Administration Training

Mitigating Information Security Risks of Virtualization Technologies

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

vsphere Security ESXi 6.0 vcenter Server 6.0 EN

VMware vsphere: Install, Configure, Manage [V5.0]

VMware vsphere 5.1 Advanced Administration

Network Troubleshooting & Configuration in vsphere VMware Inc. All rights reserved

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

VMWARE VSPHERE 5.0 WITH ESXI AND VCENTER

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines

Penetration Testing with Kali Linux

Implementing Cisco IOS Network Security

VMware vsphere 5.0 Boot Camp

VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE

VMware ESX Server 3 Configuration Guide

JOB ORIENTED VMWARE TRAINING INSTITUTE IN CHENNAI

Table of Contents. vsphere 4 Suite 24. Chapter Format and Conventions 10. Why You Need Virtualization 15 Types. Why vsphere. Onward, Through the Fog!

E-SPIN's Virtualization Management, System Administration Technical Training with VMware vsphere Enterprise (7 Day)


IINS Implementing Cisco Network Security 3.0 (IINS)

SCP - Strategic Infrastructure Security

Hardening and Hacking vsphere and Private Cloud Everything you need to know about vsphere Security

Certified Ethical Hacker (CEH)

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

BEST PRACTICES. DMZ Virtualization with VMware Infrastructure

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

Network Segmentation in Virtualized Environments B E S T P R A C T I C E S

Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5

CRYPTUS DIPLOMA IN IT SECURITY

Chapter 1 The Principles of Auditing 1

Certified Penetration Testing Engineer

INFORMATION SECURITY TRAINING CATALOG (2015)

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

vsphere Private Cloud RAZR s Edge Virtualization and Private Cloud Administration

Vmware VSphere 6.0 Private Cloud Administration

New Security Perspective for Virtualized Platforms

What is Virtualization and How Do I Audit It? Rick Schnierer and Chris Tennant

Virtualization System Security

CERTIFIED PENETRATION TESTING CONSULTANT

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

Linux Network Security

Description: Objective: Attending students will learn:

Presentation for ISACA Chapter NL. Auditing Virtual Servers. VMware: Security and Operations. Gert-Jan Timmer 3. September, 2012

Aerohive Networks Inc. Free Bonjour Gateway FAQ

CYBERTRON NETWORK SOLUTIONS

VMware vsphere 4.1 with ESXi and vcenter

Building a Penetration Testing Virtual Computer Laboratory

Khóa học dành cho các kỹ sư hệ thống, quản trị hệ thống, kỹ sư vận hành cho các hệ thống ảo hóa ESXi, ESX và vcenter Server

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

vshield Quick Start Guide vshield Manager 4.1 vshield Edge 1.0 vshield App 1.0 vshield Endpoint 1.0

How to Backup and Restore a VM using Veeam

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Ethical Hacking Course Layout

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Study Guide. Professional vsphere 4. VCP VMware Certified. (ExamVCP4IO) Robert Schmidt. IVIC GratAf Hill

Learn the Essentials of Virtualization Security

vsphere Security Update 1 ESXi 5.1 vcenter Server 5.1 EN

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Recommended IP Telephony Architecture

Certified Ethical Hacker Exam Version Comparison. Version Comparison

How to monitor network traffic inside an ESXi host

VMware vsphere: Fast Track [V5.0]

Information Security. Training

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Security. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««;

Security + Certification (ITSY 1076) Syllabus

Secure Segmentation of Tier 1 Applications in the DMZ

vshield Quick Start Guide

Implementing Cisco IOS Network Security v2.0 (IINS)

Secure Cloud-Ready Data Centers Juniper Networks

Virtual Learning Tools in Cyber Security Education

Learn the essentials of virtualization security

VMware vsphere Design. 2nd Edition

Securing Cisco Network Devices (SND)

Altor Virtual Network Security Analyzer v1.0 Installation Guide

Virtualization Security and Best Practices. Rob Randell, CISSP Senior Security Specialist SE

Configuring Virtual Switches for Use with PVS. February 7, 2014 (Revision 1)

