Designing and Implementing a Cyberwar Laboratory Exercise for a Computer Security Course

Size: px
Start display at page:

Download "Designing and Implementing a Cyberwar Laboratory Exercise for a Computer Security Course"

Transcription

1 Designing and Implementing a Cyberwar Laboratory Exercise for a Computer Security Course Paul J. Wagner and Jason M. Wudi Department of Computer Science University of Wisconsin-Eau Claire Eau Claire, WI {wagnerpj,wudijm}@uwec.edu Abstract The development of a cyberwar laboratory exercise for a computer security course raises many pedagogical and management issues relating to the structure of the laboratory, its network and the exercise itself. We have designed, implemented and given such an exercise, and faced many of these issues. Evaluation of this exercise leads to multiple insights about the proper goals, structure and implementation of such an exercise. Categories and Subject Descriptions K.3 [Computers & Education]: Computer & Information Science Education - Computer Science Education. General Terms Management, Design, Experimentation, Security. Keywords Cyberwar, Security, Cybersecurity, Laboratory, Exercise. 1 Introduction We taught a computer security course for the first time at the University of Wisconsin Eau Claire in the Spring 2003 semester. As part of this class, we developed a large cyberwar laboratory exercise where course students worked in teams to secure a computer system and then try to gain access to other systems present on the network, including the systems used by the other teams. We gave this exercise during the final week of classes as a way for students to demonstrate cumulative understanding of the various security issues, strategies and tools we discussed during the semester. There are a large number of pedagogical and management issues that arise in the design and development of this exercise, and we discuss these issues below. 2 Background 2.1 History The idea of using a cyberwar laboratory exercise in computer security curriculum is not new, though from anecdotal reports at computer security workshops and conferences a solid majority of schools offering computer security course work are still in the process of developing such exercises. These exercises may involve a variety of security activities, but usually include the defense (through system hardening) and attack (through various methods, including technological, physical and social) of computer systems on a network. One of the best known of these exercises is the annual cyberwar competition between the four branches of the United States military academies [2]. Other cyberwar laboratory structures, courses and exercises have been presented at prior SIGCSE conferences [1,4]. Unlike these previous discussions, we focus here solely on the pedagogical and management issues that arise from developing a large cyberwar laboratory exercise. 3 Student Preparation for Exercise 3.1 Student Preparation Goals To prepare the students for this exercise over the course of the semester, we had two goals. First, we wanted to give them enough experience with the issues, strategies, tactics and tools of computer and network system attackers and defenders so that they could apply these readily during the exercise. Second, we wanted to give them an ethical foundation for the application of the knowledge they gained so that they were able to maintain proper conduct during the exercise and in their future work as computer professionals. 3.2 Course Work The computer security course itself was a combination of lecture and laboratory exercises developed to build expertise in both security concepts and particular tools. The benefits of a laboratory component for a computer security course have been noted repeatedly [1,3,4]. We focused primarily on work with Linux tools in our laboratory exercises, though we also used Windows versions where available to see the different issues that can arise with Windows and to gain experience with some of the tools across multiple platforms. The labs we used were on the following topics, with particular tools used in parentheses: Ethics

