20
Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA 16802 About the Hands-on Lab About the Hands-on Lab IST 515 Learning by Doing Theory Practice

Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology

  • Upload
    dixon

  • View
    51

  • Download
    2

Embed Size (px)

DESCRIPTION

About the Hands-on Lab. Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA 16802. Theory  Practice. Learning by Doing. IST 515. Hands-on Labs Folder. Lab User Guide About the Lab Slide. Lab Folder. Objectives. - PowerPoint PPT Presentation

Citation preview

Page 1: Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology

Chao-Hsien Chu, Ph.D.College of Information Sciences and Technology

The Pennsylvania State UniversityUniversity Park, PA 16802

About the Hands-on LabAbout the Hands-on Lab

IST 515

LearningbyDoing

Theo

ry

Practi

ce

Page 2: Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology

Hands-on Labs Folder

• Lab User Guide

• About the Lab Slide

Lab Folder

Page 3: Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology

ObjectivesObjectives

This module will familiarize you with the following: The special needs for IA education Common approaches used in lab design The challenges faced Motivations for virtual security lab (VSL) VSL implementation at UP How to install “VMware Infrastructure Client”? How to login to VSL? The hands-on exercises for this course.

Page 4: Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology

ReadingReading

• IST 515, “A Brief Guide for Using VSL.” (Required)• Jorg Keller and Ralf Naues, “Design of a Virtual Computer

Security Lab,” Proceedings of Communication, Network, and Information Security (CNIS 2006), 2006. http://pv.fernuni-hagen.de/docs/547-045.pdf

• Padman, V. and Memon, N., “Design of A Virtual Laboratory for Information Assurance Education and Research,” Proc. of the 2002 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY (17-19 June 2002).

• Summers, W. C., Carlos Martin, B., “Using a Virtual Lab to teach an online Information Assurance Program,” InfoSec CD 2005 (Sept. 2005).

• VMWare, Inc. http://vmware.com

Page 5: Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology

The Special Needs for IA EducationThe Special Needs for IA Education

Hands-on exercise is a critical and integrated component of any effective information security education and training program.

Students are expected to experiment with security software without worry that their experiment may impact other computer systems / students.

Students should be able to evaluate the security of different operating systems, attempt to compromise the security of computer systems, and install additional security mechanisms without concern that their actions may affect other computers systems / students.

Security hardware (Firewall, IDS); Human factors; Defense-in-depth; Multidisciplinary.

Page 6: Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology

Common Approaches UsedCommon Approaches Used

Some instructors require students to complete the exercises using their own computers.

Lab experiences are typically conducted in an isolated computer lab where security problems that may occur are unable to affect other computers on campus.

A common alternative is to develop a virtual network environment using simulators:- Virtual Network System (VNS).- Use virtual machines (VM) to emulate the hardware of different computers in a network.

Virtual Gaming /Simulation (2nd Life)

Page 7: Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology

The Challenges FacedThe Challenges Faced

The number of security related courses are increasing.

The number of students interested in SRA are increasing.

The physical space for security lab remains the same or reduced.

Difficulty in maintaining an isolated security lab to meet classes and students’ schedules.

Need to accommodate commuter students. Need to provide distance-learning education. Lack of emulators for security hardware

Page 8: Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology

Motivations for VSLMotivations for VSL

Increasing advanced hands-on learning in networking and security courses (without sacrificing from content).

Making campus computing resources available to commuter students for 7/24.

Providing hands-on learning experiences in a distance learning model.

Reducing lab hardware, software, and maintenance costs, and the need for specialized computer labs.

Providing an agile and secured computing environment.

Page 9: Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology

Virtual Machine / EnvironmentVirtual Machine / Environment

• Virtual machines are software emulations of fully functional operating systems such as Windows XP, Windows Sever 2008, and Linux.

