Symantec Cyber Readiness Challenge Player s Manual
|
|
- Marjorie Wiggins
- 8 years ago
- Views:
Transcription
1 Symantec Cyber Readiness Challenge Player s Manual Version 1.6 January 20, 2014
2 Table of Contents Introduction The Cyber Readiness Challenge Your Credentials Accessing the Competition Scoring Obtaining Support Continuing Professional Education (CPE) Credit Cyber Readiness Challenge Event Preparation Rules Resources Required Using a Live CD or a Virtual Machine on Your System Connecting to the Event Requirements Settings Connecting Using the Scoreboard and Team Chat Preface Accessing the Scoreboard The Scoreboard Navigating Between Levels Viewing Your Progress Support Team Chat VPN Configuration for Kali Launch Kali Client Install VPN Configuration for BackTrack 5R3 with Gnome Launch BackTrack Client Installation VPN Configuration for Windows Client Installation VPN Configuration for Mac OS X Client Installation Appendices Appendix A: Resources Symantec
3 Introduction Welcome to Symantec s Cyber Readiness Challenge! Sun Tzu once said, "Know both yourself and your enemy and you can win a hundred battles without jeopardy." The Symantec Cyber Readiness Challenge is an immersive, interactive capture the flag competition that models scenarios after the current threat landscape using realistic, virtualized IT infrastructure. Designed for many levels of technical skill and experience it puts participants in the hacker's shoes to understand their targets, technology and thought processes so they can ultimately better protect their organization and themselves. Offered as both online and live onsite events at numerous locations around the world, participants will have the opportunity to test, practice and develop their security skills within a unique and real world inspired environment developed by Symantec, the global leader in security. While participating in this event, you will have the opportunity to: Sharpen skills such as forensics, ethical hacking and more Expand your awareness of targets and threats Learn and try new techniques and tools Compete against your peers for prizes and bragging rights Earn Continuing Professional Education, or CPE, credit Bringing together some of the world's leading experts in IT security, this innovative competition will offer a keynote presentation by renowned security experts on the current security landscape and provides a fantastic environment for networking and knowledge sharing. For more information on future events, rules and technical requirements, please visit the following URL: Please read this manual for important information about connecting to and playing in the event Symantec
4 1 The Cyber Readiness Challenge This section will provide an overview of the Cyber Readiness Challenge experience. 1.1 Your Credentials Every participant has their own username and password for the event. Your username and password are used to connect to the event via a Virtual Private Network (VPN), and to log into the scoring system (the Scoreboard ) to get your objectives and enter your answers. The username ( handle ) and password you registered or were provided at the event are used to log into the VPN and the scoreboard. Do not lose or disclose your password to anyone. 1.2 Accessing the Competition The online environment for the Cyber Readiness Challenge is run from several datacenters globally. Prior to the start of the event each participant will receive an providing information about how to access their event. Each participant will need a computer or a virtual machine to access the environment. There are two main ways to participate: Using the participant s computer with a native operating system or an ethical hacking toolset such as Kali or BackTrack installed or dual-booted, such as using a live CD/DVD, connecting with VPN software provided by the online environment Using the participant s computer with an ethical hacking toolset running in a virtual machine, with the VM connecting with VPN software provided by the online environment More information about these options, including detailed setup instructions, will be provided in later sections of this document. 1.3 Scoring The objective is for individuals, or their teams for team events, to capture as many flags as possible during the event. All participants should log into the Scoreboard to see the questions and to enter their answers to score points. Each question and answer set is referred to as a flag. The competition is broken into levels, starting with level one (1), with flags for each level. A flag is any piece of information requested in the Scoreboard and is the only thing points will be awarded for. As you make your way through the event additional levels with more flags will open. Scoring is based on the capture of flags for each of the five (5) stages of a cyber attack: Reconnaissance, Incursion, Discovery, Capture and Exfiltration. There will be varying degrees of difficulty for sets of flags: easy (worth 300 points), moderate (worth 500 points), and hard (worth 1000 points). Hints will be available for some of the early levels. Up to three (3) hints may be taken to help with capturing a flag. Taking a hint will reduce the point value of a flag; taking all three hints will reduce it to zero (0) points. If you get stuck on a flag, don t get discouraged! The hints are there to help make this a fun learning experience. Don t be afraid to take them it s your opportunity to learn something new about security and the risks we face. Scoring a Flag Capture Description: A list of flags will be provided in the Scoreboard. Examples include: 1. Provide the clear text password of a fictional user. 2. Breach a system or application and retrieve a credit card number. 3. Find a specific file and provide the MD5 value Symantec
5 Scoring using the Scoreboard : 1. Successfully find the answer to a flag (question) requested on the Scoreboard. 2. If you are not already, log into the Scoreboard using your username (handle) and password. Note that this is only available while connected to the event; it is not an Internet site. 3. Enter the answer for the flag. You will receive immediate feedback if the answer is correct. You will not be penalized for incorrect answers. To View Your Score To view your score, the list of flags, or to submit captured flags, log on to the Scoreboard using your username and password while connected via VPN to the online event. 1.4 Obtaining Support Support during the competition will be available several ways: From Symantec employees staffing the event Through support options available in the Scoreboard once connected to the environment (documented in a later section) By to Cyber_Readiness_Support@symantec.com at any time, including if participants are having problems connecting to the environment to access support in the Scoreboard 1.5 Continuing Professional Education (CPE) Credit You will be eligible for continuing education credits, or CPEs, towards certification requirements from organizations such as (ISC) 2 and ISACA, and possibly from others as well. A Verification of Attendance form will be provided onsite or 2-4 weeks after completion of the event. Please refer to your accreditation guidelines for specific guidance including reporting requirements. Changes to the 2013 (ISC) 2 Continuing Professional Education (CPE) Policies & Guidelines allow for Group A credit for this type of activity under Performing unique projects and activities on-the-job Symantec