2 Policies and Social Engineering General Information Gathering (ping, traceroute, finger, whois, nslookup/dig, arp, netstat, etc.) Packet Sniffing (tcpdump, ethereal) Password Cracking (john the ripper, l0phtcrack) Cryptography (PGP) Port Scanning (nmap) Vulnerability Assessment (nessus, chkrootkit) Intrusion Detection (snort) By the end of the semester, the students were fairly well aware of the issues and representative tools used in computer security scenarios. However, in future offerings of the course we will add other laboratories on topics such as system hardening (with tools such as bastille) and network/firewall configuration to improve the students background. 3.3 Ethical Issues We were clear to the students from the beginning that the purpose of the course, the lab exercises during the course, and the cyberwar exercise at the end of the course were presented for the purpose of better understanding defense and design of computer systems and networks through the study of both attack and defense strategies. We felt it was ethically important to stress that we were only looking at attack strategies to better understand them from a defensive standpoint. Students were required to sign forms at the beginning of the semester that indicated their willingness to act ethically, follow directions, and not use the tools we were working with outside the scope of the course. Students were warned that violation of this agreement during the cyberwar lab exercise could result in a failing grade in the course and possible University sanction. Contrary to a report from another institution of a cyberwar exercise deteriorating as students became destructive, we had no such problems during the exercise. 4 The Cyberwar Exercise 4.1 Exercise Goals As mentioned above, our goal for the exercise was to give our students further experience with the major issues, strategies and tools involved in computer security and to see how they synthesized the information presented earlier in the course. Specifically, we wanted to achieve the following: give them real-world team-based experience with system defense in a live environment, let them experience attack in order to better understand the strategies, tactics and mindset of the attacker, and to be able to respond defensively in a real-time environment, give them experience with technological, physical and social engineering security. 4.2 Exercise Structure We structured the exercise as a combined defend and attack scenario. The students were divided into teams of 3-4, each assigned to a specific computer system. The overall exercise was a variant of capture the flag that could be more accurately described as plant the flag i.e. attempt to place a file with certain contents on the root or administrative directory of as many other systems as possible. We partitioned the exercise into two phases: defend and attack. First, we told each team what operating system they would be working with, and gave them root access to their system. Each team then had 24 hours to harden and secure their system as well as possible, within certain guidelines. Specifically, they could not change the base operating system, but could only patch the one they were given. We decided to allow them to patch the Linux kernel, even though in some cases this amounted to a partial system upgrade. Also, they had to keep certain services available (a mail server, ssh) to keep the exercise more realistic. The isolated network meant that no automatic update systems (e.g. Redhat Network up2date [7]) could be used. Teams had to download individual libraries, patches, RPMs, and kernels on other machines, and used removable media and sneaker net to patch their systems and bring in software tools for attack and defense. While this may not always be realistic in the noneducational world, it did force the teams to think carefully and specifically about each change they made to their system. Second, each team had another 24 hours to attack any other system on the network (either a team system or one of the three unattended miscellaneous systems) and attempt to plant a flag as specified above. Teams could also further harden their system, and fix any weaknesses discovered during this period. They could not remove a flag, in order to ensure that any successful attacks were counted. Finally, once the exercise was completed, each team had to write a final report that outlined the following: each patch, defensive technique or hardening done during the defense period, each defensive change done during the attack period, and what attack this was in response to, each attack attempted on other systems, each attack that was successful, any miscellaneous comments, issues and/or suggestions that the students felt were important regarding the lab exercise, and a list of locations and sources from which the students gathered their information. This summary not only helped us evaluate how well the exercise met its objectives and how much the students learned during the semester, but gave us a number of new ideas for future lab exercises and discussion topics. 5 Laboratory Setup 5.1 Laboratory Goals Our goal for the laboratory setup was to present a heterogeneous (i.e. multiple operating systems) and realistic network that allowed a large range of attack and defend activity while still maintaining the integrity of the general department and campus network.

3 5.2 Laboratory Structure While we worked most of the semester with an open network in our security lab (so that the lab could be used by other students as well), we did completely isolate the network for the purposes of our cyberwar exercise, and made the laboratory itself off-limits to non-security class students. We think this is essential, as it is very hard to predict the limits and possible side effects of a cyberwar exercise, and thus it is difficult to protect a campus network from the possible fallout from the exercise without such isolation. We configured eight Linux machines with Redhat Linux [6] v.7.3 for the students. We chose a non-current distribution that had known security holes. The installation was out of the box, with no patches. Several configuration changes were made to further weaken the system. We used Norton Ghost [5] to copy our development image to each system, which ensured that each team system was exactly alike and saved much administrative time. To each team system we added several extra realistically-named accounts (e.g. backup, tomcat, logwd) with weak passwords, in order to allow possible openings through password analysis or even direct login attempts. We also added several other machines to the network, specifically: a Linux machine running a yet older operating system (Redhat 6.2) with several services running: sendmail, apache, bind, nfs, and samba a Windows NT 4 server, service pack 4 with Internet Information Server (IIS) 4, no additional patches a Windows 2000 server with IIS, no additional patches The purpose of these extra machines was to provide a heterogeneous environment, have some systems with no defenders and known security holes, and make it easier for some of the less knowledgeable teams to be successful in the attack phase of the exercise. Finally, we added a heavily secured laptop for monitoring the exercise and our closed network. Our goal was to monitor most or all network activity, but we found it difficult to filter traffic down to a reasonable level, and we were quickly overwhelmed by the amount of network traffic generated by the exercise. It should be mentioned that the assistance of department and/or campus system administrators and network administrators is essential if the instructor is not an expert in these areas and/or does not have authority or ability to modify hardware configurations. The hard work and joint effort of instructors and several IT staff significantly improved the exercise in terms of what we were able to provide to the students. 6 Major Exercise Issues A number of major issues surfaced during the planning and delivery of this exercise. Some of these questions were obvious, but others were more subtle, and only appeared or fully presented themselves during the exercise. The more such issues can be dealt with in advance, the more smoothly such an exercise will go. We present the major issues we dealt with below. First, which services should a machine have to keep active? As our goal was to make the exercise realistic, we required a minimum set of services: mail server and ssh. In retrospect, we would expand this list significantly, and require the availability of other services such as a web server, a database server, and perhaps some sort of application server. Second, how much physical access should be allowed to a nonteam system? We wanted to have the students thinking about physical security, and make them aware of the issues in protecting console access to a system. On the other hand, we didn t want to allow a team to easily gain access to a system directly just because they came into the lab in the middle of the night (as the students couldn t move their machine to a secure room, they were limited in how much physical security they could achieve). Our original non-ideal compromise was to allow keyboard and mouse access, but not allow the placement of bootable or non-bootable floppy disks or CDs into another team s system. We soon found a problem with this rule as most teams put password protection on their system s BIOS and boot process, a team could cause another machine s team to hang by rebooting it from the keyboard and letting it hang at a BIOS or boot password prompt. We ended up prohibiting keyboard or mouse access to other team s systems as well, requiring attack attempts to be entirely through the network. Third, should denial of service (DoS) attacks be allowed? While DoS attacks are certainly a realistic and significant security problem, and knowing how to deal with such attacks is important, we felt with our limited exercise that the negatives of a clogged network and entirely downed systems could prevent the learning gained from being able to work on continually available systems. Thus, we prohibited any DoS attacks during the exercise. We are considering developing a separate laboratory exercise for the course to allow the students to work with DoS attacks and defense against them. 7 Laboratory Experience 7.1 Specific Events Several interesting and not entirely expected events occurred during this exercise. Although none were directly planned for, we would now attempt to ensure the inclusion of these events and/or awareness of the issues behind these events as part of any future presentations of this exercise. First, the extra accounts created were more of a hole than expected. While we had spent an entire earlier exercise on password cracking, not all teams checked their password files during the defense phase. As a result, access was gained to some systems through these added accounts when their passwords were discovered (of course, since the same accounts were on all systems, the better teams tried attacking through these accounts as soon as they discovered the account passwords). Second, the most successful teams were the ones that combined attack strategies. While this was to be expected as the path to making significant progress in the exercise, fewer teams were able to achieve this than expected. For example, several teams gained non-root access through the above-mentioned added accounts. However, only one team was able to upgrade this exploit to gain root access, and this was accomplished through a buffer overflow attack. This reminded us and the students that computer security problems are often based on a series of events rather than a single event, and continued effort and vigilance are essential in computer security matters. Third, while most teams focused on the technological aspects of security for their system attacks, one team attempted a social engineering attack. This was done through spoofed from the instructor asking each team to set up an account with the

