This is the fourth unit of my course for teachers, which brings together a lot of material I generated while working as Project Manager for the Hacker Highschool v2 Rewrite Project, 2012-2016. This session helps you get started with Day One of hacking class, and exploring Lesson 1.
Here’s the video of Unit 4, with the links it mentions below. Tell me what you think in the Comments, and thanks for taking a look.
I’ve been trying to bring “hacker” training to UNM for over ten years without much success. Only in the past two semesters have I been able to run an Ethical Hacking class based on the CEH, but where my past efforts didn’t bring students, the CEH did.
Red Team work has long interested me, likely because years of managing high-traffic websites left me with lots of scars and an urge to fight back. There are some interesting programs: the OSCP, GIAC certifications, and the CEH probably make up the short list. I’m highly interested in the GIAC certs, but man are they expensive. The OSCP from Offensive Security is the real hardcore hacker’s cert, even if most HR people haven’t figured that out yet. The CEH, on the other hand, is widely recognized by HR but doesn’t enjoy quite the same purists’ esteem.
So I approached Jay Bavisi online, and he connected me with ECC VP Eric Lopez and ECC University VP David Oxenhandler. Eric and David met with me to talk about marketing ECC courses and materials to UNM administration, and gave me a stack of books two feet high – and an account on ECC’s online training platform, iLabs 2.0. I’ll have more to say about specific books and certs, but here I’m going to talk about iLabs itself.
By now almost every teacher has dealt with a few learning management systems (LMSs). My list includes build-it-yourself platforms like Blackboard, Moodle and WordPress LMS; ready-to-go courses on sites like Udemy and Coursera; and some great pre-built platforms for building tests and courses like Mettl and Braincert. They all have a lot in common in terms of features and interfaces: videos or scenarios to play, guided exercises, mostly textual interactions (if any) with the instructor and other students.
I’ve also been spending a lot of time on hacking sites like root-me.org and HacktheBox, which are very different from the LMSs. The best of them fire up virtual machines for students to practice on, which is a lot more realistic than the guided walk-throughs most LMSs offer.
iLabs merges these two models. ECC has given me permission to share screenshots from that environment, so let’s do a walkthrough, starting from the login page.
I received a welcome email with instructions on setting up my account and using an Access Key to start running the course materials. My key got me into the CEHv9 course. Remember that the CEH is transitioning to version 10, so there will be some differences in the newer version.
From here I had four tabs to choose from: My Training (the current screen), My Transcript, Courses and Contact.
My Transcript showed that at the moment, I had basically completed no training (at least on this platform). No surprise. I can see this being useful once I’ve studied a few more certs.
The Courses tab takes us to a Course Catalog that will immediately made my mouth water: Advanced Penetration Testing, Incident Handler, Forensics Investigator. It’s a lineup that’s grown dramatically, and seems aimed directly at GIAC. Yes, I tried getting into other courses (hacker!) and that wasn’t possible, at least without making myself a nuisance instead of a guest. But now I have an appetite for more.
Going back to the Courses tab, I clicked on the Certified Ethical Hacker – CEH v9 link, and arrived at the summary page for the program.
These are the familiar sections of the CEHv9 training. Clicking the Launch button takes us to a preliminary test of our system, then lets us launch the actual test lab. Clicking the button opens a new window while our test environment is launched.
Module 1 is all about learning to use the iLabs platform, and provides a walkthrough of the interface’s features. It’s an information-intensive environment, so pay close attention at this stage. There are a couple of places on every screen that may offer tips; learning where to look helps a lot once we’re doing active work.
Next, in this and all Modules, comes a couple of screens of information: Objectives and the lesson Scenario.
Clicking through the Information screens takes us to the first virtual machine we’ll use, a Windows Server 2012 instance. Choose the Machines tab and click on Windows Server 2012, if it’s not already selected.
We’ll need to locate the Commands menu at the top of the screen in order to log into the VM. It’s not clearly labeled; look for the lightning bolt at the top of the scroll bar on the right. It pops open a dialog where we can send a Ctrl-Alt-Delete to get a login form.
We’ve got an amusing choice here: use the Commands menu, click Type Text, then click Type Username; or click in the Machines tab on the username; or type it into the form ourselves. Do aspiring hackers really need this much hand-holding? Probably not, but this feature is also likely just an element of the LMS. Choose a method, and enter the username and password.
The next screen comes up every time we open this VM, which is just a result of starting an absolutely fresh installation. Obviously we don’t need to set up the whole server, so simply cancel the dialog.
Notice that the bottom of the VM’s screen is cut off on my 15″ laptop monitor (1366×768). Checking the available resolutions, I found it’s already at its lowest option, 1024×768. While this isn’t a big deal, it is a bit annoying to have to scroll to see everything. I couldn’t find a setting to resize the VM window, but the interface is complex enough that I may have missed it. (Let me know below if you find it.)