Page 10: Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology

Virtual Lab

Win XP(2) LinuxWin XP(1) Win XP(2) LinuxWin XP(1) Win XP(2) LinuxWin XP(1)

Internet

X.2 X.3 X.4 X.6 X.7 X.8

X: 192.168.0

TargetVirtual

Machines

ClientVirtual

Machines

ClientPhysicalMachines

vslvc.ist.psu.eduESX Server

VIC

Page 11: Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology

Networking StatusNetworking Status

• All virtual machines (Targets and clients) are networked together.

• You should be able to access target machines/servers without special setting.

• You need to turn off the firewall setting in your client machines (note: in Windows Security, located in the Control Panel) in order to communicate with each other and capture their traffic.

Page 12: Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology

Hands-on PracticeHands-on Practice

• Install VMware Infrastructure Client.Install VMware Infrastructure Client.• Login to the virtual security Lab and your Login to the virtual security Lab and your

client machines.client machines.• Find the IP address of your client machines. Find the IP address of your client machines. • Check the network connection between target Check the network connection between target

and client machines.and client machines.• Check the network connection between your Check the network connection between your

client machines.client machines.• Get to know your virtual security lab Get to know your virtual security lab

environment. environment.

Page 13: Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology

Install VMware Infrastructure ClientInstall VMware Infrastructure Client

• Start an Internet browser (e.g., IE Explorer or Firefox).

• Enter URL: https://vhol.up.ist.psu.edu/

• Click on the link “Download vSphere Client” to download the VS Client.

• Install it on your computer (note: the client only needs to be installed one time).

• If you use an earlier version of VI, please uninstall it (uninstall Microsoft Visual J as well if you use a 64 bits OS), delete related files from Program Files directory, reboot the system and then install the newer version.

Page 14: Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology

How to Login to VSL?How to Login to VSL?

• Activate VMware Infrastructure client.

• Enter the IP address of the virtual network, your Penn State User name and Password. Click the Login button to connect to the network.

• Follow the instructions provided in user guide to try the hands-on lab.

Page 15: Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology

Depends on which team you were

assigned. In this case, it is team 1.

Screenshot of virtual

environmentPower-on

Button

Open Console and Inventory are two

important menu icons that you need to

explore

Page 16: Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology

Login to Virtual ClientsLogin to Virtual Clients

• Click on the “Power on” button (green color, located on the top menu bar) to turn on the machine.

 Login to the Virtual Win XP. Click on the “Administrator” Logged on button to login;

 Login to the Virtual Linux. Enter “administrator” in the text box of User Name and “password” in the Password text box.

Page 17: Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology

How to Access File ServerHow to Access File Server

• The IP for the file server is: 192.168.0.2.

• Click on the “Start” button and then select the “Run” button to open a dialog box. Enter the IP address of the file sharing server.

• Log into the file server using your virtual machine ID and password. You will see two folders: Share and Upload.

ID: IST515-Pub

Password: IST515-Pub

(For Windows Clients Only)

Page 18: Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology

IST 515: Penetration Test LabsIST 515: Penetration Test Labs

Lab 1: Security Policy. Lab 2: Footprinting. Whois, Nslookup, Dig, Ping,

Traceroute and Sam Spade.

Lab 3: Network Scanning. SuperScan, Netbrute, NMap. Lab 4: Enumeration. LANguard Network Security

Scanner, ENUM, and SNScan. Lab 5: System Hacking. Password Cracking; spyware,

and Metasploit Framework. Lab 6: Trojan and Backdoor. Lab 7: Buffer Overflow.

Lab 8: Social Engineering.

Page 19: Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology

Lessons LearnedLessons Learned

It allows students to gain hands-on experiences without the need of physically attending labs on campus.

Instructors can use the system in class to enhance teaching and discussion anywhere and anytime.

Assignments can be designed without limited by the available computing resources.

Students are able to experiment with security software without worry that their experiment may impact other computer systems.

Students can evaluate security of different operating systems, attempt to compromise the security of computer systems, and install additional security mechanisms without concern that their actions may affect other computers.

Page 20: Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology

Thank You?

Any Question?