Secure Networks for Process Control

vshield Quick Start Guide

ESX Server 3 Configuration Guide Update 2 and later for ESX Server 3.5 and VirtualCenter 2.5

VM-Series Firewall Deployment Tech Note PAN-OS 5.0

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Cisco Nexus 1000V Virtual Ethernet Module Software Installation Guide, Release 4.0(4)SV1(1)

Linux Operating System Security

Testing New Applications In The DMZ Using VMware ESX. Ivan Dell Era Software Engineer IBM

2016 TÜBİTAK BİLGEM Cyber Security Institute

Security of IPv6 and DNSSEC for penetration testers

CompTIA Cloud+ 9318; 5 Days, Instructor-led

Learn Ethical Hacking, Become a Pentester

INFORMATION SECURITY TRAINING CATALOG (2016)

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:

Virtualization Security Checklist

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Transcription:

VMware: Advanced Security Course Introduction Course Introduction Chapter 01 - Primer and Reaffirming Our Knowledge Primer and Reaffirming Our Knowledge ESX Networking Components How Virtual Ethernet Adapters Work How Virtual Switches Work VMsafe Overview Current VMsafe Partners Virtual Switch vs. Physical Switch Spanning Tree Protocol Not Needed Virtual Ports Uplink Ports Port Groups Uplinks Virtual Switch Correctness VLANs in VMWare Infrastructure NIC Teaming Load Balancing Failover Configurations Normal Operation Connection Fails Signaling Process - Beaconing Data Rerouted Layer 2 Security Features Forged Transmits Managing the Virtual Network Symmetric vs. Asymmetric Encryption Demo - Security in vswitches Hashes Demo - Hashes Digital Signatures Breaking SSL Traffic Demo - Lab Environment Demo - ARP Cache Poison File System Structure Kernel Processes Starting and Stopping Processes Interacting with Processes Accounts and Groups Password & Shadow File Formats Accounts and Groups (cont.) Linux and UNIX Permissions Demo - Intro to Linux Set UID Programs Logs and Auditing Chapter 01 Review 4m 2h 38m

Chapter 02 - Routing and the Security Design of VMware Routing and the Security Design of Vmware Security of Routing Data How Traffic Routes Between VMs on ESX Hosts Different vswitches, Same Port Group and VLAN Same vswitch, Different Port Group and VLAN Same vswitch, Same Port Group and VLAN Security Design of the VMware Infrastructure Architecture VMware Infrastructure Architecture and Security Features Virtualization Layer CPU Virtualization Memory Virtualization Cloud Burst Virtual Machines Service Console Virtual Networking Layer Virtual Switches Virtual Switch VLANs Demo - Using VLAN s Major Benefits of Using VLANs Standard VLAN Tagging Virtual Ports Virtual Network Adapters Virtualized Storage VMware VirtualCenter Chapter 02 Review Chapter 03 - Remote DataStore Security Remote DataStore Security ESX / ESXi and Fibre Channel SAN Environment and Addressing Mask and Zone SAN Resources Appropriately LUN Masking and Zoning Fiber Channel DH-CHAP Switch Link What is FC-SP (Fiber Channel - Security Protocol)? ESP Over Fiber Channel Fiber Channel Attacks - The Basics Steps in Securing Fiber Channel iscsi vs. Fiber Channel ESX / ESXi and iscsi SAN Environment and Addressing Hardware vs. Software Initiators iscsi Security Features Secure iscsi Devices Through Authentication Demo - Storage Security Settings IPSec IPSec Implementation Steps in Securing iscsi Chapter 03 Review 1h 21m 39m

