tum/ cs/ network architectures and services/ ilab
ilab2
[] Fri, 15 Nov 2019 20:10:45 +0100 | en
>
view_structure
iLab2 winter 19 Course Content
You can find the schedule here.
Preface
a Cisco IOS Tutorial - This tutorial gives an introduction to the basics of Cisco IOS.
b Lab room and Linux tutorial - This tutorial introduces the lab room environment and our GNU/Linux machines.
c Programming Language Tutorials - This tutorial gives an introduction to the programming languages used in the iLab2 (C, Java, Python). It also introduces the basics of Cisco IOS.
d Demonstration Lab - This lab module makes you familiar with the web-based learning system and the didactical principles behind the course.
0 IPv6 - In this lab different features of IPv6 are examined, most notably StateLess Address Auto Configuration (SLAAC), ICMPv6 and DHCPv6. Additionally, a DNS Server and automatic Zone transfers are configured.
Some more specific topics of IPv6 are covered by this lab: DNS64, NAT64, Fragmentation, and Dual Stack (IPv6 + IPv4) hosts.
1 Lab Slot Preference - This lab is used for indicating your preferred lab slot times and isles
2 Border Gateway Protocol - This lab is about the Border Gateway Protocol (BGP) that is used for routing between Autonomous Systems (AS). You will learn about the power of the system and the risks of configuration errors...
3 Your Exercise - In this lab you will change roles from the participant to the lab designer and the grading advisor.
You will use the knowledge you gained before and create a small exercise module on your own!
4 Time is Power - QUANTUMINSERT - 2013. Edward Snowden leaked some crucial information about NSA's supervision methods affecting a huge amount of people around the world. The QUANTUMINSERT attack represents an archetype of methods used by the NSA's Tailored Access Operations division or the GCHQ. In this lab, you will get a good insight, how this attack works and moreover will implement it yourself to step into the footprints of crafty NSA hackers spoofing the whole world.
5 Hacking and Defense, Black hat or White hat? You decide! - In this lab you will use well-known tools typically used by attackers to compromise the availability, integrity, authenticity or confidentiality of a vulnerable server. You will also set up a firewall to mitigate the attack.
In the last part of the lab you will lean about IPv6 protocol vulnerabilities.

You will use the following tools that are also used by penetration testers: Metasploit, iptables, Nmap, and thc-ipv6
6 s2o part1 - DIY Hardware - Smart Space Orchestration (S2O) describes the comprehensive orchestration of Smart Devices within  Smart Spaces. S2O can be divided into two parts: the hardware maker culture and the software maker culture.

In this first s2o lab we have a closer look at the hardware maker culture. We build our own Smart Device, write its firmware, and remotely manage it.

You learn how to work with electronics, and how to program the Arduino platform.
You do performance measurements of a Peer-to-Peer (P2P) system and learn about meaningful statistical evaluations.
7 s2o part2 - DIY Software -

The Maker Culture can be divided into hardware and software making. In part I we focused on the hardware part. This lab's focus is on the software part.

We will use the Distributed Smart Space Orchestration System (DS2OS) to implement different Smart Space services. You will learn more about Ubiquitous Computing, Pervasive Computing, the Internet of Things, Cyber Physical Systems, Context, Middleware, Peer-to-Peer, Service Orientation, and Autonomous Computing.

In the practical part, we will create a fancy thermometer, and an exciting game that can be controlled with the remote control that we know from the last part.

8 Smart Home over IRC - While a chat protocol might not be optimized for the smart space setting, it can be an interesting option if the infrastructure is already present. This Lab focuses on the IRC protocol, centralized Smart home management and the combination of the two.
After being introduced to the basics of the application layer protocol, you will be able to build up your own smart chatroom allowing both user-to-device interaction and device-to-device communication!
9 WWW Security - In this lab, you are going to investigate some of the most important security challenges on the WWW.
You will hack a Web server using a number of attack techniques, working your way through SQL Injection, Cross-Site Scripting and Remote Code Execution until you gain shell access to the server and can manipulate the file system.
*:0.0431sec | © Chair of Network Architectures and Services | labsystem mop