labs
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
labs [2015/02/06 15:59] – mark | labs [2015/05/05 14:50] (current) – mark | ||
---|---|---|---|
Line 32: | Line 32: | ||
* **Lecture** {{:: | * **Lecture** {{:: | ||
- | |||
- | |||
- | |||
- | < | ||
- | <!-- | ||
- | |||
- | ====== Lab 01 ====== | ||
- | |||
- | The goal of {{: | ||
- | |||
- | ===== Helpful material ===== | ||
- | |||
- | |||
- | |||
- | * **Computer Name** | ||
- | * **Protocols** [[wp> | ||
- | * **File systems** | ||
- | * **Windows Security Authentication** [[wp> | ||
- | * **Windows Admin Tasks** [[http:// | ||
- | * **Linux Admin** | ||
- | * **Lecture** | ||
- | |||
- | |||
- | ====== Lab 02 ====== | ||
- | The goal of {{: | ||
- | sniffing tools to monitor user sessions on other hosts in the network, and perform active attacks, | ||
- | such as redirecting traffic and issuing a denial of service attack. | ||
- | |||
- | ===== Helpful material ===== | ||
- | * **Sniffers** | ||
- | * **Network Tools** [[wp> | ||
- | * **Lecture** {{: | ||
- | |||
- | |||
- | ====== Lab 03 ====== | ||
- | In this {{: | ||
- | dictionary attack and precomputation attack. Recovering a password, | ||
- | known as password cracking, can be a devastating attack, especially | ||
- | since most users will reuse the same password on different systems. | ||
- | Also, physical access to a machine | ||
- | represents an important opportunity for attackers to compromise the | ||
- | system and gain access. This will be explored by using bootable media to | ||
- | compromise an operating system. | ||
Line 91: | Line 48: | ||
* **Password Crackers** | * **Password Crackers** | ||
* **Password Dumping Utilities** | * **Password Dumping Utilities** | ||
- | * **Lecture** | + | * **Lecture** |
- | ===== Helpful material ===== | ||
- | * **Password Crackers** | ||
- | * **Password Dumping Utilities** | ||
- | * **Lecture** | ||
- | ====== Lab 04 ====== | + | ====== Lab 05 ====== |
- | The goal of the {{:lab04.pdf|Lab | + | |
+ | The goal of {{:network.pdf|Lab | ||
+ | sniffing tools to monitor user sessions on other hosts in the network, and perform active attacks, | ||
+ | such as redirecting traffic and issuing a denial | ||
===== Helpful material ===== | ===== Helpful material ===== | ||
- | * **Sample Application** {{: | + | * **Sniffers** [[wp> |
- | * **Java Decompiler** [[http:// | + | * **Network Tools** [[wp>Netcat|netcat]] [[wp>nmap|nmap]] |
- | * **Dynamic linker** [[wp>Dynamic_linker|Dynamic linker]] [[http:// | + | * **Lecture** {{:lecture-lab2.ppt|Slides}} |
- | ]] [[wp>DLL_injection|DLL Injection]] | + | |
- | * **Lecture** {{:lab4.ppt|Slides}} | + | |
- | ====== Lab 05 ====== | ||
- | The goal of the {{: | ||
- | |||
- | ===== Helpful material ===== | ||
- | * **Tools** | ||
- | * **Lecture** {{: | ||
- | |||
- | | ||
====== Lab 06 ====== | ====== Lab 06 ====== | ||
- | The goal of the {{:lab06.pdf|Lab 06}} is to gain first-hand experience on different types of overflow vulnerabilities. Such vulnerabilities can be utilized by a malicious user to alter the flow control of the program, even execute arbitrary pieces of code. For instance, buffer overflow vulnerability arises due to the mixing of the storage for data (e.g. buffers) and the storage for controls (e.g. return addresses): an overflow in the data part can affect the flow of the program, because an overflow can change the return address and as a result enable execution of malicious code | + | The goal of the {{:overflow.pdf|Lab 06}} is to gain first-hand experience on different types of overflow vulnerabilities. Such vulnerabilities can be utilized by a malicious user to alter the flow control of the program, even execute arbitrary pieces of code. For instance, buffer overflow vulnerability arises due to the mixing of the storage for data (e.g. buffers) and the storage for controls (e.g. return addresses): an overflow in the data part can affect the flow of the program, because an overflow can change the return address and as a result enable execution of malicious code |
===== Helpful material ===== | ===== Helpful material ===== | ||
Line 126: | Line 72: | ||
- | |||
====== Lab 07 ====== | ====== Lab 07 ====== | ||
- | The goal of the {{:lab07.pdf|Lab 07}} is to study intrusion protection strategies, and gain hands-on experience with different types of protection methods, such as intrusion detection and prevention software (IDPS), | + | The goal of {{: |
+ | |||
+ | ===== Helpful material ===== | ||
+ | |||
+ | |||
+ | |||
+ | * **Computer Name** | ||
+ | * **Protocols** [[wp> | ||
+ | * **File systems** | ||
+ | * **Windows Security Authentication** [[wp> | ||
+ | * **Windows Admin Tasks** [[http:// | ||
+ | * **Linux Admin** | ||
+ | |||
+ | |||
+ | ===== Part B ===== | ||
+ | |||
+ | |||
+ | The goal of the {{:lab07b.pdf|Lab 07}} is to study intrusion protection strategies, and gain hands-on experience with different types of protection methods, such as intrusion detection and prevention software (IDPS), | ||
auditing, and honeypots | auditing, and honeypots | ||
Line 137: | Line 99: | ||
* **Tools** | * **Tools** | ||
* **Lecture** {{: | * **Lecture** {{: | ||
- | |||
====== Game ====== | ====== Game ====== | ||
* **Rules** | * **Rules** | ||
- | * **Projects** | ||
- | * Team 1 | ||
- | * Team 2 | ||
- | * Team 3 | ||
- | * Team 4 | ||
- | * Team 5 | ||
- | |||
- | --> | ||
- | </ |
labs.1423238378.txt.gz · Last modified: 2015/02/06 15:59 by mark