Chapter 04 - Penetration Testing 101 Penetration Testing 101 What is a Penetration Test Benefits of a Penetration Test What Does a Hack Cost You? Cost of a Hack - Example Current Issues Chained Exploit Example Demo - Gonzalez Indictment The Evolving Threat Methodology for Penetration Testing / Ethical Hacking Penetration Testing Methodologies Types of Tests Website Review Demo - Website Review Seven Management Errors Some VMware Issues Not Just About the Tools Chapter 04 Review Chapter 05 - Information Gathering, Scanning and Enumeration Information Gathering, Scanning and Enumeration What is the Hacker Wanting to Know? Methods of Obtaining Information Footprinting Maltego Maltego GUI Demo - Maltego Firecat v1.6.2 Demo - Firecat FireFox Fully Loaded Johnny.Ihackstuff.com hackersforcharity.org Google and Query Operators Google Shodan - You Have to be Kidding Me! Demo - Shodan Introduction to Port Scanning Popular Port Scanning Tools ICMP Disabled NMAP TCP Connect Scan TCP Connect Port Scan Nmap Half-open Scan Firewalled Ports NMAP and Your VMware Servers Additional NMAP Scans NMAP UDP Scans Demo - NMAP UDP Port Scan Enumeration Overview Banner Grabbing Banner Grabbing with Telnet SuperScan 4 Tool: Banner Grabbing DNS Enumeration Zone Transfers Backtrack DNS Enumeration 1h 16m 1h 47m

Active Directory Enumeration LDAPMiner Null Sessions Syntax for a Null Session Viewing Shares Enumeration with Cain and Abel NAT Dictionary Attack Tool THC-Hydra Injecting Abel Service Demo - Cain Chapter 05 Review Chapter 06 - Penetration Testing and the Tools of the Trade Penetration Testing and the Tools of the Trade Vulnerabilities in Network Services BackTrack4 Vulnerability Scanners Nessus Nessus Report Saint SAINT - Sample Report OpenVAS OpenVAS Infrastructure OpenVAS Client Demo - OpenVAS Windows Password Cracking Syskey Encryption Cracking Techniques Rainbow Tables Disabling Auditing Clearing the Event log NTFS Alternate Data Stream Stream Explorer Encrypted Tunnels Port Monitoring Software RootKit The Metasploit Project Defense in Depth Meterpreter VASTO VASTO Modules Fuzzers SaintExploit at a Glance Core Impact Overview Core Impact Total Exploits from NVD Included in the Penetration Testing Tool Wireshark TCP Stream Re-assembling ARP Cache Poisoning ARP Cache Poisoning (Linux) Cain and Abel Ettercap Chapter 06 Review 1h 29m

Chapter 07 - DMZ Virtualization and Common Attack Vectors DMZ Virtualization and Common Attack Vectors DMZ Virtualization with VMware Infrastructure Virtualized DMZ Networks Three Typical Virtualized DMZ Configurations Partially Collapsed DMZ with Separate Physical Trust Zones Partially Collapsed DMZ with Virtual Separation of Trust Zones Fully Collapsed Best Practices for Achieving a Secure Virtualized DMZ Deployment Harden and Isolate the Service Console Clearly Label Networks for Each Zone within the DMZ Set Layer 2 Security Options on Virtual Switches Enforce Separation of Duties Use ESX Resource Management Capabilities Regularly Audit Virtualized DMZ Configuration Common Attack Vectors How We Understand Fake Certificate Injection to Work Generic TLS Renegotiation Prefix Injection Vulnerability Testing for a Renegotiation Vulnerability Vulnerability Requirements Generic Example Patched Server with Disabled Renegotiation Demo - SSL Renegotiation Test Schmoo Con 2010: Virtualization Vulnerabilities Found! Schmoo Con 2010: Timeline Schmoo Con 2010: Identification Schmoo Con 2010: Server Log In Schmoo Con 2010: Server on the Internet Schmoo Con 2010: Vulnerability Schmoo Con 2010: Redirection Proxy Schmoo Con 2010: Vulnerable Versions Schmoo Con 2010: Gueststealer Chapter 07 Review Chapter 08 - Hardening Your ESX Server Hardening Your ESX Server Section 1 - Virtual Machines Secure Virtual Machines as You Would Secure Physical Machines Disable Unnecessary or Superfluous Functions Take Advantage of Templates Prevent Virtual Machines from Taking Over Resources Isolate Virtual Machine Networks Example Network Architecture Arp Cache Poisoning VM Segmentation Minimize Use of the vsphere Console Virtual Machine Files and Settings Disable Copy and Paste Operations Limit Data Flow from the Virtual Machine to the Datastore SetInfo Hazard Do Not Use Nonpersistent Disks Ensure Unauthorized Devices are Not Connected Prevent UnAuthorized Removal or Connection of Devices Avoid Denial of Service Caused by Virtual Disk Modification Operations Specify the Guest Operating System Correctly 52m 3h 2m

