The document provides guidelines for an attack window lab session at the National Institute of Technology. Students will have access to target machines with vulnerable services from 9am to 12pm to launch attacks. They can use the lab systems or their own laptops connected to the lab network, and are encouraged to bring their own attack tools and code. The session will be run in batches of 2-3 students with 20-30 minutes for each batch to attack the target system, demonstrate results, and fill out a report before leaving the lab.
The document provides guidelines for an attack window lab session at the National Institute of Technology. Students will have access to target machines with vulnerable services from 9am to 12pm to launch attacks. They can use the lab systems or their own laptops connected to the lab network, and are encouraged to bring their own attack tools and code. The session will be run in batches of 2-3 students with 20-30 minutes for each batch to attack the target system, demonstrate results, and fill out a report before leaving the lab.
The document provides guidelines for an attack window lab session at the National Institute of Technology. Students will have access to target machines with vulnerable services from 9am to 12pm to launch attacks. They can use the lab systems or their own laptops connected to the lab network, and are encouraged to bring their own attack tools and code. The session will be run in batches of 2-3 students with 20-30 minutes for each batch to attack the target system, demonstrate results, and fill out a report before leaving the lab.
Target machine with vulnerable services running Internet access not available in the lab You are free to get any software/tools You may bring your own laptop also Few systems are available to launch the attack(s) You may use your own attack code/tools You can come in batches (2 to 3) A time window of 20-30 minutes available for each batch IP address will be given at the start of the session Fill up the “Vulnerability Exploitation Report” and hand over to the coordinator
II. Attack Procedure
Enter the SSE lab (with your laptop and necessary tools) You can use any one of the lab machines or your laptop by connecting to lab network. Start an attack on the given target Inform coordinators when you accomplish an attack and demonstrate the results. Fill up “Vulnerability Exploitation Report” and hand over to the coordinator before leaving the lab