6 2 Cyber Readiness Challenge Event Preparation 2.1 Rules Please refer to the Contest Rules on the Cyber Readiness Challenge site at The objective of this test is to try to breach the environment without causing disruption or damage. As such testing that may disable services, alter or destroy files or content, interfere with other participants ability to play, or be a Denial of Service (DoS) may not be conducted unless otherwise directed during the event. Any individual found intentionally interfering with game play may be disqualified. 2.2 Resources Required Participants will need to have access to certain resources, such as an ethical hacking (or attack) environment, for game play. There are several options to meet these resources. Some participants may have existing resources at their disposal, including a preferred attack environment and tools for their use; you are encouraged to use what you are familiar with. 1. Participants will provide their own computer, such as a laptop, with the following minimum recommended requirements: 1 Ghz Intel x86 compatible processor (2 Ghz with virtualization extensions recommended) 2 GB of RAM 20 GB of free disk space Operating system including Windows 2000 or later, OS X or later, Linux /2.6.4 or later, and/or Kali Linux (BackTrack is no longer recommended as it has been replaced by Kali) Virtualization, if desired, including VMware Workstation or Player (for Windows or Linux), VMware Fusion (for Mac OS X), or VirtualBox (multiple OS') The latest version of Java on Mac OS X 2. Participants will provide their own ethical hacking toolkit, such as Backtrack or Kali 3. Internet access may be required for events, such as online Challenges; for onsite events, a wired and/or wireless network may be used Network requirements for all participants: Participants will be using a VPN from their system and will need to have access to the Internet to connect (e.g. home network, coffee shop or Internet café, permitted office or corporate network, etc.) Since an encrypted networking such as the Virtual Private Network (VPN) will be used to access the online competition network, Internet service providers will not see or be affected by any attack traffic used during play. Remember to connect to the VPN before starting any scans or event-related activity to prevent accidentally affecting others. For participants using their own computer: Participants are welcome to use their own computer, such as: Dual-booting to an installed or a live CD/DVD/USB image such as Kali Linux A virtual machine installed on their system (for example, using the free VMware Player or free VirtualBox with Kali) If you currently do not have an ethical hacking environment, or a toolset, we recommend trying Kali. It is free to download and use. Due to some reported issues with the latest 64-bit version we recommend the 32-bit for now Symantec
7 2.3 Using a Live CD or a Virtual Machine on Your System Many participants may want to use the Kali Linux to play the game. Kali is pre-configured with a variety of ethical hacking software and is a quick and easy way to get the tools necessary to participate. The latest version can always be found at We recommend using the 32-bit version. Unless you install Kali on your computer, which is an option, there are two main ways to run it: 1) Boot from a Kali Linux Live CD or Kali Linux Live USB Drive This is the best option if you are a beginner to the information security world. By booting from a live CD, you get to use a fully featured version of Kali Linux without actually installing it or modifying your hard drive in any way. If you re setting up for the event at the last minute, go with this option, as it will get you playing in the shortest amount of time. However, know that the performance will not be as good as using a virtual machine or installing to a hard drive, especially with a CD or a DVD. It will still be usable. Once you have downloaded the appropriate ISO file from the Kali Linux website burn it to a CD or a DVD with software such as ImgBurn. Alternatively, if you want to make a live USB drive, follow these instructions: Finally, restart your computer and interrupt your normal system startup. Then, select the CD/DVD/USB drive from the boot options menu. 2) Run Kali Linux in a Virtual Machine A virtual machine is a virtual computer that exists inside your physical computer. By using free software such as VMware Player or VirtualBox, you can run Kali Linux inside a virtual machine that will run inside the operating system that you already have on your computer. This option is useful if you want to have quick access to various Windows tools that don t exist on Kali. Additionally, with this method you can connect to the game network from inside the virtual machine, leaving the network of your main operating system still able to access the Internet in case you have to do any research. If you go with this option, make sure that you configure the machine s network adapter to use the bridged option, which gives Kali direct access to the network. Using this mode will ensure that you bypass several networking and hacking pitfalls. Once the virtual machine is created, you can either live boot from the downloaded ISO file (if you are short on time) or perform a normal Kali Linux install (if you want the best performance). More information on installing Kali Linux can be found here: Symantec
8 3 Connecting to the Event 3.1 Requirements Online events are accessed using a Virtual Private Network (VPN). The VPN software will be provided during the connection and setup process, if required. Step by step setup instructions follow for several different environments: Kali BackTrack Microsoft Windows Mac OS X Note that once you are inside the game using the VPN provided or by directly connecting in an in-person event you will not be able to access the Internet (for security purposes). However, feel free to disconnect and reconnect from the game to do research as many times as you like, or use another system for Googling. Once connected to the provided VPN address: The scoreboard address will be provided; you should log into the scoreboard as soon as you are connected The target address range will be provided; nothing outside this range should be attacked 3.2 Settings VPN Settings Field VPN Address Username Password Target Address Range (These are the attack targets in the online event) Nothing outside this range should be attacked! Scoreboard Do not attack or attempt to brute force the scoreboard! Setting Provided by or at the start of the event Selected by each participant when registering, or provided at the event Set by each participant when registering, or provided at the event Provided by or in the Scoreboard once the event starts Provided by or at the start of the event 3.3 Connecting When you connect to the online environment using the address (URL) provided and your web browser, you will be presented with a login screen. Use your username (handle) and password set or provided for the event. The following sections of this document will provide instructions for setting up the VPN software. Once connected to the online environment: You should log into the Scoreboard as soon as you are connected The target address range will be provided in the Scoreboard; nothing outside this range should be attacked Symantec
