.

-- CEH Training at InfoSec Institute --

<<

charlottebandit

Newbie
Newbie

Posts: 49

Joined: Sat Jun 10, 2006 4:26 pm

Post Tue Jun 20, 2006 8:37 am

-- CEH Training at InfoSec Institute --

Recently attended CEH training with InfoSec Institute and would like to include a review of my experience.  Although I haven't attended other bootcamp training seminars yet, at least I could compare it with the formal education I received in Network Security. 

Equipment/Software:

- Every student had P3/4 Dell laptops with XP/RH-9/W2K server installed through VMware
- Instructor had several boxes & several servers (VMware) for "Capture the Flag" exercises
- Wireless connection used to assist in WLAN attacks & probe packet sniffing
- All software (open source / commercial) preinstalled on each laptop and working
- "Security Warrior" was the text mailed out and hopefully read before attending CEH


Overview:

Rather than sticking with the typical CEH curriculum of learning a 1000 tools & watching slides, InfoSec took a pen-testing approach and incorporated certain tools as we progressed in the pen-testing model.  They mentioned that this way we would have reference points on how to proceed and where to incorporate new tools as they came out rather than walking away without a solid foundation in pen-testing.

We approached each lab & teaching as if we were dealing with competent intrusion analysts which raised the bar of awareness, rather than expecting a completely open system where the secretary is also the SysAdmin. 

The instructor also approached the pen-testing model mostly from a black-box testing aspect where stealthiness & quietness (packet-wise) was emphasized rather than going in LOUD using Nmap & default settings with vulnerability/penetration scanners which also serve a purpose (white-box test).  Customizing tools & scripts were also discussed to evade detection and investigations by Computer Forensic analysts.  :)


Labs:

- numerous labs that worked since the boxes were preconfigured with tools (many weren't in the CEH outline) that work in a stealthy manner
- some tools weren't installed to show us how to install .rpms & .tar files (actual lab)
- lab manuals included both Windows & Linux attacks that builded upon previous labs
- labs began with a step-by-step approach, then slowly omitted steps that were previously covered in other labs (nothing critical).  I think that approach was to exercise our familiarity with what was learned
- didn't always have enough time to complete all the labs per section, but many were covered (usually 5 per section:  e.g. 5 for SNMP attacks, 5 for web application attacks)

Capture the Flag exercises (Red Teams):

There were four exercises (one per night) where we were separated into separate Red Teams to successfully complete several objectives per exercise.  We would use the attacks discussed & practiced on the instructor's servers where he monitored the network for "loud" and obtrusive attacks.  Obviously this was not done on the first 2 nights, but as our skill level progressed, so did the awareness of intrusion detection.

Many nights we worked on labs & CTF exercises until 10-11:30pm. 


Closing Comments:

Very satisfied with the breadth of knowledge by the instructor, course outline, and organization of lab materials.  There was probably 70-80% Federal employees there who attended the course ranging from Pen-testers, Sysadmins, Intrusion Detection Analysts, Programmers, Network Security Engineers, Graduate students, and Front-end Developers who benefitted from seeing major problems with software attacks which were covered & practiced (SQL injections, Cross site scripting, Web app attacks).

You are required to have a solid understanding of network essentials, TCP/IP, Malware, and encryption algorithms (or read Security Warrior 3X) before attending the CEH course with InfoSec Institute since there is no way to completely cover 20+ domains in 5 days unless they omit most of the hands-on labs.  This was an advantage for me since I had previous experience and formal education with such topics.  Having said that, their focus is more on penetration testing/hacking than vulnerability assessments where exploits are never confirmed. 

Not sure if I could recommend it to a newb in the pen-testing/network security world unless they put in the time to absorb the Security Warrior book prior & during class.  It's not about doing port scans or running Nessus since intrepreting the results and not setting off IDSs are important factors to consider in different attack vectors.  At least a review was conducted on Friday morning before the CEH exam.

