Sniffing packets sent over the local network and spoofing various types of packets.
Lanuch ARP cache posining attacks; use this attack to conduct man-in-the-middle attacks.
Launching attacks to exploit the vulnerabilities of the TCP/IP protocol, including session hijacking, SYN flooding, TCP reset attacks, etc.
Using the heartbleed attack to steal secrets from a remote server.
Using several methods to conduct DNS pharming attacks on computers in a LAN environment.
Using the Kaminsky method to launch DNS cache poisoning attacks on remote DNS servers.
Writing a simple packet-filter firewall; playing with Linux's built-in firewall software and web-proxy firewall; experimenting with ways to evade firewalls.
Implement a simple vpn program (client/server), and use it to bypass firewalls.
Design and implement a transport-layer VPN system for Linux, using the TUN/TAP technologies. This project requires at least a month of time to finish, so it is good for final project.