9 4 Using the Scoreboard and Team Chat 4.1 Preface This section documents some of the operation and features of the Scoreboard. The Scoreboard is used to obtain the flags, or questions you will answer to score points. It also has a team chat so that you can talk to and work with your team members, and support options to report problems and request support from the Cyber Readiness Challenge team. 4.2 Accessing the Scoreboard You can access the Scoreboard using a browser. Note that it is only available while connected to the event; it is not an Internet site. 4.3 The Scoreboard As you can see in this example the Scoreboard shows several types of information, such as which level you are on, the flags for the level, your score (points), the time remaining in the competition, hints available for each flag, etc. 4.4 Navigating Between Levels On the top-left-hand corner near LEVEL you will see the list of levels that you currently have access to. At the beginning, you will only have access to level 1, but as you progress through the game you will unlock more levels. Use the links in this section to navigate back and forth between different levels to review your progress or work on flags you may have skipped. 4.5 Viewing Your Progress You can view information about your progress using the Progress link in the top menu Symantec
10 4.6 Support There is a trouble ticket system built into the Scoreboard. If you have problems at any point during the game, click on the "Support" link on the top menu. From there, you can submit a trouble ticket that will be seen by the Cyber Readiness Challenge team. When your ticket has been replied to, Scoreboard will automatically notify you via the top menu, like this: If you are having a problem with an individual flag you can report it using the Report a Problem button found on each flag. This will open a ticket noting the flag you are having problems with. Additionally, administrators can also put out global tickets. If you have never submitted any tickets but you still see that you have a support notification, this is probably the reason. Global tickets are used to convey information quickly to all of the players at once. For example, a global ticket would be issued if a particular flag is malfunctioning. 4.7 Team Chat From the Team Chat link on the top menu you can access a separate web page that will allow you to chat with your team members. This provides a way for the team to exchange ideas and collaborate on flags Symantec
11 5 VPN Configuration for Kali Please note that these instructions should also apply to other versions of Linux. BackTrack is covered separately in this document. If you are using a virtual computer requested during registration you will NOT need to perform these steps. The VPN software is already installed for you. 5.1 Launch Kali Step 1 Start Kali, either native or a virtual machine (VM). If you are using a VM, bridged mode is recommended. a. Log in with your credentials (the default username is root, and password is the one that was set at the time of installation). b. Make sure you have a valid IP address and can access the Internet (see your network admin for help). 5.2 Client Install Step 3 Install AnyConnect Client. a. Kali s default Internet browser is called Iceweasel. Start Iceweasel by clicking on the following icon on the menu bar. b. Navigate to the VPN address URL that was given to you in . c. Log in with your user name and password. d. You will be prompted to install missing plugins since Java is not automatically configured for use within Iceweasel. Do NOT install the missing plugin. Wait until the Sun Java applet install times out and then click on the Linux i386 link to download the VPN software installer. e. Download the vpnsetup.sh file to the /root folder of the file system. f. Execute the ls command in a terminal window and you should see the vpnsetup.sh file Symantec
12 g. Change the permissions on the file by performing: chmod +x vpnsetup.sh h. Execute the ls command again to ensure that the file is now executable. If the file is green, then it can be executed. i. Execute the vpnsetup.sh script by typing:./vpnsetup.sh j. Start the VPN client GUI by clicking on the menu icon in the lower left corner, navigating Applications to Internet, and selecting the Cisco AnyConnect Secure Mobility Client Symantec
13 Note: if you are on a live (not installed) version of Kali the AnyConnect option will not automatically be added to the menu during installation. If this is the case you can start the client in a terminal window using the nohup /opt/cisco/anyconnect/bin/vnpui & command. k. Enter the VPN URL address used previously (provided to you in ). l. When prompted, enter your username and password from registration. m. The VPN should now start; to test, open Iceweasel and log into the scoreboard. You are now connected begin working through the flags in the scoreboard and attacking the permitted target address range once directed to do so once the event begins! Symantec
14 6 VPN Configuration for BackTrack 5R3 with Gnome Please note that these instructions should also apply to most versions of Linux. 6.1 Launch BackTrack Step 1 Start BackTrack, either native or a virtual machine (VM). If you are using a VM, bridged mode is recommended. a. Log in with your credentials (the default username is root and password is toor). b. Make sure you have a valid IP address and can access the Internet (see your network admin for help). c. Start the Gnome desktop by typing startx and press the Enter. 6.2 Client Installation a. Start Firefox by clicking on the top left hand corner. Select Internet -> Firefox Web Browser. b. Navigate to the VPN address URL that was given to you in . c. Click on the NoScript icon next to the location bar and Allow cyberreadinesschallenge.com Symantec
15 d. Log in with your user name and password. e. Wait until the Sun Java applet install times out and then click on the Linux i386 link. f. Transfer the vpnsetup.sh file to the /root folder of the Linux OS. g. Start the Terminal application and change directory to /root (cd /root) Symantec
16 h. Execute the ls command and you should see the vpnsetup.sh file. i. Change the permissions on the file by performing chmod +x vpnsetup.sh j. Execute the ls command again to ensure that the file is now executable. If the file is green, then it can be executed. k. Execute the vpnsetup.sh script by executing./vpnsetup.sh Symantec
