Mark Shtern.  Secure your infrastructure using IDS, application firewalls, or honeypots  Plant your flag on opponent’s machine  Prevent intruders from.

Slides:



Advertisements
Similar presentations
CN Objectives of the course To build and maintain a UNIX-based Network Systems & Servers Install Linux, fine tune the system, enable required server,
Advertisements

Configuring Windows to run Dr.Web scanner remotely.
Windows 2003 Server. Windows 2003 Server Contents Fitur Windows 2003 Server Installation And Configuration Windows Management Resource  User Management.
Monitoring Your Network Chris Bamber, IT Systems Manager Somerville College Confidentiality: The contents of this presentation and workshop discussion.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Using the Cisco SDM.
Windows XP Service Pack 2 Deployment Dave Lee West Campus.
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Profile-Based Web Intrusion Prevention System by Donovan Thorpe CS526 Fall 2002.
IDS configuration Yun Wang Martin Olsen Anna Paitian.
Information Networking Security and Assurance Lab National Chung Cheng University 1 A Real World Attack: wu-ftp.
Window NT Workstation and Server. Windows NT refers to two products workstation server can act as both a client and server in a network environment.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
SERVER INTEGRATION. OVERVIEW In our project we are integrating Widows server to facilitate interaction between diverse operating systems and applications.
The Operator Neutral Access At KistaIP. KistaIP ? Is a student dorm with 144 apartments.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Managing Network Security ref: Overview Using Group Policy to Secure the User Environment Using Group Policy to Configure Account Policies.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Module 14: Configuring Server Security Compliance
Security Testing Case Study 360logica Software Testing Services.
Section 10: Security CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Mark Shtern. Passwords are the most common authentication method They are inherently insecure.
Firewalls. Intro to Firewalls Basically a firewall is a __________to keep destructive forces away from your ________ ____________.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Endian Firewall Community Edition Roy Hickman Technology Director Peck Community Schools #
Intrusion Detection (ID) Intrusion detection is the ART of detecting inappropriate, incorrect, or anomalous activity There are two methods of doing ID.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Labs. Session 1 Lab: Designing Network Infrastructure in Windows Server 2008 Exercise 1: Preparing for a Network Infrastructure Design Exercise 2: Designing.
INFORMATION SECURITY UNIX & DB2. Introduction THE OBJECTIVE IS TO DESIGN SECURITY MEASURES FOR A MILITARY SYSTEM SYSTEM RUNNING A DB2 SERVER ON UNIX FOCUS.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
Game Mark Shtern. Game Objectives Secure your infrastructure using IDS, application firewalls, or honeypots Plant your flag on opponent’s machine Prevent.
Computer Security Status Update FOCUS Meeting, 28 March 2002 Denise Heagerty, CERN Computer Security Officer.
Module 11: Designing an Active Directory Federation Services Implementation in Windows Server 2008.
Module 10: Implementing Administrative Templates and Audit Policy.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Go to Start >> Programs >> Outlook Express ( as shown)
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
Chapter 7 Server Management Policies –User accounts –Groups Rights and permissions Examples.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
Chapter 9 Lecture 4. NetWare Novell’s network operating system Biggest competitor – Microsoft Windows.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
1 E-Site - FTP Services Setup / install guide. 2 About FTP services can run on any desired port(s) Runs as a windows service Works for all sites installed.
CSCE 548 Student Presentation By Manasa Suthram
Chapter 5 : Designing Windows Server-Level Security Processes
CompTIA Server+ Certification (Exam SK0-004)
Secure Software Confidentiality Integrity Data Security Authentication
VceTests VCE Test Dumps
NTC 324 RANK Education Your Life - ntc324rank.com.
NTC 324 RANK Perfect Education/ ntc324rank.com.
NTC 324 RANK Education for Service-- ntc324rank.com.
LINUX SECURITY Dongmei Wu ID: /25/00.
Intrusion Detection Systems (IDS)
ISMS Information Security Management System
Lesson 16-Windows NT Security Issues
Identity & Access Management
Game Mark Shtern.
This is a typical Windows user desktop
Game Mark Shtern.
Game Mark Shtern.
Network hardening Chapter 14.
Intrusion.
SharePoint Server Assessment Results
Jean-Francois LEBLANC Christian SEBASTIAN
Presentation transcript:

Mark Shtern

 Secure your infrastructure using IDS, application firewalls, or honeypots  Plant your flag on opponent’s machine  Prevent intruders from planting their flag  Remove your opponents’ flag  Identify intrusions  Discover your opponents’ password hashes and brute force them

 You are not allowed to configure any network firewalls (yours or an opponent’s)  You are not allowed to configure intrusion prevention  You are allowed to kill any process that belongs to an intruder  You are allowed to change your opponent’s passwords

 Deploy IT services  Telnet  Domain controller  DHCP  Web Server  Network File Sharing  Open at least 3 ports on each Linux workstations  Create at least 3 user accounts in each Linux/Windows workstation

 Plant/Find Backdoor 5  Plant a flag 20  Catch intrusion 10  Change an opponent’s password 10  Take ownership of an opponent’s complete infrastructure 40  Lose control of a Windows workstation -5  Lose control of a Linux workstation -10  Lose control of a DC -20