tum/ cs/ network architectures and services/ ilab
ilab2
[] Wed, 17 Aug 2022 16:30:15 +0200 | en
>
view_structure
iLab2 summer 2022 Course Content
You can find the schedule here.
Preface
0 Demonstration lab - This lab module makes you familiar with the web based learning system.
a Cisco IOS Tutorial - This tutorial gives an introduction to the basics of Cisco IOS.
b Lab room and Linux tutorial - This tutorial introduces the lab room environment and our GNU/Linux machines.
c Programming Language Tutorials - This tutorial gives an introduction to the programming languages used in the iLab2 (C, Java, Python). It also introduces the basics of Cisco IOS.
1 IPv6 - In this lab different features of IPv6 are examined, most notably StateLess Address Auto Configuration (SLAAC), ICMPv6 and DHCPv6. Additionally, a DNS Server and automatic Zone transfers are configured.
Some more specific topics of IPv6 are covered by this lab: DNS64, NAT64, Fragmentation, and Dual Stack (IPv6 + IPv4) hosts.
2 Lab Slot Preference - This lab is used for indicating your preferred lab slot times and isles
3 Border Gateway Protocol - This lab is about the Border Gateway Protocol (BGP) that is used for routing between Autonomous Systems (AS). You will learn about the power of the system and the risks of configuration errors...
4 Your Exercise - In this lab you will change roles from the participant to the lab designer and the grading advisor.
You will use the knowledge you gained before and create a small exercise module on your own!
5 [vLab] Last Night - Attacks on IT systems are a common occurrence. You may install measures to make attacks harder, but as with bicycle locks, you cannot completely prevent intrusion. With enough effort, an attacker will be able to get in.
In order to learn from attacks, knowledge about tools as well as basic forensic skills are essential.

In this lab, you will learn how to analyze and reverse-engineer an attack after it has happened.
6 [vLab] I can see you - The undetectable network cheat - This lab is about creating an undetectable cheat for our hypothetical game "Stounter-Crike" using information extracted from network packets. You will learn about cheats in general and how to detect them, about encryption, compression, and serialization. We offer a self created GUI for our little simulated game and a GUI for a radar cheat, which you will have to finish in the lab.
7 s2o part1 - DIY Hardware - Smart Space Orchestration (S2O) describes the comprehensive orchestration of Smart Devices within  Smart Spaces. S2O can be divided into two parts: the hardware maker culture and the software maker culture.

In this first s2o lab we have a closer look at the hardware maker culture. We build our own Smart Device, write its firmware, and remotely manage it.

You learn how to work with electronics, and how to program the Arduino platform.
You do performance measurements of a Peer-to-Peer (P2P) system and learn about meaningful statistical evaluations.
8 s2o part2 - DIY Software -

The Maker Culture can be divided into hardware and software making. In part I we focused on the hardware part. This lab's focus is on the software part.

We will use the Distributed Smart Space Orchestration System (DS2OS) to implement different Smart Space services. You will learn more about Ubiquitous Computing, Pervasive Computing, the Internet of Things, Cyber Physical Systems, Context, Middleware, Peer-to-Peer, Service Orientation, and Autonomous Computing.

In the practical part, we will create a fancy thermometer, and an exciting game that can be controlled with the remote control that we know from the last part.

9 Hacking and Defense, Black hat or White hat? You decide! - In this lab, the most well-known tools that are tipically used by a network attacker to compromise the availability, integrity, authenticity or confidenciality of a vulnerable server are going to be used. Besides, a security policy is going to be implemented in a firewall of an organization in order to prevent or mitigate any type of attack. Finally, in the last part of this lab, the IPv6 protocol is going to be hacked taking advantage of its basic operation.

This way, the student will be able to study, understand and present solutions to the vulnerabilities that can be transformed into attacks, and get the opportunity to learn how to use security tools that are being used in real life. The tools that are going to be used are: metasploit framework, iptables, nmap and thc-ipv6. Tools often used by penetration testing experts.
10 Smart Home over IRC - While a chat protocol might not be optimized for the smart space setting, it can be an interesting option if the infrastructure is already present. This Lab focuses on the IRC protocol, centralized Smart home management and the combination of the two.
After being introduced to the basics of the application layer protocol, you will be able to build up your own smart chatroom allowing both user-to-device interaction and device-to-device communication!
11 WWW Security - In this lab, you are going to investigate some of the most important security challenges on the WWW.
You will hack a Web server using a number of attack techniques, working your way through SQL Injection, Cross-Site Scripting and Remote Code Execution until you gain shell access to the server and can manipulate the file system.
*:0.0749sec | © Chair of Network Architectures and Services | labsystem mop