4 instructor s username and a given password so that he could resolve alleged questions regarding the existence of flags on each system. While we had discussed social engineering at length in the course, most students seemed to think that it was not a significant issue. However, approximately half of the students in the class (including a student system administrator) were fooled by the spoofed message to the extent of creating the requested account. Only the rather lucky occurrence of two students showing up in the instructor s office at the same time to ask about this request exposed the true nature of the message fairly quickly, the accounts were quickly shut back down and no points were gained by this attack. We think that the result would have been different had the instructor not been in his office late that evening. At any rate, we were very glad that this social engineering technique was used during the exercise. We discussed the attack in length afterwards with the class, looking at what aspects worked and what was suspicious about the message (and what could be used to determine its true invalid nature on closer inspection), and the students came out of the exercise with a much better understanding of the power of social engineering. 7.2 Overall Experience The exercise was considered to be very successful educationally from both the instructor s point of view and from the students point of view. Comments on the exercise reports were very positive both in terms of educational value and enjoyment. When various faculty members went into the lab during this exercise to observe, they found a very high percentage of the students in the lab at any one time, and the energy, engagement and activity levels were very high. While not directly quantifiable from our evaluation, the combination of enthusiasm, work effort, interaction and learning shown by the students in this exercise was higher than any other course in our curriculum except perhaps in our software engineering courses during the final days of a team project. 8 Benefits Based on our evaluation as well as the students evaluation of exercise, we found a number of significant benefits to the use of our cyberwar laboratory exercise in the context of our computer security course. First, the students reported an increased appreciation of security as a process, not as an absolute state. While the work most teams did during the defense phase was quite comprehensive, all teams reported making defensive adjustments during the attack phase. The students better understood the principle we d passed on the first day of the course that security is a process, not a product [8]. Second, the students gained increased appreciation of the use of the tools of the security trade, and how those tools can successfully be used. They reported a better understanding of the use of attacking tools to perform vulnerability assessment of their own network and systems. Third, an exercise like this generates much student enthusiasm. As mentioned above, the students spent a very large amount of time on the exercise, including significant time overnight more than could be expected or demanded late in the semester. When the instructor went into the lab several times to check on progress of the exercise, the lab was essentially full each time. Word spread outside of the class as well, and other students have become aware of and interested in taking our computer security classes in the future. 9 Problems / Lessons Learned for Future Offerings of the Exercise As with any laboratory exercise, problems surfaced during the exercise, and others became apparent as we reflected on the exercise. Several significant ones are discussed below. 9.1 Problems First, the instructor and the students agreed that the time period for each phase of the exercise was too short. They correspondingly recommended that it should have been longer than 24 hours for each of the two periods of attack and defense, in order to allow them more time to research issues that arose as well as to be less intrusive in regard to their other classes. More comments were received in this area regarding the attack period, with most recommending extending it by at least another 24 hours. Second, the students felt that the exercise was given too late in the semester. While they realized the need for background information, the last week of classes had too many other obligations (in terms of projects to finish, starting to study for final exams, etc.) to allow them to spend as much time as they wanted on the exercise. While the students did spend a large amount of time on the exercise, they felt that they wanted to and would have spent even more time if the exercise was slightly earlier in the semester. The instructor also noted some burnout toward the end of the exercise, with some teams and individuals giving up in the final hours. Third, a number of students felt that they didn t have sufficient background for the exercise, primarily in the area of system administration. Many students pick up these skills through jobs, internships and/or personal experience, but a significant number (approximately 25%) of the students felt this was a problem for them. This occurred primarily in the defense portion of the exercise, where students needed to know how to upgrade packages, use Unix utilities like tar and gzip, and in some cases configure upgraded software packages. While the instructor assigned the teams to try to ensure that every team had at least one student who was strong in system administration, the other students sometimes felt left out during the defense phase. Fourth, as this was the first offering of our computer security course, we lowered the prerequisites from the desired Networking course to a more student-friendly Data Structures course. While the enrollment was quite high (30 students), this meant that we needed to teach some networking basics. We thus lost time that we could have spent on other topics. As noted in [4], this is not optimal, and in the long run we will work to add the Networking course prerequisite without significantly dropping the enrollment level. Fifth, some students reported problems when hardening their systems because they didn t know what underlying hardware they were working on. Several incompatibilities were uncovered when patches or upgrades weren t compatible with system hardware.

