labs
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| labs [2015/03/18 21:17] – mark | labs [2015/05/05 14:50] (current) – mark | ||
|---|---|---|---|
| Line 90: | Line 90: | ||
| - | The goal of the {{: | + | ===== Part B ===== |
| - | auditing, and honeypots | + | |
| - | ===== Helpful material ===== | ||
| - | * **Tools** | ||
| - | * **Lecture** {{: | ||
| - | + | The goal of the {{:lab07b.pdf|Lab 07}} is to study intrusion protection strategies, and gain hands-on experience with different types of protection methods, such as intrusion detection and prevention software (IDPS), | |
| - | + | ||
| - | + | ||
| - | < | + | |
| - | <!-- | + | |
| - | + | ||
| - | ====== Lab 01 ====== | + | |
| - | + | ||
| - | The goal of {{: | + | |
| - | + | ||
| - | ===== Helpful material ===== | + | |
| - | + | ||
| - | + | ||
| - | + | ||
| - | * **Computer Name** | + | |
| - | * **Protocols** [[wp> | + | |
| - | * **File systems** | + | |
| - | * **Windows Security Authentication** [[wp> | + | |
| - | * **Windows Admin Tasks** [[http:// | + | |
| - | * **Linux Admin** | + | |
| - | * **Lecture** | + | |
| - | + | ||
| - | + | ||
| - | ====== Lab 02 ====== | + | |
| - | The goal of {{: | + | |
| - | sniffing tools to monitor user sessions on other hosts in the network, and perform active attacks, | + | |
| - | such as redirecting traffic and issuing a denial of service attack. | + | |
| - | + | ||
| - | ===== Helpful material ===== | + | |
| - | * **Sniffers** | + | |
| - | * **Network Tools** [[wp> | + | |
| - | * **Lecture** {{: | + | |
| - | + | ||
| - | + | ||
| - | ====== Lab 03 ====== | + | |
| - | In this {{: | + | |
| - | dictionary attack and precomputation attack. Recovering a password, | + | |
| - | known as password cracking, can be a devastating attack, especially | + | |
| - | since most users will reuse the same password on different systems. | + | |
| - | Also, physical access to a machine | + | |
| - | represents an important opportunity for attackers to compromise the | + | |
| - | system and gain access. This will be explored by using bootable media to | + | |
| - | compromise an operating system. | + | |
| - | + | ||
| - | + | ||
| - | + | ||
| - | ===== Helpful material ===== | + | |
| - | * **Password Crackers** | + | |
| - | * **Password Dumping Utilities** | + | |
| - | * **Lecture** | + | |
| - | + | ||
| - | ====== Lab 04 ====== | + | |
| - | The goal of the {{: | + | |
| - | + | ||
| - | ===== Helpful material ===== | + | |
| - | * **Sample Application** {{: | + | |
| - | * **Java Decompiler** | + | |
| - | * **Dynamic linker** | + | |
| - | ]] [[wp> | + | |
| - | * **Lecture** {{: | + | |
| - | + | ||
| - | + | ||
| - | ====== Lab 05 ====== | + | |
| - | The goal of the {{: | + | |
| - | + | ||
| - | ===== Helpful material ===== | + | |
| - | * **Tools** | + | |
| - | * **Lecture** {{: | + | |
| - | + | ||
| - | + | ||
| - | ====== Lab 06 ====== | + | |
| - | The goal of the {{: | + | |
| - | + | ||
| - | ===== Helpful material ===== | + | |
| - | * **Tools** | + | |
| - | * **Papers** [[http:// | + | |
| - | * **Lecture** {{: | + | |
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | ====== Lab 07 ====== | + | |
| - | + | ||
| - | The goal of the {{:lab07.pdf|Lab 07}} is to study intrusion protection strategies, and gain hands-on experience with different types of protection methods, such as intrusion detection and prevention software (IDPS), | + | |
| auditing, and honeypots | auditing, and honeypots | ||
| Line 187: | Line 99: | ||
| * **Tools** | * **Tools** | ||
| * **Lecture** {{: | * **Lecture** {{: | ||
| - | |||
| ====== Game ====== | ====== Game ====== | ||
| * **Rules** | * **Rules** | ||
| - | * **Projects** | ||
| - | * Team 1 | ||
| - | * Team 2 | ||
| - | * Team 3 | ||
| - | * Team 4 | ||
| - | * Team 5 | ||
| - | |||
| - | --> | ||
| - | </ | ||
labs.1426713477.txt.gz · Last modified: by mark