===================

I am currently learning Perl and will try to squeeze in Python before attempting their advanced ethical hacking class which also exceeds the outline of the ECSA certification which follows the CEH.  The course book being used is The Shellcoders Handbook http://www.amazon.com/gp/product/0764544683/qid=1150807828/sr=2-1/ref=pd_bbs_b_2_1/002-3201132-0513627?s=books&v=glance&n=283155 written by Jack Koziol (who also wrote Intrusion Detection using Snort) who teaches the Advanced Ethical Class at InfoSec Institute.

Probably will take the (CPTE) class with Mile2 in August/Sept prior to attempting the Advanced EH class (CEPT/ECSA) with InfoSec Institute in Oct/Nov since it deals a ton with writting your own shell scripts, reverse engineering, and scanning code for exploitation.


Hope this helps.  Tried to be specific without being TOO specific so as not to give away the family jewels for them.
Last edited by charlottebandit on Tue Jun 20, 2006 8:40 am, edited 1 time in total.
MS, CCSP, CCNP, CCDP, CEH, CHFI, CPTS
<<

don

User avatar

Administrator
Administrator

Posts: 4226

Joined: Sun Aug 28, 2005 10:47 pm

Location: Chicago

Post Tue Jun 20, 2006 9:49 am

Re: -- CEH Training at InfoSec Institute --

Well done. Nice info to have in the forums. I do have a few questions:

1. Was the class held in their offices or in the hotel?
2. How many were in the class? How many red teams?
3. Did the class prepare you for the CEH exam or did that require a lot of prior knowledge?
4. Was the exam included in the package and was it given on-site?
5. Did you pass?
6. What is your background and how do you think the training (not necessarily the exam) will help in your job or career?

Thanks in advance,
Don
CISSP, MCSE, CSTA, Security+ SME
<<

charlottebandit

Newbie
Newbie

Posts: 49

Joined: Sat Jun 10, 2006 4:26 pm

Post Tue Jun 20, 2006 11:20 am

Re: -- CEH Training at InfoSec Institute --

Thanks Don.

don wrote:Well done. Nice info to have in the forums. I do have a few questions:


1. Was the class held in their offices or in the hotel?


Classes were held in a conference room at a hotel.

2. How many were in the class? How many red teams?


16 total (max).  Red teams were split in 1/2 (8) or it could have been even smaller (our choice).

3. Did the class prepare you for the CEH exam or did that require a lot of prior knowledge?


First off, I must admit that I'm not too fond of the way the CEH is organized and its focus.  Since it doesn't accurately follow a formalized process (such as pen-testing), you really learn tools w/ some structure rather than learning structure while incorporating tools in to reach your objective.

I do like the methodology Mile2 teaches for their proprietary cert (CPTS), but doesn't have the amount of hands-on lab time (directly from Mile2) like Infosec Institute does (around 11pm most nights).  So I.I. teaches pen-testing w/ a hacker mindset (and subsequent tools) within its limited time. 

You also have lots of study questions to read from & the Security Warrior text which is highly recommended (especially the first 4 chapters: Software Cracking). 

Now the CEH has gained more popularity than other pen-testing certs which is probabaly one of the reasons I.I. hasn't come out with their own proprietary foundation cert, but has with the advanced course.  Certs in the infosec field will gain recognition with time.........so it's not a bad time to get in.

4. Was the exam included in the package and was it given on-site?


CEH exam included in package & given on-site. 

5. Did you pass?


Yes.

6. What is your background and how do you think the training (not necessarily the exam) will help in your job or career?


Just finished an MS online in infosec, but made it somewhat tricky to get the hands-on experience I needed although it was rich in theory, protocol analysis, and provided balanced infosec skills throughout multiple domains.  Also, most of the texts used were old & not the best-of-class for each subject.  Pen-testing & Computer Forensics are two concentrations I am pursuing, and believe that the training was essential for continuing education.
MS, CCSP, CCNP, CCDP, CEH, CHFI, CPTS

Return to CEH - Certified Ethical Hacker

Who is online

Users browsing this forum: No registered users and 2 guests

.
Powered by phpBB® Forum Software © phpBB Group.
Designed by ST Software