Hands-on Workshop on Cybersecurity / Security+ and IPv6

 

[Registration is now closed]

Hands-on Workshop on Cybersecurity / Security+ and IPv6

Monday, June 17 – Friday, June 21, 2024

 
Organizers
  • Western Academy Support and Training Center (WASTC)
  • Network Development Group (NDG)
  • University of South Carolina (USC)
Venue
                            

Overview

                            

This workshop will cover two topics: 1) “Security Fundamentals” aligned with Security+, and 2) “IPv6”. The workshop will use two virtual lab libraries available on NETLAB+. The “Security Fundamentals” library covers aspects of network and computer security. Learners will be able to conduct cyberattacks such as Remote Access Trojan, Cross Site Scripting, SQL Injection, and Spyware (turning on the webcam and microphone of the victim’s computer, recording activities conducted on the computer, etc.). Then, the library teaches learners how to prevent such attacks using open-source tools, including intrusion detection with Suricata, stateful filters with IP tables, and private and public-key encryption. The “IPv6” library covers the basics of IPv6, including IPv6 addressing, global unicast address (GUI), link-local address (LLA), and IPv6 multicast address. The workshop will also cover techniques used to enable auto-configuration of IPv6 addresses and to transition from IPv4 to IPv6. Finally, the workshop will briefly discuss other new virtual lab libraries available on NETLAB+ recently developed by the University of South Carolina.

Outcomes

By the end of this tutorial, attendees will:

 
Cybersecurity Labs:
  • Perform vulnerability scanning and penetration testing
  • Create and deploy a malicious payload on a victim's machine
  • Maintain persistent access by installing a backdoor
  • Perform web-based attacks including SQL injection and XSS
  • Understand symmetric and asymmetric cryptography algorithms
  • Implement stateful packet filtering and deploy an intrusion detection system
IPv6 Labs:
  • Understand IPv6 basic configuration
  • Configure static and dynamic IPv6  addresses
  • Enable the coexistence of IPv4 and IPv6 networks using transitioning schemes

 

Intended Audience

The tutorial is targeted to IT educators and professionals such as system administrators, network engineers, and practitioners. The content is suitable for instructors who want to incorporate advanced material into their networking classes. The content is available for NETLAB systems.
 

Award Information

This activity is supported by NSF award 2118311 and ONR N00014-23-1-2245. 

 

Pre-requisites

Connectivity to the Internet and a browser to access the online virtual platform. Attendees will be provided with an account to access USC’s NETLAB system: https://netlab.cec.sc.edu/

Agenda

 

DAY 1: Monday, June 17

Time (PDT) Topic Presenter
09:00 - 09:15 Tutorial Overview [PDF, PPT] Elie Kfoury, Ali AlSabeh
09:15 - 09:45 Motivation for Cybersecurity Training and IPv6 [PDF, PPT] Elie Kfoury
09:45 - 09:50 Overview of Cybersecurity Labs [PDF, PPT] Elie Kfoury
09:50 - 10:00 Break  
10:00 - 10:50 Lab 1: Reconnaissance: Scanning with NMAP, Vulnerability Assessment with OpenVAS [PDF, PPT] Elie Kfoury
10:50 - 11:00 Break  
11:00 - 11:50 Lab 3: Escalating Privileges and Installing a Backdoor [PDF, PPT] Ali AlSabeh
11:50 - 12:00 Discussion and Summary Day 1 Elie Kfoury
12:00 - 13:00 Lunch  
13:00 - 14:00 Office hours Elie Kfoury, Ali AlSabeh
Video

 

DAY 2: Tuesday, June 18

Time (PDT) Topic Presenter
09:00 - 09:05 Review Labs 1, 3 Cybersecurity Lab Series Jorge Crichigno
09:05 - 09:25 Understanding Remote Access and Spyware [PDF, PPT] Elie Kfoury
09:25 - 10:15 Lab 4: Collecting Information with Spyware: Screen Captures and Keyloggers [PDF, PPT] Elie Kfoury
10:15 - 10:25 Break  
10:25 - 10:45 Denial of Service (DoS) Attacks [PDF, PPT] Ali AlSabeh
10:45 - 11:45 Lab 8: Denial of Service (DoS) Attacks: SYN/FIN/RST Flood, Smurf attack, and SlowLoris [PDF, PPT] Ali AlSabeh
11:45 - 12:00 Discussion and Summary of Day 2 Jorge Crichigno
12:00 - 13:00 Lunch  
13:00 - 14:00 Office hours Jorge Crichigno
Video

 

DAY 3: Wednesday, June 19

Time (PDT) Topic Presenter
09:00 - 09:05 Review Labs 4, 8 Cybersecurity Lab Series Jorge Crichigno
09:05 - 09:35 Intrusion Detection and Prevention Systems [PDF, PPT] Ali AlSabeh
09:35 - 10:15 Lab 14: Intrusion Detection and Prevention using Suricata [PDF, PPT] Ali AlSabeh
10:15 - 10:25 Break  
10:25 - 10:50 Password Attacks Overview [PDF, PPT] Elie Kfoury
10:50 - 11:45 Lab 19: Conducting Offline Password Attacks [PDF, PPT] Elie Kfoury
11:45 - 12:00 Discussion and Summary of Day 3 Jorge Crichigno
12:00 - 13:00 Lunch  
13:00 - 14:00 Office hours Jorge Crichigno
Video

 

DAY 4: Thursday, June 20

Time (PDT) Topic Presenter
09:00 - 09:05 Review Labs 14, 19 Cybersecurity Lab Series Jorge Crichigno
09:05 - 09:30 Introduction to IPv6 [PDF, PPT] Jorge Crichigno
09:30 - 10:15 Lab 3: IPv6 Address Configuration [PDF, PPT] Jose Gomez
10:15 - 10:30 Break  
10:30 - 11:00 IPv6 Routing Overview [PDF, PPT] Jose Gomez
11:00 - 12:00 Lab 7: IPv6 Static Routing Configuration  [PDF, PPT] Jose Gomez
12:00 - 13:00 Lunch  
13:00 - 14:00 Office hours Jorge Crichigno
Video

 

DAY 5: Friday, June 21

Time (PDT) Topic Presenter
10:00 - 10:20 Overview of Transitioning Strategies from IPv4 to IPv6 [PDF, PPT] Ali AlSabeh
10:20 - 11:00 Lab 11: Transitioning from IPv4 to IPv6 [PDF, PPT] Ali AlSabeh
11:00 - 11:15 Introduction to DNS64 [PDF, PPT] Jose Gomez
11:15 - 11:45 Lab 13: Enabling IPv4 and IPv6 Coexistence with DNS64 [PDF, PPT] Jose Gomez
11:45 - 12:00 Workshop Summary Jorge Crichigno
Survey


 

 

Resources

 

Item Note
Cybersecurity Fundamentals Pod Link This link contains the resources to deploy the Cybersecurity Fundamentals Pod in any Netlab+ system
Pod installation and configuration guide Link This link takes to the manual with the steps to deploy the Cybersecurity Fundamental pod in Netlab+
Introduction to IPv6 Pod Link This link contains the resources to deploy the Introduction to IPv6 Pod in any Netlab+ system
hping3 command manual Link  hping3 is used for running different types of DoS attacks
Mininet: Link Virtual testbed enabling the development and testing of network tools and protocols
Containernet: Link Mininet fork that allows to use Docker containers as hosts in emulated networks
Mininet Installation:Link A guide that describes the steps to install Mininet on Linux
Wireshark: Link Packet analyzer used for network troubleshooting, analysis, protocol development, and education