Next comes opening Firefox. This requires telling Firefox that we don’t want to update to the latest version. Why? Because the VM is running an older version that supports the outdated Firebug plugin. I expect that the version 10 course will use a newer utility that works in current versions of Firefox (as I mentioned, this is the now-retired version 9).
Note the instructions in the blue box at the bottom of the screen, which direct us to enter the target website’s URL (which is not an actual online domain).
Once we’re on the Moviescope site, open the Firebug console. Firebug, by the way, has since merged into the Firefox Developer Tools. In the lab, some Firebug features won’t work, but clicking through the interface tabs does for the most part. And of course the functions Firebug offered are still available in Firefox, so in real life you don’t have to stick to an old version of the browser.
The instructions steer us to the HTML inspector in Firesheep, and into the scripts present on the page.
Click to expand one of the scripts and it gives up its code.
After taking this quick look at the scripts the lab points out that these visible scripts are ripe for the plucking. Then the Module starts us into another software installation.
The CEH has a heavy concentration in hacking tools, and candidates are expected to be familiar with the functions of quite a few of them. This is where this LMS shines: we get to set up, run and see the output of these tools on a live VM system. When I studied for the CEH, everything I worked with was text and slideshows. I’m a geek and an instructor, so I went out and got, installed and tried out every tool that was mentioned (this took a LONG time), so it’s nice to see that this course puts the tools right in my hands.
Drive E: has a tasty little stash of software we’ll be using. In this case, we’re steered to the Web Data extractor, which we install and run.
“Web Data Extractor Pro is a web scraping tool specifically designed for mass-gathering of various data types. It can harvest URLs, phone and fax numbers, email addresses, as well as meta tag information and body text. Special feature of WDE Pro is custom extraction of structured data.” – http://www.webextractor.com/
Our target web site is small, so the scan completes quickly. When it’s done it lets us know.
Now we can dig through the results, which are excellent for Reconnaissance-stage hacking: one scan saves us the trouble of digging around for the target’s email addresses, phone numbers etc.
After some discussion, we’re led to another installation, this time of the WinHTTrack Website Copier.
“HTTrack … allows you to download a World Wide Web site from the Internet to a local directory, building recursively all directories, getting HTML, images, and other files from the server to your computer. HTTrack arranges the original site’s relative link-structure. Simply open a page of the “mirrored” website in your browser, and you can browse the site from link to link, as if you were viewing it online.” – http://www.httrack.com/
Once we’ve chosen a project name, we can review the configuration.
So bang, click OK and turn it loose. When it’s done it’s not completely clear what you’re supposed to do. From the Index of Projects page, click on the only one: our Test Project
Now we can click through pages and examine code without waiting for the live site to load them for us.
After some discussion and examination, we’re shown out the door to this Module and back to our summary screen: Status Complete. From here we can scroll down and launch Module 2, Scanning Networks. We can’t, however, skip ahead. We’ll have to run the Modules in order. After doing each one, we can go back and review.
This is only the top of the page…
…there are a total of 17 Modules to work through. Most of them run between a half hour and 1.5 hours.
Going forward, we get to use more real VMs, not just Server 2012. Module 2 takes us straight into doing network scans in Kali (oh fun!). We’re not playing with a simulation, either. This is live practice on real machines.
By now it should be pretty clear that I really like the environment. If ECC had built it themselves I’d be amazed, because it’s such a large-scale project. Fortunately they did what any smart IT person does, namely finding the best and latest tech that currently exists. (You don’t try to re-create YouTube when you want to stream videos, do you?)
The ECC iLabs system is an instance of the Learn On Demand Systems (http://www.learnondemandsystems.com/) environment. They bill their product as “Experiential Learning Solutions,” and the name fits. This LMS isn’t just boring slide shows and droning videos; it’s real hands-on practice.
I should point out that iLabs is just one part of an ECC training course. ECC also provides a huge stack of printed material for the CEH and their other courses. But I’ll review that in another article and tie this review up for now.
Let me end by suggesting that this is a whole new game for the Certified Ethical Hacker credential. ECC has put huge work into updating the cert, as I’ve seen from brief looks at v10 materials. And the CEH is the pen testing/auditing cert that’s most recognized, and most requested, by the recruiters who are looking for my students. I feel pretty good about the prospects for bringing this cert to UNM, and attracting both current CS/MIS students and adult professionals. You’ll hear how it works out right here. Good luck!
Where HackThisSite.org is about … hacking that site, root-me.org is a whole platform. That means you can work your way through entire categories of Challenges: apps, crypto, forensics, stego, web clients and servers, and so forth.
This is a blast. Don’t take my word for it. Go see.
There’s an active and helpful community with forums sorted by Challenge. But it’s not immediately clear where you’re supposed to start. Let me suggest going to Challenges > Web – Client, and start at the top of the list you get. The initial Challenges really are easy, but things get tricky fast.