5 9.2 Improvements for Future Offerings As a result of the above issues and problems, we are considering the following changes in the next offering of the course exercise (currently scheduled for Spring 2004): Extend the cyberwar exercise to somewhere between 36 and 48 hours or even longer, with the defense phase being at least hours and the attack phase being at least 24 hours. Move the exercise to the second to the last week of class to try to avoid interference with other class projects and studying for final exams. Keep the systems more realistic, in terms of requiring additional services (web server, database server, application server) to be up on each system and providing actual data for these services. We will also monitor the systems more closely during the exercise to ensure that teams are keeping the services active. Assign a Windows system as well as a Linux system to each team, which while requiring additional system administration knowledge will make the environment more realistic and open up a larger set of vulnerabilities, exploits and tools for each team. Inject other traffic into the environment, so that the students need to filter legitimate traffic from attacks. This could include teams or the instructor periodically using the services (e.g. web server, database server) on each system to ensure it is still available. Give students a hardware description of their environment so they can determine if there are incompatibilities with patches, updated software, and drivers that they may want to install. Develop a centrally controlled team logging mechanism so that teams can keep an electronic journal during the exercise. This will not only save time for the teams, but assist us in our collection of information from and evaluation of the exercise. Find a better way to monitor the network during the exercise, so that we can collect more information as the exercise proceeds. We think there is a lot to learn from such information if we can find a way of filtering and organizing it. We may need to rely on a commercial tool for this. Require each team to develop and turn in, as part of the exercise, a map of what they think the network looks like what systems they find, what services are available on each, what operating systems and versions are running, etc., which will help the students better understand how an attacker can footprint a system and perform vulnerability assessment. Investigate the use of VMWare [9] to run the exercise in a virtual environment. While we and others have used this product to allow Windows and Linux systems to be installed and available simultaneously on the same machine without rebooting, we can envision this tool allowing us to support a much larger number of machines as part of a cyberwar exercise. 10 Conclusion Our cyberwar exercise was very successful overall in terms of both student learning and the structure of the exercise from a faculty point of view. The team exercise reports and the overall student evaluations graded the exercise very positively. We felt we built on and improved on several other models of such exercises at other institutions, yet also learned much ourselves from issues and problems that occurred during the exercise. As we modify and improve the exercise to build on this experience, the cyberwar exercise will continue to be an integral part of the future offerings of our computer security course. This work is partially supported by NSF Grant (CCLI/A&I grant, May 2003). References [1] Hill, John, Carver, Curtis, Humphries, Jeffrey and Pooch, Udo, Using an Isolated Laboratory to Teach Advanced Networks and Security; SIGCSE Bulletin: Proc. 32 nd Technical Symposium on Computer Science Education, v.33, n.1, March 2001, pp [2] Jackson, William, Cadets Keep NSA Crackers At Bay; Government Computer News, May 20, [3] Mateti, Prabhaker, A Laboratory-Based Course on Internet Security; SIGCSE Bulletin: Proc. 34 th Technical Symposium on Computer Science Education, v.35, n.1, March 2003, pp [4] Micco, Mary and Rossman, Hart, Building a Cyberwar Lab: Lessons Learned; SIGCSE Bulletin: Proc. 33 rd Technical Symposium on Computer Science Education, v.34, n.1, March 2002, pp [5] Norton Ghost, [6] Redhat Linux, [7] Redhat Network up2date Network Automatic Upgrade System, [8] Schneier, Bruce, Security is not a Product; It s a Process; Cryptogram Online Security Newsletter, html#SecurityIsNotaProductItsaProcess, December [9] VMWare,

