labs
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
labs [2015/01/26 03:24] – mark | labs [2015/05/05 14:50] (current) – mark | ||
---|---|---|---|
Line 2: | Line 2: | ||
====== Lab 01 ====== | ====== Lab 01 ====== | ||
- | The goal of {{:se.pdf|Lab 01}} is to become familiar with the social engineering and perform some simple security related tasks | + | The goal of {{:lab01.pdf|Lab 01}} is to become familiar with the social engineering and perform some simple security related tasks |
===== Helpful material ===== | ===== Helpful material ===== | ||
Line 30: | Line 30: | ||
* **Dynamic linker** | * **Dynamic linker** | ||
]] [[wp> | ]] [[wp> | ||
- | * **Lecture** {{:lab4.ppt|Slides}} | + | * **Lecture** {{::plab03.pdf|Slides}} |
+ | ====== Lab 04 ====== | ||
- | < | + | In this {{:passwordcracking.pdf|Lab |
- | <!-- | + | |
- | + | ||
- | ====== Lab 01 ====== | + | |
- | + | ||
- | The goal of {{: | + | |
- | + | ||
- | ===== Helpful material ===== | + | |
- | + | ||
- | + | ||
- | + | ||
- | * **Computer Name** | + | |
- | * **Protocols** [[wp> | + | |
- | * **File systems** | + | |
- | * **Windows Security Authentication** [[wp> | + | |
- | * **Windows Admin Tasks** [[http:// | + | |
- | * **Linux Admin** | + | |
- | * **Lecture** | + | |
- | + | ||
- | + | ||
- | ====== Lab 02 ====== | + | |
- | The goal of {{: | + | |
- | sniffing tools to monitor user sessions on other hosts in the network, and perform active attacks, | + | |
- | such as redirecting traffic and issuing a denial of service attack. | + | |
- | + | ||
- | ===== Helpful material ===== | + | |
- | * **Sniffers** | + | |
- | * **Network Tools** [[wp> | + | |
- | * **Lecture** {{: | + | |
- | + | ||
- | + | ||
- | ====== Lab 03 ====== | + | |
- | In this {{:lab03.pdf|Lab | + | |
dictionary attack and precomputation attack. Recovering a password, | dictionary attack and precomputation attack. Recovering a password, | ||
known as password cracking, can be a devastating attack, especially | known as password cracking, can be a devastating attack, especially | ||
Line 79: | Line 48: | ||
* **Password Crackers** | * **Password Crackers** | ||
* **Password Dumping Utilities** | * **Password Dumping Utilities** | ||
- | * **Lecture** | + | * **Lecture** {{: |
- | ====== Lab 04 ====== | ||
- | The goal of the {{: | ||
- | ===== Helpful material | + | ====== Lab 05 ====== |
- | * **Sample Application** {{: | + | |
- | * **Java Decompiler** | + | |
- | * **Dynamic linker** | + | |
- | ]] [[wp> | + | |
- | * **Lecture** {{: | + | |
- | + | The goal of {{:network.pdf|Lab 05}} is to become familiar with network protocols (IP, TCP, ARP). Students will use | |
- | ====== Lab 05 ====== | + | sniffing |
- | The goal of the {{:lab05.pdf|Lab 05}} is to study tools that help find vulnerabilities | + | such as redirecting traffic and issuing a denial of service attack. |
===== Helpful material ===== | ===== Helpful material ===== | ||
- | | + | |
- | * **Lecture** {{:lab5.ppt|Slides}} | + | * **Network Tools** |
+ | * **Lecture** {{:lecture-lab2.ppt|Slides}} | ||
- | | ||
====== Lab 06 ====== | ====== Lab 06 ====== | ||
- | The goal of the {{:lab06.pdf|Lab 06}} is to gain first-hand experience on different types of overflow vulnerabilities. Such vulnerabilities can be utilized by a malicious user to alter the flow control of the program, even execute arbitrary pieces of code. For instance, buffer overflow vulnerability arises due to the mixing of the storage for data (e.g. buffers) and the storage for controls (e.g. return addresses): an overflow in the data part can affect the flow of the program, because an overflow can change the return address and as a result enable execution of malicious code | + | The goal of the {{:overflow.pdf|Lab 06}} is to gain first-hand experience on different types of overflow vulnerabilities. Such vulnerabilities can be utilized by a malicious user to alter the flow control of the program, even execute arbitrary pieces of code. For instance, buffer overflow vulnerability arises due to the mixing of the storage for data (e.g. buffers) and the storage for controls (e.g. return addresses): an overflow in the data part can affect the flow of the program, because an overflow can change the return address and as a result enable execution of malicious code |
===== Helpful material ===== | ===== Helpful material ===== | ||
Line 109: | Line 72: | ||
- | |||
====== Lab 07 ====== | ====== Lab 07 ====== | ||
- | The goal of the {{:lab07.pdf|Lab 07}} is to study intrusion protection strategies, and gain hands-on experience with different types of protection methods, such as intrusion detection and prevention software (IDPS), | + | The goal of {{: |
+ | |||
+ | ===== Helpful material ===== | ||
+ | |||
+ | |||
+ | |||
+ | * **Computer Name** | ||
+ | * **Protocols** [[wp> | ||
+ | * **File systems** | ||
+ | * **Windows Security Authentication** [[wp> | ||
+ | * **Windows Admin Tasks** [[http:// | ||
+ | * **Linux Admin** | ||
+ | |||
+ | |||
+ | ===== Part B ===== | ||
+ | |||
+ | |||
+ | The goal of the {{:lab07b.pdf|Lab 07}} is to study intrusion protection strategies, and gain hands-on experience with different types of protection methods, such as intrusion detection and prevention software (IDPS), | ||
auditing, and honeypots | auditing, and honeypots | ||
Line 120: | Line 99: | ||
* **Tools** | * **Tools** | ||
* **Lecture** {{: | * **Lecture** {{: | ||
- | |||
====== Game ====== | ====== Game ====== | ||
* **Rules** | * **Rules** | ||
- | * **Projects** | ||
- | * Team 1 | ||
- | * Team 2 | ||
- | * Team 3 | ||
- | * Team 4 | ||
- | * Team 5 | ||
- | |||
- | --> | ||
- | </ |
labs.1422242691.txt.gz · Last modified: 2015/01/26 03:24 by mark