I use this site in my security and hacking classes largely because they can get a foothold almost immediately, then learn the process of researching (and asking) their way to solutions to other Challenges.
HackThisSite is the perfect place to start this list of online hacking platforms. It’s been around a long time, and has a really active community. Of course, the specific flavor of hacking you’ll pursue here is web application testing. The domain name doesn’t lie: you’re welcome to try most kinds of mapping, testing and cracking against it. It’s not fair game to DoS the site, because hey, we’re all trying to get something done here, and DoS is for skids.
You will need to create an account. Now is when you’ll want one of those multiple email identities we keep bitching about: Security is a Function of Segregation!
Check it out at the link below. If you’ve got an account on this site, let us know what you think, especially if you crack one of the really hard challenges.
Our whole purpose is educating and training up-and-coming hackers and security people. That’s why I run my CompTIA and EC-Council courses through this site, and add new videos and lessons as I get the chance.
But we don’t try to be everything; instead, we USE everything that’s useful and high-quality in our trainings. I’m always on the lookout for good, fresh material. And here’s a trove of it, not all related to IT or security, but some real gems among them.
Check out Dhawal Shah’s article on Quartz:
If you haven’t heard, universities around the world are offering their courses online for free (or at least partially free). These courses are collectively called MOOCs or Massive Open Online Courses.
In the past six years or so, close to 800 universities have created more than 8,000 of these MOOCs. And I’ve been keeping track of these MOOCs the entire time over at Class Central, ever since they rose to prominence.
In the past three months alone, over 200 universities have announced 600 such free online courses. I’ve compiled a list of them and categorized them according to the following subjects: Computer Science, Mathematics, Programming, Data Science, Humanities, Social Sciences, Education & Teaching, Health & Medicine, Business, Personal Development, Engineering, Art & Design, and finally Science. https://qz.com/1120344/200-universities-just-launched-600-free-online-courses-heres-the-full-list/
Okay: I’m a “trifecta instructor” of some 20 years, plus a stack of certs and degrees, including the CEH. I’m going in to test this morning after a quick review of scripting languages. Currently teaching Net+ and Sec+ so I’m pretty fresh, but have no real idea what to expect. Have you reviewed the Objectives? They’re huge and wildly all over the place … SOAP and REST? Really? I’ll post thoughts after taking the test this morning (3/10).
Oh, am I ever glad I’ve done a lot of coding/scripting, and reviewed my PHP, Python and Ruby before the test. Right off the bat I got a long series of long, detailed scenario and “drag and drop” questions that I let suck up too much time. One involved dragging lines or blocks of code from a random assortment into working locations in a script. Recognizing the language was instantly critical. Another “interactive” section comprised ten questions where I needed to identify one-liner payloads and the right control to block them. Be sure you’re very clear on the different types of SQL injection and XSS. The multiple-choice questions were, for a relief, pretty normal. Some did make clear to me some of the things I’ve never done: creating a sandbox, and setting up persistence on a target once it’s been compromised. I know the CEH pretty well (I’m on the review board), and no it is not particularly similar to this test. The CEH concentrates on higher-level tools, like gui exploit tools and specific-function apps. The Pentest+ seems much more focused on knowing low-level tools like nc and nmap, sometimes deeply into the switches and syntax. Definitely spend time working/playing with these so the long, complex multiple choices don’t become a blur. I got 120 question for my 165 minutes, plus a lengthy pre-test agreement and a fairly quick post-test review, both off the clock. It was a race all the way, especially with the intricately detailed commands to pick in multiple-choice questions. I only finished 105, racing to the end, though since I got so many questions maybe I’ll get some slack for that. 😉 Notably, I did NOT see any policy, risk calculations, subnetting or crypto, and no SOAP or REST. Reading other people’s experiences, though, I’m betting there’s a huge question pool (that will hopefully get trimmed down) and your mileage will likely differ. Do I think I passed? I practically never think so walking out of a test, but I practically always do pass. Is it a good alternative to the CEH? I’d say it’s more similar than different. Both certs are really much more focused on defense than offense. It still looks like the OSCP is the big dog of real pen testing, and that’s okay. We all need ladders with more rungs above us.
This is the third unit of my course for teachers, which brings together a lot of material I generated while working as Project Manager for the Hacker Highschool v2 Rewrite Project, 2012-2016. This session offers some hints on conducting classes, and help for you to be a great teacher of hacking. Polish your Google Hacking skills, learn to search more safely, show your students easy ways to start coding and start getting familiar with your eyes and ears on the network: Nmap and Wireshark.
Here’s the video of Unit 3, with the links it mentions below. Tell me what you think in the Comments, and thanks for taking a look.
Opening and Closing: Loops by Mark D’Angelo, copyright 2017
Cold Funk – Funkorama by Kevin MacLeod is licensed under a Creative Commons Attribution license (https://creativecommons.org/licenses/…)
Music promoted by Audio Library https://youtu.be/Vhd6Kc4TZls