labs
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
labs [2015/01/21 13:39] – mark | labs [2015/05/05 14:50] (current) – mark | ||
---|---|---|---|
Line 2: | Line 2: | ||
====== Lab 01 ====== | ====== Lab 01 ====== | ||
- | The goal of {{:se.pdf|Lab 01}} is to become familiar with the social engineering and perform some simple security related tasks | + | The goal of {{:lab01.pdf|Lab 01}} is to become familiar with the social engineering and perform some simple security related tasks |
===== Helpful material ===== | ===== Helpful material ===== | ||
Line 13: | Line 13: | ||
**To prove you have completed the lab, you must demonstrate the following to the instructor**: | **To prove you have completed the lab, you must demonstrate the following to the instructor**: | ||
- | ---- | ||
• Show your 5 successful attacks. | • Show your 5 successful attacks. | ||
Line 22: | Line 21: | ||
* **Web Target** [[https:// | * **Web Target** [[https:// | ||
- | < | ||
- | <!-- | ||
- | ====== Lab 01 ====== | + | ====== Lab 03 ====== |
- | + | The goal of the {{:lab03.pdf|Lab | |
- | The goal of {{:lab01.pdf|Lab | + | |
===== Helpful material ===== | ===== Helpful material ===== | ||
+ | * **Sample Application** {{: | ||
+ | * **Java Decompiler** | ||
+ | * **Dynamic linker** | ||
+ | ]] [[wp> | ||
+ | * **Lecture** {{:: | ||
- | * **Computer Name** | + | ====== Lab 04 ====== |
- | * **Protocols** [[wp> | + | |
- | * **File systems** | + | |
- | * **Windows Security Authentication** [[wp> | + | |
- | * **Windows Admin Tasks** [[http:// | + | |
- | * **Linux Admin** | + | |
- | * **Lecture** | + | |
- | + | ||
- | ====== Lab 02 ====== | + | In this {{:passwordcracking.pdf|Lab |
- | The goal of {{: | + | |
- | sniffing tools to monitor user sessions on other hosts in the network, and perform active attacks, | + | |
- | such as redirecting traffic and issuing a denial of service attack. | + | |
- | + | ||
- | ===== Helpful material ===== | + | |
- | * **Sniffers** | + | |
- | * **Network Tools** [[wp> | + | |
- | * **Lecture** {{: | + | |
- | + | ||
- | + | ||
- | ====== Lab 03 ====== | + | |
- | In this {{:lab03.pdf|Lab | + | |
dictionary attack and precomputation attack. Recovering a password, | dictionary attack and precomputation attack. Recovering a password, | ||
known as password cracking, can be a devastating attack, especially | known as password cracking, can be a devastating attack, especially | ||
Line 66: | Line 48: | ||
* **Password Crackers** | * **Password Crackers** | ||
* **Password Dumping Utilities** | * **Password Dumping Utilities** | ||
- | * **Lecture** | + | * **Lecture** {{: |
- | + | ||
- | ====== Lab 04 ====== | + | |
- | The goal of the {{: | + | |
- | + | ||
- | ===== Helpful material ===== | + | |
- | * **Sample Application** {{: | + | |
- | * **Java Decompiler** | + | |
- | * **Dynamic linker** | + | |
- | ]] [[wp> | + | |
- | * **Lecture** {{: | + | |
====== Lab 05 ====== | ====== Lab 05 ====== | ||
- | The goal of the {{:lab05.pdf|Lab 05}} is to study tools that help find vulnerabilities | + | |
+ | The goal of {{:network.pdf|Lab 05}} is to become familiar with network protocols (IP, TCP, ARP). Students will use | ||
+ | sniffing | ||
+ | such as redirecting traffic and issuing a denial of service attack. | ||
===== Helpful material ===== | ===== Helpful material ===== | ||
- | | + | |
- | * **Lecture** {{:lab5.ppt|Slides}} | + | * **Network Tools** |
+ | * **Lecture** {{:lecture-lab2.ppt|Slides}} | ||
- | | ||
====== Lab 06 ====== | ====== Lab 06 ====== | ||
- | The goal of the {{:lab06.pdf|Lab 06}} is to gain first-hand experience on different types of overflow vulnerabilities. Such vulnerabilities can be utilized by a malicious user to alter the flow control of the program, even execute arbitrary pieces of code. For instance, buffer overflow vulnerability arises due to the mixing of the storage for data (e.g. buffers) and the storage for controls (e.g. return addresses): an overflow in the data part can affect the flow of the program, because an overflow can change the return address and as a result enable execution of malicious code | + | The goal of the {{:overflow.pdf|Lab 06}} is to gain first-hand experience on different types of overflow vulnerabilities. Such vulnerabilities can be utilized by a malicious user to alter the flow control of the program, even execute arbitrary pieces of code. For instance, buffer overflow vulnerability arises due to the mixing of the storage for data (e.g. buffers) and the storage for controls (e.g. return addresses): an overflow in the data part can affect the flow of the program, because an overflow can change the return address and as a result enable execution of malicious code |
===== Helpful material ===== | ===== Helpful material ===== | ||
Line 96: | Line 72: | ||
- | |||
====== Lab 07 ====== | ====== Lab 07 ====== | ||
- | The goal of the {{:lab07.pdf|Lab 07}} is to study intrusion protection strategies, and gain hands-on experience with different types of protection methods, such as intrusion detection and prevention software (IDPS), | + | The goal of {{: |
+ | |||
+ | ===== Helpful material ===== | ||
+ | |||
+ | |||
+ | |||
+ | * **Computer Name** | ||
+ | * **Protocols** [[wp> | ||
+ | * **File systems** | ||
+ | * **Windows Security Authentication** [[wp> | ||
+ | * **Windows Admin Tasks** [[http:// | ||
+ | * **Linux Admin** | ||
+ | |||
+ | |||
+ | ===== Part B ===== | ||
+ | |||
+ | |||
+ | The goal of the {{:lab07b.pdf|Lab 07}} is to study intrusion protection strategies, and gain hands-on experience with different types of protection methods, such as intrusion detection and prevention software (IDPS), | ||
auditing, and honeypots | auditing, and honeypots | ||
Line 107: | Line 99: | ||
* **Tools** | * **Tools** | ||
* **Lecture** {{: | * **Lecture** {{: | ||
- | |||
====== Game ====== | ====== Game ====== | ||
* **Rules** | * **Rules** | ||
- | * **Projects** | ||
- | * Team 1 | ||
- | * Team 2 | ||
- | * Team 3 | ||
- | * Team 4 | ||
- | * Team 5 | ||
- | |||
- | --> | ||
- | </ |
labs.1421847592.txt.gz · Last modified: 2015/01/21 13:39 by mark