17 l. If the script asks you to accept the terms in the license agreement, press Y and Enter. m. Start the VPN client GUI by clicking on the menu icon in the lower left corner, navigating to Internet, and selecting the Cisco VPN GUI. n. Enter the VPN URL address used previously (provided to you in ). o. When prompted, enter your username and password from registration. p. The VPN should now start; to test, open Firefox and log into the scoreboard. q. You are now connected begin working through the flags in the scoreboard and attacking the permitted target address range once the event begins! Symantec
18 7 VPN Configuration for Windows 7.1 Client Installation Step 1 Start Windows, either native or a virtual machine (VM); if you are using a VM, bridged mode is recommended. a. Log in with your credentials. b. Make sure you have a valid IP address and can access the Internet (see your network admin for help). Step 2 Open Internet Explorer a. Launch Internet Explorer. b. Click on Tools and then Internet Options. c. Click on the Security tab Symantec
19 d. Click on Trusted sites. Next click on Sites. e. In the Add this website to the zone field enter the VPN IP Address or domain that you were given during registration and click the Add button. f. Navigate Internet Explorer to the VPN URL Address that you were given during registration Symantec
20 g. Login to the Cisco SSL VPN Service Portal with your user name and password Symantec
21 h. Click on the yellow banner to allow the AnyConnect add-on to be installed. i. When the User Account Control pops up, click the Yes button. j. The web page might show an error that VPN connection establishment failed. However, if you click on the Cisco AnyConnect Icon in the notifications area you will see that in fact the VPN is connected Symantec
22 m. Open your browser and log into the scoreboard. You are now connected begin working through the flags in the scoreboard and attacking the permitted target address range once the event begins! Symantec
23 8 VPN Configuration for Mac OS X 8.1 Client Installation Step 1 The following instructions are for Mac OS X, tested on the Intel 64 bit platform. OS X within a virtual machine environment is not supported. Pre-requisite: Make sure the latest version of Java is installed. Use java.com to download and install if needed. a. Log in with your credentials. b. Make sure you have a valid IP address and can access the Internet (see your network admin for help). Step 2 a. Navigate Safari to the IP Address or host that you were given during registration. b. Login to the Cisco SSL VPN Service Portal with your user name and password Symantec
24 c. If the following screen appears, you may not have Java installed. Obtain Java from java.com, install it, and retry the previous step of logging into the SSL VPN Service Portal. d. Click on Yes if the following security warning screen pops up Symantec
25 e. Click on Run when the following screen pops up: f. At this point, the Client Downloader should appear: g. If prompted for system credentials, enter them and click OK: Symantec
26 h. If the installation was successful, the VPN connection should establish: i. Once connected, the following icon should appear as a Menu Bar Extra: j. The VPN should now start; to test, open Firefox and log into the scoreboard. k. You are now connected begin working through the flags in the scoreboard and attacking the permitted target address range! l. To quit or disconnect the VPN, click on the menu bar extra icon and select Disconnect or Quit Cisco AnyConnect. m. After installation, the VPN client can be accessed in the future by opening Cisco AnyConnect Secure Mobility Client from the Applications folder: You are now connected begin working through the flags in the scoreboard and attacking the permitted target address range once the event begins! Symantec
27 Appendices Appendix A: Resources Symantec
28 Appendix A: Resources The following resources may be useful: Kali Linux Metasploit Kali Linux is the next generation of BackTrack, is a penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Based on open-source tools it has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester. The i386 version is currently recommended for VPN compatibility, and VMware and ISO images are available. Kali Linux: A collaboration of the open source community and Rapid7, Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits and is available at: Rapid7 has some Metasploit tutorial videos that provide a quick introduction to network scanning and basic exploitation. They will help in getting started with Metasploit Community and in understanding basic methodology. The Armitage graphical user interface (GUI) makes working with Metasploit easier, and is built into BackTrack. A good introduction and how-to is available at: Setting up a Penetration Testing Lab Rapid7 and Metasploit have a good how-to for setting up a penetration testing lab to learn or attempt exploits. It s available at: Symantec
Penetration Testing LAB Setup Guide
Penetration Testing LAB Setup Guide (Internal Attacker - Beginner version) By: magikh0e - magikh0e@ihtb.org Last Edit: July 07 2012 This guide assumes a few things... 1. You have installed Backtrack before
More informationWindows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook
Windows and MAC User Handbook How to Connect Your PC or MAC Remotely and Securely to Your U.S. Department of Commerce Account Developed for You by the Office of IT Services (OITS)/IT Service Desk *** For
More informationVMware Horizon FLEX User Guide
Horizon FLEX 1.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
More informationVulnerability analysis
Vulnerability analysis License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents License Contents
More informationIS L06 Protect Servers and Defend Against APTs with Symantec Critical System Protection
IS L06 Protect Servers and Defend Against APTs with Symantec Critical System Protection Description Lab flow At the end of this lab, you should be able to Discover how to harness the power and capabilities
More informationIDS and Penetration Testing Lab ISA656 (Attacker)
IDS and Penetration Testing Lab ISA656 (Attacker) Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible
More informationVPN AND CITRIX INSTALLATION GUIDE
Information Technology VPN AND CITRIX INSTALLATION GUIDE Overview of the CISCO SSL VPN Portal TMCC's Cisco SSL Virtual Private Network (VPN) portal was designed to give TMCC employees secure access to
More informationVMware Horizon FLEX User Guide
Horizon FLEX 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
More informationVirtual Server Installation Manual April 8, 2014 Version 1.8
Virtual Server Installation Manual April 8, 2014 Version 1.8 Department of Health and Human Services Administration for Children and Families Office of Child Support Enforcement REVISION HISTORY Version
More informationSSL VPN Service. Once you have installed the AnyConnect Secure Mobility Client, this document is available by clicking on the Help icon on the client.
