This is an old revision of the document!
Table of Contents
CSE 4481 Labs
Lab 01
The goal of Lab 01 is to become familiar with the Attack Lab environment, practice configuring a small network, and perform some simple security related tasks
Helpful material
- Computer Name - RFC1178, Appropriately Name Networked Windows Computers
- Windows Security Authentication Domain Controller
- Linux Admin Linux Administration ,Linux Password File
- Lecture - Slides
Lab 02
The goal of Lab 02 is to become familiar with network protocols (IP, TCP, ARP). Students will use sniffing tools to monitor user sessions on other hosts in the network, and perform active attacks, such as redirecting traffic and issuing a denial of service attack.
Helpful material
Lab 03
In this Lab 03, you will recover passwords using two different techniques: dictionary attack and precomputation attack. Recovering a password, known as password cracking, can be a devastating attack, especially since most users will reuse the same password on different systems. Also, physical access to a machine represents an important opportunity for attackers to compromise the system and gain access. This will be explored by using bootable media to compromise an operating system.
Helpful material
- Password Crackers John the Ripper ophcrack
- Lecture Slides
Lab 04
The goal of the Lab 04 is to become familiar with various injection problems such as command injection, code injection etc. Injection attack is the exploitation of software bugs caused by processing invalid data. The goal of this lab is to study ways to exploit different injection vulnerabilities.
Helpful material
Lab 05
The goal of the Lab 05 is to study tools that help find vulnerabilities in software applications.
Helpful material
- Lecture Slides
Lab 06
The goal of the Lab 06 is to gain first-hand experience on different types of overflow vulnerabilities. Such vulnerabilities can be utilized by a malicious user to alter the flow control of the program, even execute arbitrary pieces of code. For instance, buffer overflow vulnerability arises due to the mixing of the storage for data (e.g. buffers) and the storage for controls (e.g. return addresses): an overflow in the data part can affect the flow of the program, because an overflow can change the return address and as a result enable execution of malicious code
Helpful material
- Tools Metasploit gdb
- Lecture Slides