====== EECS 4481 Labs ====== ====== Lab 01 ====== The goal of {{:lab01.pdf|Lab 01}} is to become familiar with the social engineering and perform some simple security related tasks ===== Helpful material ===== * **Lecture** {{:plab1.pdf|Introduction}},{{:se.pdf|Social Engineering}} ====== Lab 02 ====== The goal of Lab 02 is to become familiar with Web Application Attack Techniques. Students will use Burp and/or WebScarab, and perform active attacks, such as Injections, XSRF and XSS. **To prove you have completed the lab, you must demonstrate the following to the instructor**: • Show your 5 successful attacks. ===== Helpful material ===== * **Lecture** {{:lab2.pdf|Web Application Attack Techniques}} * **Web Target** [[https://google-gruyere.appspot.com|Gruyere]] ====== Lab 03 ====== The goal of the {{:lab03.pdf|Lab 03}} is to become familiar with various injection problems such as command injection, code injection etc. Injection attack is the exploitation of software bugs caused by processing invalid data. The goal of this lab is to study ways to exploit different injection vulnerabilities. ===== Helpful material ===== * **Sample Application** {{:casino-sample.gz|Casino}} * **Java Decompiler** [[http://jode.sourceforge.net/|JODE]] * **Dynamic linker** [[wp>Dynamic_linker|Dynamic linker]] [[http://www.yolinux.com/TUTORIALS/LibraryArchives-StaticAndDynamic.html|Static, Shared Dynamic and Loadable Linux Libraries ]] [[wp>DLL_injection|DLL Injection]] * **Lecture** {{::plab03.pdf|Slides}} ====== Lab 04 ====== In this {{:passwordcracking.pdf|Lab 04}}, you will recover passwords using two different techniques: dictionary attack and precomputation attack. Recovering a password, known as password cracking, can be a devastating attack, especially since most users will reuse the same password on different systems. Also, physical access to a machine represents an important opportunity for attackers to compromise the system and gain access. This will be explored by using bootable media to compromise an operating system. ===== Helpful material ===== * **Password Crackers** [[wp>John_the_Ripper|John the Ripper]] [[http://ophcrack.sourceforge.net/|ophcrack]] * **Password Dumping Utilities** [[wp>|Pwdump]] [[http://www.foofus.net/~fizzgig/fgdump/|fgdump]] * **Lecture** {{:lab3.ppt|Slides}} ====== Lab 05 ====== The goal of {{:network.pdf|Lab 05}} is to become familiar with network protocols (IP, TCP, ARP). Students will use sniffing tools to monitor user sessions on other hosts in the network, and perform active attacks, such as redirecting traffic and issuing a denial of service attack. ===== Helpful material ===== * **Sniffers** [[wp>Wireshark|Wireshark]] [[wp>Tcpdump|tcpdump]] * **Network Tools** [[wp>Netcat|netcat]] [[wp>nmap|nmap]] * **Lecture** {{:lecture-lab2.ppt|Slides}} ====== Lab 06 ====== The goal of the {{:overflow.pdf|Lab 06}} is to gain first-hand experience on different types of overflow vulnerabilities. Such vulnerabilities can be utilized by a malicious user to alter the flow control of the program, even execute arbitrary pieces of code. For instance, buffer overflow vulnerability arises due to the mixing of the storage for data (e.g. buffers) and the storage for controls (e.g. return addresses): an overflow in the data part can affect the flow of the program, because an overflow can change the return address and as a result enable execution of malicious code ===== Helpful material ===== * **Tools** [[wp>Metasploit_Project|Metasploit]] [[http://www.gnu.org/software/gdb/|gdb]] * **Papers** [[http://insecure.org/stf/smashstack.html|Smashing the Stack]] [[http://www.radarhack.com/tutorial/metasploit_for_dummies.pdf|Metasploit for dummies]] [[http://dougsko.com/msf3/msf3tut.pdf|Developing an Exploit Using the Metasploit Framework]] * **Lecture** {{:lab6.ppt|Slides}} ====== Lab 07 ====== The goal of {{:lphase01.pdf|Lab 07a}} is to practice configuring a small network ===== Helpful material ===== * **Computer Name** [[http://docstore.mik.ua/rfc/rfc1178.html|RFC1178]], [[http://compnetworking.about.com/od/windowsnetworking/qt/wcomputernaming.htm|Appropriately Name Networked Windows Computers]] * **Protocols** [[wp>Dynamic_Host_Configuration_Protocol|DHCP]], [[wp>Domain_Name_System|DNS]] and [[wp>Internet_Control_Message_Protocol|ICMP]] * **File systems** [[wp>NTFS| NTFS]] [[wp>ext3|ext3]] * **Windows Security Authentication** [[wp>Domain_controller|Domain Controller]] * **Windows Admin Tasks** [[http://technet.microsoft.com/en-us/library/cc784837%28WS.10%29.aspx|Common Administrative Tasks]] , [[wp>VBScript]], [[http://technet.microsoft.com/en-us/library/cc758918(WS.10).aspx|Logon Script]], [[http://www.computerperformance.co.uk/Logon/logon_scripts.htm|VBscript examples]] * **Linux Admin** [[http://tldp.org/LDP/lame/LAME/linux-admin-made-easy/|Linux Administration]] ,[[http://tldp.org/LDP/lame/LAME/linux-admin-made-easy/shadow-file-formats.html|Linux Password File]] ===== Part B ===== The goal of the {{:lab07b.pdf|Lab 07}} is to study intrusion protection strategies, and gain hands-on experience with different types of protection methods, such as intrusion detection and prevention software (IDPS), auditing, and honeypots ===== Helpful material ===== * **Tools** [[wp>Snort_(software)|Snort]] [[http://www.honeyd.org/|honeyd]] [[http://www.honeyd.org/|honeyd]] [[http://labrea.sourceforge.net/labrea-info.html|labrea]] * **Lecture** {{:lab7.ppt|Slides}} ====== Game ====== * **Rules** {{:game.ppt|Game}}