Contents Introduction... 2 Prepare Work PC for Remote Desktop... 4 Add VPN url as a Trusted Site in Internet Explorer... 5 VPN Client Installation... 5 Starting the VPN Application... 6 Connect to Work
More informationClientless SSL VPN Users
Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you
More informationInstructions for Department of Public Health (DPH) WebConnect (Mac)
Instructions for Department of Public Health (DPH) WebConnect (Mac) UCSF at SFGH Computing and Network Services Hours of Operation: Monday Friday 8 AM to 5PM Pacific Time Website: http://tiny.ucsf.edu/sfghcns
More informationInstruction Guide Mentor/Coach Free Play Practice Event November 2015
Instruction Guide Mentor/Coach Free Play Practice Event November 2015 1 San Diego Mayor s Cup Mentor/Coach Practice Round Guide Table of Contents Introduction 3 Tips for Success 3 Round Times 3 Linux Virtual
More informationVMware Horizon FLEX User Guide
Horizon FLEX 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
More informationThe BackTrack Successor
SCENARIOS Kali Linux The BackTrack Successor On March 13, Kali, a complete rebuild of BackTrack Linux, has been released. It has been constructed on Debian and is FHS (Filesystem Hierarchy Standard) complaint.
More informationNSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
More informationAccessing vlabs using the VMware Horizon View Client for OSX
Accessing vlabs using the VMware Horizon View Client for OSX This document will demonstrate how to download, install, and connect to a virtual lab desktop from a personal Mac OSX computer using the VMware
More informationRemote Access Services Apple Macintosh - Installation Guide
Remote Access Services Apple Macintosh - Installation Guide Version. February, 05 P age Contents GETTING STARTED... JAVA VERIFICATION, INSTALLATION, AND CONFIGURATION... Checking Mac OS version... Java
More informationNet 2. NetApp Electronic Library. User Guide for Net 2 Client Version 6.0a
Net 2 NetApp Electronic Library User Guide for Net 2 Client Version 6.0a Table of Contents 1 INTRODUCTION AND KEY FEATURES... 3 SOME OF THE KEY FEATURES INCLUDE:... 3 INSTALLATION PREREQUISITES:... 3 2
More informationVerax Service Desk Installation Guide for UNIX and Windows
Verax Service Desk Installation Guide for UNIX and Windows March 2015 Version 1.8.7 and higher Verax Service Desk Installation Guide 2 Contact Information: E-mail: sales@veraxsystems.com Internet: http://www.veraxsystems.com/
More informationRemote Access Services Microsoft Windows - Installation Guide
Remote Access Services Microsoft Windows - Installation Guide Version 3.1 February 23, 2015 1 P age Contents GETTING STARTED... 3 JAVA VERIFICATION, INSTALLATION, AND CONFIGURATION... 3 Windows XP... 3
More informationWhy do I need a pen test lab? Requirements. Virtual Machine Downloads
Why do I need a pen test lab? Hacking and or scanning machines without consent is against the law in most countries To become an effective penetration tester or ethical hacker you need to practice to enhance
More informationCharter Business Desktop Security Administrator's Guide
Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...
More informationJunos Pulse VPN Client Installation
Junos Pulse VPN Client Installation Windows 7 Installation p 2-6 Windows 8.1 Installation p 7-11 Macintosh version 10.6 and greater p 12-17 *This vpn appliance is to replace the Legacy SP vpn client Cisco
More informationDOE VPN Client Installation and Setup Guide March 2011
DOE VPN Client Installation and Setup Guide March 2011 Table of Contents Introduction... 3 System Requirements... 3 Microsoft Windows... 3 Mac OS X... 4 Windows... 4 Installation for the Cisco AnyConnect
More informationSSL VPN Support Guide
P a g e 1 SSL VPN Support Guide Revision date: 5/4/10 P a g e 2 Table of Contents Before calling the Support Desk..pg 3 What the Support Desk can assist users with. pg 4 Instructions for PC users (Internet
More informationServer Configuration and Deployment (part 1) Lotus Foundations Essentials
Server Configuration and Deployment (part 1) Lab Manual Lotus Foundations Essentials Introduction: In this lab, students will configure an IBM Lotus Foundations server using a virtual image to perform
More informationScholastic Reading Inventory Installation Guide
Scholastic Reading Inventory Installation Guide For use with Scholastic Reading Inventory version 2.0.1 or later and SAM version 2.0.2 or later Copyright 2011 by Scholastic Inc. All rights reserved. Published
More informationMicrosoft Windows Installation and Troubleshooting Guide
Remote Access Services Microsoft Windows - Installation and Troubleshooting Guide Version 2.1 February 19, 2013 1 P age TABLE OF CONTENTS 1 MICROSOFT WINDOWS XP INSTALLATION PROCEDURES... 3 2 MICROSOFT
More informationMiraCosta College now offers two ways to access your student virtual desktop.
