tum/ cs/ network architectures and services/ ilab
ilab2
[] Mon, 25 Oct 2021 13:24:46 +0200 | en
>
view_structure
iLab2 summer 2021 Course Content
You can find the schedule here.
Demonstration Lab content...
a Cisco IOS Tutorial - This tutorial gives an introduction to the basics of Cisco IOS.
b Lab room and Linux tutorial - This tutorial introduces the lab room environment and our GNU/Linux machines.
c Programming Language Tutorials - This tutorial gives an introduction to the programming languages used in the iLab2 (C, Java, Python). It also introduces the basics of Cisco IOS.
0 Demonstration lab - This lab module makes you familiar with the web based learning system.
1 [vLab] IPv6 - In this lab different features of IPv6 are examined, most notably StateLess Address Auto Configuration (SLAAC), ICMPv6 and DHCPv6. Additionally, a DNS Server and automatic Zone transfers are configured.
Some more specific topics of IPv6 are covered by this lab: DNS64, NAT64, Fragmentation, and Dual Stack (IPv6 + IPv4) hosts.
2 Collaboration - Ideas and tips for collaboration in times of Corona
3 [vLab] Border Gateway Protocol - This lab is about the Border Gateway Protocol (BGP) that is used for routing between Autonomous Systems (AS). You will learn about the power of the system and the risks of configuration errors...
4 [vLab] Save the ISS with Machine Learning! - In this lab you will deepen your knowledge about neural networks and in specific autoencoders and all techniques that are related to create, train and apply a deep learning model. You will be introduced to the python frameworks pandas and tensorflow and IBM's Node-RED flow-based programming system for the Internet of Things.
5 [vLab] Time is Power - QUANTUMINSERT - 2013. Edward Snowden leaked some crucial information about NSA's supervision methods affecting a huge amount of people around the world. The QUANTUMINSERT attack represents an archetype of methods used by the NSA's Tailored Access Operations division or the GCHQ. In this lab, you will get a good insight, how this attack works and moreover will implement it yourself to step into the footprints of crafty NSA hackers spoofing the whole world.
6 Your Exercise - In this lab you will change roles from the participant to the lab designer and the grading advisor.
You will use the knowledge you gained before and create a small exercise module on your own!
7 Funnel Through a Tunnel with IPSec - In this lab you will learn how to set up IPSec for different scenarios. Furthermore, you will also learn about the benefits of IPSec in depth, and will be able to point out differences between the various modes in which IPSec can be configured and asses which mode is more applicable for a given Use Case.
8 Saving the World - from Home - The iLab2 Minilab "Saving the World - from Home" introduces Machine to Machine protocols and their usecases. The two protocols CoAP and MQTT are examined as examples of Machine to Machine protocols. During the lab the students will learn how the protocols work and how to configure and use them.
d Hiding in Plain Sight - Endless amounts of information are flowing around us. What if you could hide your communication inside them? How can you transfer information completely undetected, bypass censorship and leaking groundbreaking information, or control your evil Botnet through firewalls?
9 Last Night - Attacks on IT systems are a common occurrence. You may install measures to make attacks harder, but as with bicycle locks, you cannot completely prevent intrusion. With enough effort, an attacker will be able to get in.
In order to learn from attacks, knowledge about tools as well as basic forensic skills are essential.

In this lab, you will learn how to analyze and reverse-engineer an attack after it has happened.
10 WWW Security - In this lab, you are going to investigate some of the most important security challenges on the WWW.
You will hack a Web server using a number of attack techniques, working your way through SQL Injection, Cross-Site Scripting and Remote Code Execution until you gain shell access to the server and can manipulate the file system.
*:0.1168sec | © Chair of Network Architectures and Services | labsystem mop