Home page logo
/

basics logo Security Basics mailing list archives

RE: Ideas for studentes
From: "Vandenberg, Robert" <rv2954 () att com>
Date: Mon, 1 Oct 2007 13:18:48 -0700

 Javier,

To elaborate on that further.  I teach Information Security for a
Technical College in the US.

One of our classes is hacker techniques.  We go through a 11 week
cirriculum in which we teach various techniques like sniffing, cracking,
session hijacking, etc.  I break up my students into teams of 2 to 3 in
the labs and have them on a common network.  There they have to do
online searching for at least one Linux and one windows based
application for that performs the same function that we discussed.  They
then use it on another team of students so that we can see both "cause
and effect".  I have them turn in at the end of the class, a disk with
their "hacker toolkit" complete with applications/tools and an
explanation for why they selected each one of these.

Bob

-----Original Message-----
From: listbounce () securityfocus com [mailto:listbounce () securityfocus com]
On Behalf Of javier rojas
Sent: Monday, October 01, 2007 10:39 AM
To: Nick Vaernhoej
Cc: security-basics () securityfocus com
Subject: Re: Ideas for studentes

this sounds very insteresting



2007/10/1, Nick Vaernhoej <nick.vaernhoej () capitalcardservices com>:
Good morning,

How about setting the students up in groups of three and give them 
each a task. One installs Nessus, one installs Snort and one installs 
smoothwall on a box with httpd enabled and maybe sshd and similar 
easily enabled services.

Then hook them up to a switch allowing for port mirroring or an old
hub.
Initiate a Nessus scan against the firewalled box running the 
accessible services and see what Snort spews out.

That could be set up with a lot of defaults and plenty of challenges 
for any level of student.

However if it has to be completed in three hours and can't span 
multiple days this may take too long :)

Nick Vaernhoej
"Quidquid latine dictum sit, altum sonatur."

i could add a sleuthkit installation and see audit traces....:)

--
Ciao, Javier
linux counter #393724
GPG Key Fingerprint = 46B76CFEDB0161089D9ECB22FEFDE7EBA8C2007E


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]