MiraCosta College now offers two ways to access your student virtual desktop. We now feature the new VMware Horizon View HTML access option available from https://view.miracosta.edu. MiraCosta recommends
More informationHow To Use Senior Systems Cloud Services
Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To
More informationSSL VPN Support Guide
Page 1 SSL VPN Support Guide Revision date: 4/16/14 Page 2 Table of Contents Before calling the Service Desk..pg 3 What the Service Desk can assist users with. pg 4 Instructions for PC users (Internet
More informationVPN Web Portal Usage Guide
VPN Web Portal Usage Guide Table of Contents WHAT IS VPN WEB CLIENT 4 SUPPORTED WEB BROWSERS 4 LOGGING INTO VPN WEB CLIENT 5 ESTABLISHING A VPN CONNECTION 6 KNOWN ISSUES WITH MAC COMPUTERS 6 ACCESS INTRANET
More informationInstalling Oracle 12c Enterprise on Windows 7 64-Bit
JTHOMAS ENTERPRISES LLC Installing Oracle 12c Enterprise on Windows 7 64-Bit DOLOR SET AMET Overview This guide will step you through the process on installing a desktop-class Oracle Database Enterprises
More informationVPN: Virtual Private Network Setup Instructions
VPN: Virtual Private Network Setup Instructions Virtual Private Network (VPN): For e-journals and web-based databases, plus applications like EndNote's Online Search (formerly "Connect") and business systems.
More informationNon-Employee VPN Quick Start Guide
1. Computer Requirements Pentium-based personal computer Windows XP SP3: 128 MB RAM Windows Vista Windows 7 Home/Pro 10 MB hard disk space Microsoft Internet Explorer 6.0 or later or Mozilla Firefox 1.0
More informationWA1826 Designing Cloud Computing Solutions. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1
WA1826 Designing Cloud Computing Solutions Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2 - Minimum
More informationIBM Remote Lab Platform Citrix Setup Guide
Citrix Setup Guide Version 1.8.2 Trademarks IBM is a registered trademark of International Business Machines Corporation. The following are trademarks of International Business Machines Corporation in
More informationVPN: Using WebVPN SSL Client This document outlines the process for using the WebVPN SSL with Internet Explorer and Firefox
VPN: Using WebVPN SSL Client This document outlines the process for using the WebVPN SSL with Internet Explorer and Firefox 1. Introduction The WebVPN SSL Client does not require the manual installation
More informationDSI File Server Client Documentation
Updated 11/23/2009 Page 1 of 10 Table Of Contents 1.0 OVERVIEW... 3 1.0.1 CONNECTING USING AN FTP CLIENT... 3 1.0.2 CONNECTING USING THE WEB INTERFACE... 3 1.0.3 GETTING AN ACCOUNT... 3 2.0 TRANSFERRING
More informationHow to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
More informationGuide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication This document serves as a How To reference guide for employees to execute the following MFA tasks: 1.
More informationInstallation Guide for Pulse on Windows Server 2012
MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
More informationInstruction Guide Practice Round 2 High School August 2015
Instruction Guide Practice Round 2 High School August 2015 1 Maryland Cyber Challenge Practice Round Instruction Guide Table of Contents Introduction 3 Tips for Success 3 Round Times 3 Linux Virtual Machine
More informationVerizon Internet Security Suite Powered by McAfee. Installation Guide for Business Users (Mac)
Verizon Internet Security Suite Powered by McAfee Installation Guide for Business Users (Mac) ii Contents Introduction 3 System requirements 5 Installing Verizon Internet Security Suite 7 Signing in to
More informationBasic Citrix Manual. Apple Computers and Laptops. Version 1.3. Created by Joshua Lindemann
Basic Citrix Manual Version 1.3 Created by Joshua Lindemann Table of Contents Technology Services Help Desk... 3 Background... 4 Citrix Virtual Environment... 4 Wireless Access... 4 Security... 4 Configuring
More informationTSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
More informationVPN: Using the WebVPN SSL Client
IS1504 VPN: Using the WebVPN SSL Client Page 1 of 10 VPN: Using the WebVPN SSL Client This document outlines the process for using the WebVPN SSL client with Internet Explorer and Firefox User Guide IS1504
More informationAvaya IP Office 9.1. Set Up Guide for The IP Office Anywhere Demo Platform
Avaya IP Office 9.1 Set Up Guide for The IP Office Anywhere Demo Platform Date: February 2015 Version: 2.0 Subject: Avaya IP Office 9.1 Anywhere Demonstration Set Up Guide Regional Availability: Global
More informationAT-UWC Wireless LAN Controller. Installation Guide. Software Version
Software Version Installation Guide This Installation Guide is an introductory guide to help you start the software-based AT-UWC Wireless LAN Controller. It describes how to run the AT-UWC-Install program
More informationEnterprise Site Manager (ESM) & Administrator Console Installation / Uninstall
Enterprise Site Manager (ESM) & Administrator Console Installation / Uninstall July 2013 For further information visit our support page: www.pearsonwbl.edexcel.com/our-support 1 Contents Please note clicking
More informationRLP Citrix Setup Guide
RLP Citrix Setup Guide M Version 2.1 Trademarks IBM is a registered trademark of International Business Machines Corporation. The following are trademarks of International Business Machines Corporation
More informationBloomfield Hills Schools VPN and Viewconnect Instructions
Connect to Bloomfield Hills Schools VPN - Open Internet Explorer. - Type https://vpn.bloomfield.org into the address bar. - Click Continue to this website (not recommended). if prompted. - If this is your
More informationBackup & Disaster Recovery Appliance User Guide
Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the
More informationVirtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer
Virtual Appliance for VMware Server Getting Started Guide Revision 2.0.2 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet
More informationInstalling Management Applications on VNX for File
EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
More informationInstallation Guide for Pulse on Windows Server 2008R2
MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
More informationwww.novell.com/documentation SSL VPN User Guide Access Manager 3.1 SP5 January 2013
www.novell.com/documentation SSL VPN User Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
More informationAddonics T E C H N O L O G I E S. NAS Adapter. Model: NASU2. 1.0 Key Features
1.0 Key Features Addonics T E C H N O L O G I E S NAS Adapter Model: NASU2 User Manual Convert any USB 2.0 / 1.1 mass storage device into a Network Attached Storage device Great for adding Addonics Storage
More informationAccessing Restricted University Online Resources Using Network Connect. on the Secure Remote Access Service
Technology Help Desk 412 624-HELP [4357] http://technology.pitt.edu Accessing Restricted University Online Resources Using Network Connect Table of Contents Overview... 1 Connecting to the Secure Remote
More informationThinPoint Quick Start Guide
ThinPoint Quick Start Guide 2 ThinPoint Quick Start Guide Table of Contents Part 1 Introduction 3 Part 2 ThinPoint Windows Host Installation 3 1 Compatibility... list 3 2 Pre-requisites... 3 3 Installation...
More informationTeam Foundation Server 2012 Installation Guide
Team Foundation Server 2012 Installation Guide Page 1 of 143 Team Foundation Server 2012 Installation Guide Benjamin Day benday@benday.com v1.0.0 November 15, 2012 Team Foundation Server 2012 Installation
More informationClientless SSL VPN End User Set-up
37 CHAPTER This ections is for the system administrator who sets up Clientless (browser-based) SSL VPN for end users. It summarizes configuration requirements and tasks for the user remote system. It also
More informationPenetration Testing LAB Setup Guide
Penetration Testing LAB Setup Guide (External Attacker - Intermediate) By: magikh0e - magikh0e@ihtb.org Last Edit: July 06 2012 This guide assumes a few things... 1. You have read the basic guide of this
More informationInstalling Hortonworks Sandbox 2.0 VirtualBox on Windows
Installing Hortonworks Sandbox 2.0 VirtualBox on Windows Getting Ready to install on Windows using Oracle VirtualBox Use this section to prepare for your installation. Prerequisites To use the Hortonworks
More informationTANDBERG MANAGEMENT SUITE 10.0
TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS
More informationREADYNAS INSTANT STORAGE. Quick Installation Guide
READYNAS INSTANT STORAGE Quick Installation Guide Table of Contents Step 1 Connect to FrontView Setup Wizard 3 Installing RAIDar on Windows 3 Installing RAIDar on Mac OS X 3 Installing RAIDar on Linux
More informationPEARSON Parent/Teacher Guide to Online Electronic Practice Assessment Tests (epats) FAQs, Instructions, and Hardware & Software Requirements
PEARSON Parent/Teacher Guide to Online Electronic Practice Assessment Tests (epats) FAQs, Instructions, and Hardware & Software Requirements Copyright 2014 4/11/2014 Table of Contents Introduction... 1
More informationWHITE PAPER SETTING UP AND USING ESTATE MASTER ON THE CLOUD INTRODUCTION
WHITE PAPER SETTING UP AND USING ESTATE MASTER ON THE CLOUD INTRODUCTION Cloud Computing can provide great flexibility for the Estate Master user. You can access your feasibilities, manage you projects
More informationManual for configuring NIC VPN in Windows OS
Manual for configuring NIC VPN in Windows OS NIC is introducing a new web based VPN interface to allow s to connect to NICNET through VPN. Apart from existing Client based VPN service, this new interface
More informationReadyNAS Setup Manual
ReadyNAS Setup Manual NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA October 2007 208-10163-01 v1.0 2007 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR, the NETGEAR logo,
More informationSHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client
SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client Version 1.1 1/15/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a required
More informationISERink Installation Guide
ISERink Installation Guide Version 1.1 January 27, 2015 First developed to support cyber defense competitions (CDCs), ISERink is a virtual laboratory environment that allows students an opportunity to
More informationAppendix B Lab Setup Guide
JWCL031_appB_467-475.indd Page 467 5/12/08 11:02:46 PM user-s158 Appendix B Lab Setup Guide The Windows Server 2008 Applications Infrastructure Configuration title of the Microsoft Official Academic Course
More informationVMware vcenter Log Insight Getting Started Guide
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
More informationNetwork Connect Installation and Usage Guide
Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing
More informationFortiClient SSL VPN Client User s Guide
FortiClient SSL VPN Client User s Guide To connect to Model Driven Solutions via a SSL VPN Client session you first need a VPN login account that has been granted the proper SSL VPN group permissions and
More informationInstalling Hortonworks Sandbox 2.1 VirtualBox on Mac
Installing Hortonworks Sandbox 2.1 VirtualBox on Mac Getting Ready to install on Mac using Oracle VirtualBox Use this section to prepare for your installation. Prerequisites To use the Hortonworks Sandbox
More informationHow To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The
1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...