Computer Security Curriculum at the Univ. of Wisconsin Eau Claire. Paul J. Wagner [email protected]

Computer Security Curriculum at the Univ. of Wisconsin Eau Claire. Paul J. Wagner wagnerpj@uwec.edu Computer Security Curriculum at the Univ. of Wisconsin Eau Claire Paul J. Wagner [email protected] Background! Attended week-long workshop at Indiana University of Pennsylvania in 2002 with colleague Andy

More information

A Portable Computer Security Workshop

A Portable Computer Security Workshop A Portable Computer Security Workshop PAUL J. WAGNER AND ANDREW T. PHILLIPS University of Wisconsin Eau Claire We have developed a computer security workshop designed to instruct other post-secondary instructors

More information

SETTING UP AND USING A CYBER SECURITY LAB FOR EDUCATION PURPOSES *

SETTING UP AND USING A CYBER SECURITY LAB FOR EDUCATION PURPOSES * SETTING UP AND USING A CYBER SECURITY LAB FOR EDUCATION PURPOSES * Alexandru G. Bardas and Xinming Ou Computing and Information Sciences Kansas State University Manhattan, KS 66506 [email protected], [email protected]

More information

Open Source Security Tools for Information Technology Professionals

Open Source Security Tools for Information Technology Professionals Open Source Security Tools for Information Technology Professionals CUNY SPS Course Syllabus Aron Trauring May 23, 2005 (rev October 21, 2005) Course Description Information security is a top priority

More information

TEACHING COMPUTER SECURITY TO UNDERGRADUATES A Hands-On Approach

TEACHING COMPUTER SECURITY TO UNDERGRADUATES A Hands-On Approach TEACHING COMPUTER SECURITY TO UNDERGRADUATES A Hands-On Approach Rahul V. Tikekar Southern Oregon University Abstract: Increasing awareness of the vulnerabilities of computer systems has led to the introduction

More information

information security and its Describe what drives the need for information security.

information security and its Describe what drives the need for information security. Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.

More information

Small-Scale Cyber Security Competitions

Small-Scale Cyber Security Competitions Small-Scale Cyber Security Competitions Mike O Leary Towson University 16th Colloquium for Information Systems Security Education Orlando, FL June 11-13, 2012 M. O Leary (Towson University) Small-Scale

More information

New Lab Upgrading Vista to Windows 7 Brought to you by RMRoberts.com

New Lab Upgrading Vista to Windows 7 Brought to you by RMRoberts.com New Lab Upgrading Vista to Windows 7 Brought to you by RMRoberts.com After completing the laboratory activity, you will be able to: Determine which versions of Vista can be successfully upgraded to Windows

More information

IT6203 Systems & Network Administration. (Optional)

IT6203 Systems & Network Administration. (Optional) Systems & Network Administration (Optional) INTRODUCTION This is one of the Optional courses designed for Semester 6 of the Bachelor of Information Technology Degree program. This course on Systems & Network

More information

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) Certified Ethical Hacker (CEH) Course Number: CEH Length: 5 Day(s) Certification Exam This course will help you prepare for the following exams: Exam 312 50: Certified Ethical Hacker Course Overview The

More information

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

If you know the enemy and know yourself, you need not fear the result of a hundred battles. Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group [email protected] 1 (604) 961-0701 If you know the enemy and know yourself, you

More information

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................

More information

Experiences from Educating Practitioners in Vulnerability Analysis

Experiences from Educating Practitioners in Vulnerability Analysis Experiences from Educating Practitioners in Vulnerability Analysis Abstract. This paper presents experiences from a vulnerability analysis course especially developed for practitioners. The described course

More information

Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours

Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Introduction The following lab allows the trainee to obtain a more in depth knowledge of network security and

More information

SCP - Strategic Infrastructure Security

SCP - Strategic Infrastructure Security SCP - Strategic Infrastructure Security Lesson 1 - Cryptogaphy and Data Security Cryptogaphy and Data Security History of Cryptography The number lock analogy Cryptography Terminology Caesar and Character

More information

Windows Remote Access

Windows Remote Access Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by

More information

IDS and Penetration Testing Lab ISA656 (Attacker)

IDS and Penetration Testing Lab ISA656 (Attacker) IDS and Penetration Testing Lab ISA656 (Attacker) Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible

More information

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:

More information

Penetration Testing Report Client: Business Solutions June 15 th 2015

Penetration Testing Report Client: Business Solutions June 15 th 2015 Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]

More information

LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS

LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS 1 LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS Te-Shun Chou and Tijjani Mohammed Department of Technology Systems East Carolina University [email protected] Abstract

