Instructor Guidelines and Manuals
Who are using SEED Labs?
Network Security Labs
Packet Sniffing and Spoofing Lab
Sniffing packets sent over the local network and spoofing various types of packets using Python and C.
ARP Cache Poisoning Attack Lab
Lanuch ARP cache posining attacks; use this attack to conduct man-in-the-middle attacks.
ICMP Redirect Attack Lab
Attacks at the IP layer, ICMP redirect attack, and man-in-the-middle attack.
TCP Attacks Lab
Launching attacks to exploit the vulnerabilities of the TCP protocol, including session hijacking, SYN flooding, TCP reset attacks, etc.
The Mitnick Attack Lab
Launching the classic Mitnick attack to gain the unauthorized access to the target machine. This is a special case of TCP session hijacking.
DNS Labs (5 labs)
Firewall Exploration Lab
Writing a simple packet-filter firewall; playing with Linux's built-in firewall; evading firewalls using SSH tunnel.
Firewall Evasion Lab
Bypassing firewalls using static port forwarding, dynamic port forwarding, and VPN.
VPN Tunneling Lab
Incrementally build a simple VPN program, using the TUN/TAP interface, to learn how the VPN tunneling works.
Virtual Private Network (VPN) Lab
Design and implement a mini-VPN program, using TUN/TAP and TLS. This project requires at least a month of time to finish, so it is good for final project.
BGP Exploration and Attack Lab
Using an Internet simulator to learn how BGP works, configuring BGP for stub and transit autonomous systems, launching attacks on BGP.
Morris Worm Attack Lab
Write a simple Internet worm, and test it in an Internet emulator.
Heartbleed Attack Lab (Ubuntu 12.04 VM only)
Using the heartbleed attack to steal secrets from a remote server.