labs
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| labs [2015/02/06 16:00] – mark | labs [2015/05/05 14:50] (current) – mark | ||
|---|---|---|---|
| Line 48: | Line 48: | ||
| * **Password Crackers** | * **Password Crackers** | ||
| * **Password Dumping Utilities** | * **Password Dumping Utilities** | ||
| - | * **Lecture** | + | * **Lecture** |
| - | < | ||
| - | <!-- | ||
| - | ====== Lab 01 ====== | + | ====== Lab 05 ====== |
| - | + | ||
| - | The goal of {{: | + | |
| - | + | ||
| - | ===== Helpful material ===== | + | |
| - | + | ||
| - | + | ||
| - | + | ||
| - | * **Computer Name** | + | |
| - | * **Protocols** [[wp> | + | |
| - | * **File systems** | + | |
| - | * **Windows Security Authentication** [[wp> | + | |
| - | * **Windows Admin Tasks** [[http:// | + | |
| - | * **Linux Admin** | + | |
| - | * **Lecture** | + | |
| - | + | ||
| - | ====== Lab 02 ====== | + | The goal of {{:network.pdf|Lab |
| - | The goal of {{:lab02.pdf|Lab | + | |
| sniffing tools to monitor user sessions on other hosts in the network, and perform active attacks, | sniffing tools to monitor user sessions on other hosts in the network, and perform active attacks, | ||
| such as redirecting traffic and issuing a denial of service attack. | such as redirecting traffic and issuing a denial of service attack. | ||
| Line 79: | Line 61: | ||
| * **Network Tools** [[wp> | * **Network Tools** [[wp> | ||
| * **Lecture** {{: | * **Lecture** {{: | ||
| - | |||
| - | |||
| - | ====== Lab 03 ====== | ||
| - | In this {{: | ||
| - | dictionary attack and precomputation attack. Recovering a password, | ||
| - | known as password cracking, can be a devastating attack, especially | ||
| - | since most users will reuse the same password on different systems. | ||
| - | Also, physical access to a machine | ||
| - | represents an important opportunity for attackers to compromise the | ||
| - | system and gain access. This will be explored by using bootable media to | ||
| - | compromise an operating system. | ||
| + | ====== Lab 06 ====== | ||
| + | The goal of the {{: | ||
| ===== Helpful material ===== | ===== Helpful material ===== | ||
| - | | + | |
| - | * **Password Dumping Utilities** [[wp>|Pwdump]] [[http:// | + | * **Papers** [[http:// |
| - | * **Lecture** | + | * **Lecture** {{:lab6.ppt|Slides}} |
| - | ====== Lab 04 ====== | ||
| - | The goal of the {{: | ||
| - | ===== Helpful material ===== | ||
| - | * **Sample Application** {{: | ||
| - | * **Java Decompiler** | ||
| - | * **Dynamic linker** | ||
| - | ]] [[wp> | ||
| - | * **Lecture** {{: | ||
| - | ====== Lab 05 ====== | + | ====== Lab 07 ====== |
| - | The goal of the {{:lab05.pdf|Lab | + | |
| + | The goal of {{:lphase01.pdf|Lab | ||
| ===== Helpful material ===== | ===== Helpful material ===== | ||
| - | * **Tools** | ||
| - | * **Lecture** {{: | ||
| - | | ||
| - | ====== Lab 06 ====== | ||
| - | The goal of the {{: | ||
| - | ===== Helpful material ===== | ||
| - | * **Tools** | ||
| - | * **Papers** [[http:// | ||
| - | * **Lecture** {{: | ||
| + | * **Computer Name** | ||
| + | * **Protocols** [[wp> | ||
| + | * **File systems** | ||
| + | * **Windows Security Authentication** [[wp> | ||
| + | * **Windows Admin Tasks** [[http:// | ||
| + | * **Linux Admin** | ||
| - | |||
| + | ===== Part B ===== | ||
| - | ====== Lab 07 ====== | ||
| - | The goal of the {{:lab07.pdf|Lab 07}} is to study intrusion protection strategies, and gain hands-on experience with different types of protection methods, such as intrusion detection and prevention software (IDPS), | + | The goal of the {{:lab07b.pdf|Lab 07}} is to study intrusion protection strategies, and gain hands-on experience with different types of protection methods, such as intrusion detection and prevention software (IDPS), |
| auditing, and honeypots | auditing, and honeypots | ||
| Line 137: | Line 99: | ||
| * **Tools** | * **Tools** | ||
| * **Lecture** {{: | * **Lecture** {{: | ||
| - | |||
| ====== Game ====== | ====== Game ====== | ||
| * **Rules** | * **Rules** | ||
| - | * **Projects** | ||
| - | * Team 1 | ||
| - | * Team 2 | ||
| - | * Team 3 | ||
| - | * Team 4 | ||
| - | * Team 5 | ||
| - | |||
| - | --> | ||
| - | </ | ||
labs.1423238426.txt.gz · Last modified: by mark
