Description
In this course, you will learn :
- Our primary goal is to learn the Iptables Firewall, but in-depth knowledge of the subject requires knowledge of Networks, Network Devices, Network Attack Types, and Network Problems. This information was also covered in the course.
- About attacks, how to carry them out, and how to use iptables to prevent them [DoS, Fraggle, Ping of Death, Ping Flood, Smurf, Brute Force, Man in the Middle, Arp Spoofing].
- Iptables fundamentals [creation of a rule, iptables commands, tables, matches, chains, targets, and an iptables data flow diagram].
- Networks from the ground up [based on IPv4 and covering WAN, LAN, topologies, and IP addressing].
- Network protocols [ IPv4, ARP, ICMP, TCP, UDP, DNS, DHCP, SSH, Telnet, HTTPS, HTTP ].
- About Nnap, Wireshark, nping, hping3, IPSET, Putty, arpspoof, net-tools, urlsnarf and more how to use them in practise.
- About network Scan and how to prevent it using iptables [SYN, ACK, FIN, XMAS, UDP, NULL scans and how to create Custom scan].
- What is a Firewall and how does it work.
- How to create a virtual security LAB. Virtualization basics [VirtualBox, what is a host, hypervisor and virtual system, connection types etc.]
- Creating and configuring a Virtual Laboratory with a Iptables Firewall from scratch.
- Making Ubuntu Linux act as a NAT router and firewall using iptables.
- Problems with security and networking. How to avoid them with iptables. Fragmentation, PMTUD, PLMTUD, MTU probing, MSS clamping, and Jumbo frames are all possible.
- How to use custom chains to manipulate traffic in iptables.
- How to use IPSET and other tools to work with iptables.
- What is it and how do you make a Whitelist and a Blacklist?
- Network devices and their functions [L2, L3, routers].
Syllabus :
- Protocols and network basics
- Virtualization. We create our network laboratory
- Iptables basics. [ Further configuration of the virtual network ]
- Internet Layer - [ Attacks and prevention using iptables. Security problems]
- Transport Layer - [ Attacks and prevention using iptables ]
- Application & Network Access layers - [ Attacks and prevention using iptables ]
- Additional material - Cloning packets in iptables