More informationQuick Start Guide for VMware and Windows 7
PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the
More informationHow to Test Out Backup & Replication 6.5 for Hyper-V
How to Test Out Backup & Replication 6.5 for Hyper-V Mike Resseler May, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication
More informationRemote Access. Remote Access Start-up Guide. Non Cheshire East Council PC s/laptops. Page 0
Remote Access Remote Access Start-up Guide Non Cheshire East Council PC s/laptops Page 0 Page 1 1. Getting Started NGD provides easy access to all your Cheshire East documents and applications whilst not
More informationUsing the FDO Remote Access Portal
Using the FDO Remote Access Portal Introduction The ODS NITOAD Branch has implemented a Juniper Networks secure sockets layer (SSL) virtual private network (VPN) solution at the national gateways to provide
More informationGuide to Installing BBL Crystal MIND on Windows 7
Guide to Installing BBL Crystal MIND on Windows 7 Introduction The BBL Crystal MIND software can not be directly installed on the Microsoft Windows 7 platform, however it can be installed and run via XP
More informationOnline Backup Client User Manual
For Mac OS X Software version 4.1.7 Version 2.2 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by other means.
More informationINSTALLATION GUIDE ENTERPRISE DYNAMICS 9.0
INSTALLATION GUIDE ENTERPRISE DYNAMICS 9.0 PLEASE NOTE PRIOR TO INSTALLING On Windows 8, Windows 7 and Windows Vista you must have Administrator rights to install the software. Installing Enterprise Dynamics
More informationMac OS X User Manual Version 2.0
Mac OS X User Manual Version 2.0 Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption)
More informationMySabre with Sabre VPN
MySabre with Sabre VPN MIGRATION / INSTALLATION GUIDE T a b l e o f C o n t e n t s Table of Contents... ii Introduction... 3 Before Installing... 3 New MySabre User Installation... 4 Appendix A ActiveX
More informationIntelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)
Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Hyper-V Manager Hyper-V Server R1, R2 Intelligent Power Protector Main
More informationCitrix Remote Access Portal U s e r M a n u a l
Citrix Remote Access Portal U s e r M a n u a l 1 P a g e Table of Contents Table of Contents... 2 Introduction... 3 1. What is Citrix and how does it work?... 4 2. PC Setup/Internet Explorer - Connecting
More informationOperating System Installation Guidelines
Operating System Installation Guidelines The following document guides you step-by-step through the process of installing the operating systems so they are properly configured for boot camp. The document
More informationA New Era. A New Edge. Phishing within your company
Phishing within your company Learning Objectives What is phishing and how to minimize its impact Obtain a basic understanding of how to use virtual machines Use BackTrack, a tool used by many security
More informationPenetration Testing. Presented by: Elham Hojati Advisor: Dr. Akbar Namin July 2014
Penetration Testing Presented by: Elham Hojati Advisor: Dr. Akbar Namin July 2014 Part one: the concept of penetration testing 2 What is a penetration test?(informal) Port scanning Vulnerability Scanning
More informationTable of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15
Table of Contents CHAPTER 1 About This Guide......................... 9 The Installation Guides....................................... 10 CHAPTER 2 Introduction............................ 11 Required
More informationSecure Access Using VPN
Secure Access Using VPN WHAT IS CISCO SSL VPN? Cisco is the brand name of the VPN appliance (hardware). The SSL VPN stands for Secure Sockets Layer Virtual Private Network. SSL VPN is a service that allows
More informationInstall and End User Reference Guide for Direct Access to Citrix Applications
Install and End User Reference Guide for Direct Access to Citrix Applications Version 1.0 7/26/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a
More informationDell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com
CHAPTER: Introduction Microsoft virtual architecture: Hyper-V 6.0 Manager Hyper-V Server (R1 & R2) Hyper-V Manager Hyper-V Server R1, Dell UPS Local Node Manager R2 Main Operating System: 2008Enterprise
More informationDial-up Installation for CWOPA Users (Windows Operating System)
Dial-up Installation for CWOPA Users (Windows Operating System) 1 Table of Contents Download and Install Digital Certificates... 3 Internet Explorer 8/9 Certificate Installation.3 Windows XP Instructions
More informationOnline Test Administrator Quick Reference Guide Updated 08/02/2012 v.2.0
Online Test Administrator Quick Reference Guide Updated 08/02/2012 v.2.0 M e s s a g e T e s t N a v ( W h a t D o e s T h i s M e a n? ) Login Screen The student will type in the Login ID and Test Code
More information