More information

Security Event Management. February 7, 2007 (Revision 5)

Security Event Management. February 7, 2007 (Revision 5) Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST

More information

The Virtual Environment

The Virtual Environment Chapter 2 The Virtual Environment In the following chapters we examine a variety of problems related to information security, as they arise in modern computer and communication systems. To deepen your

More information

New Initiative Way Of Teaching Data Communications And Networking Class Online With Networking Virtual Labs ABSTRACT

New Initiative Way Of Teaching Data Communications And Networking Class Online With Networking Virtual Labs ABSTRACT New Initiative Way Of Teaching Data Communications And Networking Class Online With Networking Virtual Labs Ronald Mashburn West Texas A & M University 2402 N. 3 rd Ave Canyon, Texas 79016 (806) 651-2968

More information

A REVIEW OF METHODS FOR SECURING LINUX OPERATING SYSTEM

A REVIEW OF METHODS FOR SECURING LINUX OPERATING SYSTEM A REVIEW OF METHODS FOR SECURING LINUX OPERATING SYSTEM 1 V.A.Injamuri Govt. College of Engineering,Aurangabad, India 1 [email protected] Abstract This paper is focused on practical securing Linux

More information

STABLE & SECURE BANK lab writeup. Page 1 of 21

STABLE & SECURE BANK lab writeup. Page 1 of 21 STABLE & SECURE BANK lab writeup 1 of 21 Penetrating an imaginary bank through real present-date security vulnerabilities PENTESTIT, a Russian Information Security company has launched its new, eighth

More information

NETWORK PENETRATION TESTING

NETWORK PENETRATION TESTING Tim West Consulting 6807 Wicklow St. Arlington, TX 76002 817-228-3420 [email protected] OVERVIEW Tim West Consulting Tim West Consulting is a full service IT security and support firm that specializes

More information

IN order to complement the numerous theoretical security

IN order to complement the numerous theoretical security 82 IEEE TRANSACTIONS ON EDUCATION, VOL. 49, NO. 1, FEBRUARY 2006 Georgia Tech Information Security Center Hands-On Network Security Laboratory Randal T. Abler, Senior Member, IEEE, Didier Contis, Julian

More information

EC-Council Certified Security Analyst (ECSA)

EC-Council Certified Security Analyst (ECSA) EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for

More information

How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01

How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01 How to build and use a Honeypot By Ralph Edward Sutton, Jr DTEC 6873 Section 01 Abstract Everybody has gotten hacked one way or another when dealing with computers. When I ran across the idea of a honeypot

More information

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs Network Security Ola Lundh [email protected] Schedule/ time-table: landris.hh.se/ (NetwoSec) Course home-page: hh.se/english/ide/education/student/coursewebp ages/networksecurity cisco.netacad.net Packet

More information

CMPT 471 Networking II

CMPT 471 Networking II CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access

More information

An Introduction to Network Vulnerability Testing

An Introduction to Network Vulnerability Testing CONTENTS Introduction 3 Penetration Testing Overview 4 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and Delivering Results 6 VeriSign SecureTEST 7 Common Vulnerability

More information

Northwestern University Dell Kace Patch Management

Northwestern University Dell Kace Patch Management Northwestern University Dell Kace Patch Management Desktop Patch Management Best Practices Table of Contents: 1. Audience 2. Definition 3. Patch Approaches 4. Guidelines for Review, Test, and Deploy 5.

More information

Undergraduate Course Syllabus

Undergraduate Course Syllabus College of Software Engineering Undergraduate Course Syllabus Course ID 31111230 Course Name Development Project for security product Course Attribute Compulsory Selective Course Language English Chinese

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system

More information

Firewalls and Software Updates

Firewalls and Software Updates Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General

More information

Project 2: Penetration Testing (Phase II)

Project 2: Penetration Testing (Phase II) Project 2: Penetration Testing (Phase II) CS 161 - Joseph/Tygar November 17, 2006 1 Edits If we need to make clarifications or corrections to this document after distributing it, we will post a new version

More information

Best Practices for VMware ESX Server 2

Best Practices for VMware ESX Server 2 Best Practices for VMware ESX Server 2 2 Summary VMware ESX Server can be deployed in many ways. In this document, we recommend specific deployment guidelines. Following these guidelines will maximize

More information

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2) Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2) Course number: CFED Length: 5 days Certification Exam This course will help you prepare for the following exams: CCE --

More information

CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006 CSE331: Introduction to Networks and Security Lecture 17 Fall 2006 Announcements Project 2 is due next Weds. Homework 2 has been assigned: It's due on Monday, November 6th. CSE331 Fall 2004 2 Summary:

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

Configure Windows 7 for WiRES X

Configure Windows 7 for WiRES X Configure Windows 7 for WiRES X Setting up Windows 7 for remote Wires X operation DO NOT COPY AND POST THIS DOCUMENT TO ANOTHER SITE. This document suggests how Windows 7 should be set up to operate unattended.

