Solved

IT Security

Posted on 2012-03-27
2
378 Views
Last Modified: 2012-03-29
I am taking an IT Security class, We have a project that requires students to attack each other. The games consist of offensive and defensive challenges, with each team keeping its own network and services up and running while attacking the competiothers. The OS is windows.
I have no idea how to do that, Would you advice me of some web sites that guide me through that?
0
Comment
Question by:lojayn
2 Comments
 
LVL 25

Assisted Solution

by:madunix
madunix earned 60 total points
Comment Utility
0
 
LVL 6

Accepted Solution

by:
awaggoner earned 65 total points
Comment Utility
http://www.csoonline.com/article/221695/red-team-versus-blue-team-how-to-run-an-effective-simulation

http://www.breakingpointsystems.com/community/blog/red-team-blue-team-a-better-approach-to-cyber-security-training/
http://www.breakingpointsystems.com/community/blog/red-team-blue-team-2-advanced-cyber-exercises/

Generally speaking, have your defense and attacks planned out and practiced before the actual challenge.  Don't waste time downloading tools.  Have everything you need on a couple of USB drives (make sure you have backups).

If your opponent is relying on downloading patches/tools, get them offline with DoS attacks.  Don't forget the infrastructure if it is fair game (switches, routers, etc).  Try to get an inventory of what will be in the simulation and build your attacks and defenses around that.

Password cracking tools (Cain & Able, John the Ripper, etc) and vulnerability scanners ( Nessus ) are a must.

The actual step by step is something you will need to work out yourself.  Be careful during your research.  You don't want to get your computer infected with Malware.
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
This video discusses moving either the default database or any database to a new volume.
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

6 Experts available now in Live!

Get 1:1 Help Now