Writing Custom Rules
CompTIA Security+ (SY601) Domain:
Domain 1.0: Threats, Attacks, and Vulnerabilities
CompTIA Security+ (SY601) Objective Mapping:
Objective 1.7: Summarize the techniques used in security assessments
CEH Exam Domain
Domain 1: Background
Domain 2: Analysis/Assessments
Domain 4: Tools/Systems/Programs
CEH Objective Mapping
Objective 1.2 Information Security Threats and Attack Vectors
Objective 1.3 Information Security Technologies
Objective 2.2 Information Security Assessment Process
Objective 4.3 Information Security Tools
Overview
This lab is part of a series of lab exercises intended to support courseware for Ethical Hacker training. The development of this document is funded by the Department of Labor (DOL) Trade Adjustment Assistance Community College and Career Training (TAACCCT) Grant No. TC-22525-11-60-A-48. In this lab, you will do a basic penetration using nmap and bruter. Then, you will configure a snort rule to alert for a specific user and malicious file. You will use tcpdump to capture the network traffic to a file to be used by snort to find malicious traffic throug alerts.
OUTCOMES:
In this lab, you will learn to:
- Penetrate a network.
- Write rules to protect the network.
- Generate traffic trigger alerts.