Solved

IT Security

Posted on 2012-03-27
2
384 Views
Last Modified: 2012-03-29
I am taking an IT Security class, We have a project that requires students to attack each other. The games consist of offensive and defensive challenges, with each team keeping its own network and services up and running while attacking the competiothers. The OS is windows.
I have no idea how to do that, Would you advice me of some web sites that guide me through that?
0
Comment
Question by:lojayn
2 Comments
 
LVL 25

Assisted Solution

by:madunix
madunix earned 60 total points
ID: 37773070
0
 
LVL 6

Accepted Solution

by:
awaggoner earned 65 total points
ID: 37773079
http://www.csoonline.com/article/221695/red-team-versus-blue-team-how-to-run-an-effective-simulation

http://www.breakingpointsystems.com/community/blog/red-team-blue-team-a-better-approach-to-cyber-security-training/
http://www.breakingpointsystems.com/community/blog/red-team-blue-team-2-advanced-cyber-exercises/

Generally speaking, have your defense and attacks planned out and practiced before the actual challenge.  Don't waste time downloading tools.  Have everything you need on a couple of USB drives (make sure you have backups).

If your opponent is relying on downloading patches/tools, get them offline with DoS attacks.  Don't forget the infrastructure if it is fair game (switches, routers, etc).  Try to get an inventory of what will be in the simulation and build your attacks and defenses around that.

Password cracking tools (Cain & Able, John the Ripper, etc) and vulnerability scanners ( Nessus ) are a must.

The actual step by step is something you will need to work out yourself.  Be careful during your research.  You don't want to get your computer infected with Malware.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This is a guide to the following problem (not exclusive but here) on Windows: Users need our support and we supporters often use global administrative accounts to do this. Using these accounts safely is a real challenge. Any admin who takes se…
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
This Micro Tutorial will give you a basic overview how to record your screen with Microsoft Expression Encoder. This program is still free and open for the public to download. This will be demonstrated using Microsoft Expression Encoder 4.
Hi friends,  in this video  I'll show you how new windows 10 user can learn the using of windows 10. Thank you.

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now