More information

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of

More information

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013 City University of Hong Kong Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 01/013 Part I Course Title: Course Code: Course Duration: Cryptography

More information

Footprinting and Reconnaissance Tools

Footprinting and Reconnaissance Tools Footprinting and Reconnaissance Tools Topic 1: Common Port Scanning Techniques Do some research on computer ports that are most often scanned by hackers. Identify a port scanning exploit that is interesting

More information

Configuring a Multi-Course Lab for System-Level Projects

Configuring a Multi-Course Lab for System-Level Projects Configuring a Multi-Course Lab for System-Level Projects Joel C Adams W David Laverell Department of Computer Science Calvin College Grand Rapids, MI 49546 1-616-526-8562 {adams, lave}@calvinedu ABSTRACT

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information

CSE331: Introduction to Networks and Security. Lecture 32 Fall 2004

CSE331: Introduction to Networks and Security. Lecture 32 Fall 2004 CSE331: Introduction to Networks and Security Lecture 32 Fall 2004 Hackers / Intruders External attacks Typical hacker Exploits carried out remotely Does not have an account on the remote machine Insider

More information

During your session you will have access to the following lab configuration. CLIENT1 (Windows XP Workstation) 192.168.0.2 /24

During your session you will have access to the following lab configuration. CLIENT1 (Windows XP Workstation) 192.168.0.2 /24 Introduction The Network Vulnerabilities module provides you with the instruction and Server hardware to develop your hands on skills in the defined topics. This module includes the following exercises:

More information

Locking down a Hitachi ID Suite server

Locking down a Hitachi ID Suite server Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime

More information

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth

More information

Operating System Installation Guidelines

Operating System Installation Guidelines Operating System Installation Guidelines The following document guides you step-by-step through the process of installing the operating systems so they are properly configured for boot camp. The document

More information

WHITE PAPER. An Introduction to Network- Vulnerability Testing

WHITE PAPER. An Introduction to Network- Vulnerability Testing An Introduction to Network- Vulnerability Testing C ONTENTS + Introduction 3 + Penetration-Testing Overview 3 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and

More information

Linux Operating System Security

Linux Operating System Security Linux Operating System Security Kenneth Ingham and Anil Somayaji September 29, 2009 1 Course overview This class is for students who want to learn how to configure systems to be secure, test the security

More information

DESIGN OF NETWORK SECURITY PROJECTS USING HONEYPOTS *

DESIGN OF NETWORK SECURITY PROJECTS USING HONEYPOTS * DESIGN OF NETWORK SECURITY PROJECTS USING HONEYPOTS * Karthik Sadasivam, Banuprasad Samudrala, T. Andrew Yang University of Houston Clear Lake 2700 Bay Area Blvd., Houston, TX 77058 (281) 283-3835, [email protected]

More information

6WRUP:DWFK. Policies for Dedicated IIS Web Servers Group. V2.1 policy module to restrict ALL network access

6WRUP:DWFK. Policies for Dedicated IIS Web Servers Group. V2.1 policy module to restrict ALL network access OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated IIS Web Servers Group The policies shipped with StormWatch address both application-specific

More information

Building A Secure Microsoft Exchange Continuity Appliance

Building A Secure Microsoft Exchange Continuity Appliance Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building

More information

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00 Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak Capture Link Server V1.00 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents

More information

MCSA Security + Certification Program

MCSA Security + Certification Program MCSA Security + Certification Program 12 credit hours 270 hours to complete certifications Tuition: $4500 Information technology positions are high-demand occupations that support virtually all industries.

More information

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1 Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak CR V4.1 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents Table of Contents

More information

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint?

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint? Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint? Why? Focused on Managed Intrusion Security Superior-Architected Hardened Technology Security

More information

Ethical Hacking Agreement for External Network Security Unannounced Penetration Test

Ethical Hacking Agreement for External Network Security Unannounced Penetration Test Ethical Hacking Agreement for External Network Security Unannounced Penetration Test Agreement made on the (date), between (Name of Consultant) of (street address, city, state, zip code), referred to herein

More information

Introduction to Operating Systems

Introduction to Operating Systems Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these

More information

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

TIME TO LIVE ON THE NETWORK

TIME TO LIVE ON THE NETWORK TIME TO LIVE ON THE NETWORK Executive Summary This experiment tests to see how well commonly used computer platforms withstand Internet attacks in the wild. The experiment quantifies the amount of time

More information

IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS

More information

Lab 7 - Exploitation 1. NCS 430 Penetration Testing Lab 7 Sunday, March 29, 2015 John Salamy

