labs
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
labs [2015/03/18 21:13] – mark | labs [2015/05/05 14:50] (current) – mark | ||
---|---|---|---|
Line 74: | Line 74: | ||
- | ====== Lab 07a ====== | + | ====== Lab 07 ====== |
The goal of {{: | The goal of {{: | ||
Line 90: | Line 90: | ||
- | < | + | ===== Part B ===== |
- | <!-- | + | |
- | ====== Lab 01 ====== | ||
- | The goal of {{: | + | The goal of the {{:lab07b.pdf|Lab 07}} is to study intrusion protection strategies, and gain hands-on experience with different types of protection methods, such as intrusion detection and prevention software (IDPS), |
- | + | ||
- | ===== Helpful material ===== | + | |
- | + | ||
- | + | ||
- | + | ||
- | * **Computer Name** | + | |
- | * **Protocols** [[wp> | + | |
- | * **File systems** | + | |
- | * **Windows Security Authentication** [[wp> | + | |
- | * **Windows Admin Tasks** [[http:// | + | |
- | * **Linux Admin** | + | |
- | * **Lecture** | + | |
- | + | ||
- | + | ||
- | ====== Lab 02 ====== | + | |
- | The goal of {{: | + | |
- | sniffing tools to monitor user sessions on other hosts in the network, and perform active attacks, | + | |
- | such as redirecting traffic and issuing a denial of service attack. | + | |
- | + | ||
- | ===== Helpful material ===== | + | |
- | * **Sniffers** | + | |
- | * **Network Tools** [[wp> | + | |
- | * **Lecture** {{: | + | |
- | + | ||
- | + | ||
- | ====== Lab 03 ====== | + | |
- | In this {{: | + | |
- | dictionary attack and precomputation attack. Recovering a password, | + | |
- | known as password cracking, can be a devastating attack, especially | + | |
- | since most users will reuse the same password on different systems. | + | |
- | Also, physical access to a machine | + | |
- | represents an important opportunity for attackers to compromise the | + | |
- | system and gain access. This will be explored by using bootable media to | + | |
- | compromise an operating system. | + | |
- | + | ||
- | + | ||
- | + | ||
- | ===== Helpful material ===== | + | |
- | * **Password Crackers** | + | |
- | * **Password Dumping Utilities** | + | |
- | * **Lecture** | + | |
- | + | ||
- | ====== Lab 04 ====== | + | |
- | The goal of the {{: | + | |
- | + | ||
- | ===== Helpful material ===== | + | |
- | * **Sample Application** {{: | + | |
- | * **Java Decompiler** | + | |
- | * **Dynamic linker** | + | |
- | ]] [[wp> | + | |
- | * **Lecture** {{: | + | |
- | + | ||
- | + | ||
- | ====== Lab 05 ====== | + | |
- | The goal of the {{: | + | |
- | + | ||
- | ===== Helpful material ===== | + | |
- | * **Tools** | + | |
- | * **Lecture** {{: | + | |
- | + | ||
- | + | ||
- | ====== Lab 06 ====== | + | |
- | The goal of the {{: | + | |
- | + | ||
- | ===== Helpful material ===== | + | |
- | * **Tools** | + | |
- | * **Papers** [[http:// | + | |
- | * **Lecture** {{: | + | |
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | ====== Lab 07 ====== | + | |
- | + | ||
- | The goal of the {{:lab07.pdf|Lab 07}} is to study intrusion protection strategies, and gain hands-on experience with different types of protection methods, such as intrusion detection and prevention software (IDPS), | + | |
auditing, and honeypots | auditing, and honeypots | ||
Line 177: | Line 99: | ||
* **Tools** | * **Tools** | ||
* **Lecture** {{: | * **Lecture** {{: | ||
- | |||
====== Game ====== | ====== Game ====== | ||
* **Rules** | * **Rules** | ||
- | * **Projects** | ||
- | * Team 1 | ||
- | * Team 2 | ||
- | * Team 3 | ||
- | * Team 4 | ||
- | * Team 5 | ||
- | |||
- | --> | ||
- | </ |
labs.1426713230.txt.gz · Last modified: 2015/03/18 21:13 by mark