Verify Proper File Permissions for Virtual Machine Files Demo - Security on your Virtual Machines Section 2 - Configuring the ESX/ESXi Host Configuring the Service Console in ESX Demo - Control VIC Access Demo - Service Console Administration Configure the Firewall for Maximum Security Demo - Firewall Configuration Limit the Software and Services Running in the Service Console Processes Running in SC Use vsphere Client and vcenter to Administer the Hosts Instead of Service Console Use a Directory Service for Authentication Demo - AD Integration Strictly Control Root Privileges Control Access to Privileged Capabilities Demo - SSH Access and SUDO Establish a Password Policy for Local User Accounts ESX/Linux User Authentication Configuring ESX Authentication ESX Authentication Settings Reusing Passwords Configuring Password Complexity Do Not Manage the Service Console as a Linux Host Maintain Proper Logging ESX4 Log File Locations Maintain Proper Logging (cont.) ESX Log Files Establish and Maintain File System Integrity Secure the SNMP Configuration Protect Against the Root File System Filling Up Disable Automatic Mounting of USB Devices Isolate the Infrastructure-related Networks VLAN1 Configure Encryption for Communication Between Clients and ESX/ESXi Label Virtual Networks Clearly Do Not Create a Default Port Group Do Not Use Promiscuous Mode on Network Interfaces Protect Against MAC Address Spoofing Secure the ESX/ESXi Host Console Chapter 08 Review Chapter 09 - Hardening Your ESXi Server Hardening Your ESXi Server Differences: VMware ESX vs. ESXi Differences: VMware ESX and ESXi Configuring Host-level Management in ESXi ESXi -Strictly Control Root Privileges Control Access to Privileged Capabilities ESXi DCUI Control Access to Privileged Capabilities ESXi (cont.) Maintain Proper Logging - ESXi Establish and Maintain Configuration File Integrity ESXi Ensure Secure Access to CIM Audit or Disable Technical Support Mode Chapter 09 Review 20m

Chapter 10 - Hardening Your vcenter Server Hardening Your vcenter Server VirtualCenter Set Up the Windows Host for Virtual Center with Proper Security Limit Network Connectivity to Virtual Center Use Proper Security Measures When Configuring the Database for Virtual Center Enable Full and Secure Use of Certificate-based Encryption Default Certificates Replacing Server Certificates vcenter Log Files and Rotation Collecting vcenter Log Files Use VirtualCenter Custom Roles Document and Monitor Changes to the Configuration VirtualCenter Add-on Components VMware Update Manager VMware Converter Enterprise VMware Guided Consolidation General Considerations Client Components Verify the Integrity of VI Client Monitor the Usage of VI Client Instances Avoid the Use of Plain-Text Passwords vshield Zones Overview vshield VM Wall Features vshield VM Flow Features Demo - vshield Zones Chapter 10 Review Chapter 11-3rd Party Mitigation Tools 3rd Party Mitigation Tools Virtualization: Greater Flexibility, Diminished Control Making Sense of the Virtualization Security Players 1K View of Players In-depth Look - Authors Picks HyTrust Appliance HyTrust Appliance - Key Capabilities (cont.): Unified Access Control HyTrust Appliance - Key Capabilities (cont.): Policy Management HyTrust Appliance - Key Capabilities (cont.): Audit-quality Logging HyTrust Appliance - Key Capabilities (cont.): Hypervisor Hardening In-depth Look - Authors Picks Catbird Catbird - Policy-driven Security Catbird - Continuous Compliance What's Missing? Making Sense of It All Chapter 11 Review Course Closure 1h 28m 25m Total Duration: 15hrs 22m