Solved

IT Security

Posted on 2012-03-27
2
396 Views
Last Modified: 2012-03-29
I am taking an IT Security class, We have a project that requires students to attack each other. The games consist of offensive and defensive challenges, with each team keeping its own network and services up and running while attacking the competiothers. The OS is windows.
I have no idea how to do that, Would you advice me of some web sites that guide me through that?
0
Comment
Question by:lojayn
2 Comments
 
LVL 25

Assisted Solution

by:madunix
madunix earned 60 total points
ID: 37773070
0
 
LVL 6

Accepted Solution

by:
awaggoner earned 65 total points
ID: 37773079
http://www.csoonline.com/article/221695/red-team-versus-blue-team-how-to-run-an-effective-simulation

http://www.breakingpointsystems.com/community/blog/red-team-blue-team-a-better-approach-to-cyber-security-training/
http://www.breakingpointsystems.com/community/blog/red-team-blue-team-2-advanced-cyber-exercises/

Generally speaking, have your defense and attacks planned out and practiced before the actual challenge.  Don't waste time downloading tools.  Have everything you need on a couple of USB drives (make sure you have backups).

If your opponent is relying on downloading patches/tools, get them offline with DoS attacks.  Don't forget the infrastructure if it is fair game (switches, routers, etc).  Try to get an inventory of what will be in the simulation and build your attacks and defenses around that.

Password cracking tools (Cain & Able, John the Ripper, etc) and vulnerability scanners ( Nessus ) are a must.

The actual step by step is something you will need to work out yourself.  Be careful during your research.  You don't want to get your computer infected with Malware.
0

Featured Post

Free Tool: Postgres Monitoring System

A PHP and Perl based system to collect and display usage statistics from PostgreSQL databases.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Host Profile issue on Esxi 5.5 U3a 6 570
Is this error real? 2 54
SHA2 certs for IIS AND Java? 2 113
desktop security assessment (windows devices). 2 41
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
In a recent article here at Experts Exchange (http://www.experts-exchange.com/articles/18880/PaperPort-14-in-Windows-10-A-First-Look.html), I discussed my nine-month sandbox testing of the Windows 10 Technical Preview, specifically with respect to r…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question