Lab 7 - Exploitation 1. NCS 430 Penetration Testing Lab 7 Sunday, March 29, 2015 John Salamy Lab 7 - Exploitation 1 NCS 430 Penetration Testing Lab 7 Sunday, March 29, 2015 John Salamy Lab 7 - Exploitation 2 Item I. (What were you asked to do?) Metasploit Server Side Exploits Perform the exercises

More information

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort License Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons

More information

Nixu SNS Security White Paper May 2007 Version 1.2

Nixu SNS Security White Paper May 2007 Version 1.2 1 Nixu SNS Security White Paper May 2007 Version 1.2 Nixu Software Limited Nixu Group 2 Contents 1 Security Design Principles... 3 1.1 Defense in Depth... 4 1.2 Principle of Least Privilege... 4 1.3 Principle

More information

INTRODUCTION: PENETRATION TEST A BUSINESS PERSPECTIVE:

INTRODUCTION: PENETRATION TEST A BUSINESS PERSPECTIVE: PENETRATION TESTING A SYSTEMATIC APPROACH INTRODUCTION: The basic idea behind writing this article was to put forward a systematic approach that needs to be followed to perform a successful penetration

More information

co Characterizing and Tracing Packet Floods Using Cisco R

co Characterizing and Tracing Packet Floods Using Cisco R co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1

More information

6WRUP:DWFK. Policies for Dedicated SQL Servers Group

6WRUP:DWFK. Policies for Dedicated SQL Servers Group OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated SQL Servers Group The sample policies shipped with StormWatch address both application-specific

More information

Network Security: A Case Study

Network Security: A Case Study Network Security: A Case Study Susan J. Lincke Computer Science Department University of Wisconsin-Parkside Kenosha, WI [email protected] Abstract This paper reviews 3 case studies related to network security.

More information

Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:[email protected] Outline of Information Security Introduction Impact of information Need

More information

System Security Policy Management: Advanced Audit Tasks

System Security Policy Management: Advanced Audit Tasks System Security Policy Management: Advanced Audit Tasks White Paper October 6, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that

More information

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24 Introduction to Computer Networks Lecture24 Network security (continued) Key distribution Secure Shell Overview Authentication Practical issues Firewalls Denial of Service Attacks Definition Examples Key

More information

Hervey Allen. Network Startup Resource Center. PacNOG 6: Nadi, Fiji. Security Overview

Hervey Allen. Network Startup Resource Center. PacNOG 6: Nadi, Fiji. Security Overview Hervey Allen Network Startup Resource Center PacNOG 6: Nadi, Fiji Security Overview Security: A Massive Topic Security Viewpoints - Server - Client - Network Securing each overlaps the other Server Client

More information

Design and Configuration of a Network Security and Forensics Lab

Design and Configuration of a Network Security and Forensics Lab Design and Configuration of a Network Security and Forensics Lab Billy Harris [email protected] Joseph Kizza [email protected] Mike Ward [email protected] ABSTRACT This paper describes the design

More information

Network Instruments white paper

Network Instruments white paper Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features

More information

On the Deficiencies of Active Network Discovery Systems

On the Deficiencies of Active Network Discovery Systems On the Deficiencies of Active Network Discovery Systems Ofir Arkin Chief Technology Officer Insightix Copyright 2012 - All Rights Reserved. This material is proprietary of Insightix. Any unauthorized

More information

CRYPTUS DIPLOMA IN IT SECURITY

CRYPTUS DIPLOMA IN IT SECURITY CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information

More information

Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp

Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp Hands-on Network Traffic Analysis 2015 Cyber Defense Boot Camp What is this about? Prerequisite: network packet & packet analyzer: (header, data) Enveloped letters inside another envelope Exercises Basic

More information

Network and Host-based Vulnerability Assessment

Network and Host-based Vulnerability Assessment Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:

More information

Protecting Critical Infrastructure

Protecting Critical Infrastructure Protecting Critical Infrastructure SCADA Network Security Monitoring March 20, 2015 Table of Contents Introduction... 4 SCADA Systems... 4 In This Paper... 4 SCADA Security... 4 Assessing the Security

More information

Modern Binary Exploitation Course Syllabus

Modern Binary Exploitation Course Syllabus Modern Binary Exploitation Course Syllabus Course Information Course Title: Modern Binary Exploitation Course Number: CSCI 4968 Credit Hours: 4 Semester / Year: Spring 2015 Meeting Days: Tuesday/Friday

More information

The Trivial Cisco IP Phones Compromise

The Trivial Cisco IP Phones Compromise Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002

More information

CYBERTRON NETWORK SOLUTIONS

CYBERTRON NETWORK SOLUTIONS CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified

More information

CSCI 4417/5417: Final Quiz. Due at start of Final Exam

CSCI 4417/5417: Final Quiz. Due at start of Final Exam CSCI 4417/5417: Final Quiz Due at start of Final Exam April 27, 2005 Overview This quiz is optional, and your grade on it will replace your lowest quiz grade. Overall, the main goal of this assignment

More information