IT4510 - Ethical Hacking

IT4510 @ utahtech

Final Project

Requirements

group list

Your machines

In this project you will create an instance of a linux machine, a Windows XP machine, and a Windows 7 machine. On each OS you should enable between 5-10 services that can be seen on the network. Another group will try to compromise your machines and you will try to compromise another groups’ machines.

The services that you select to run on your OS should be minimally configured (and perhaps even have some glaring holes that the other group can find fairly readily). You should also configure a couple of different users on each OS (some could have dictionary based passwords).

Choose one of you machine and install a HIDS on it. Hopefully it will let you know if you have been compromised.

Remote machines

The machines of the group that you are to attack:

Hardening

When/if you receive notification from the other group that they were able to compromise your machine, you should take steps necessary to secure it so that the vulnerability will be gone. Security does not consist of simply unplugging the machine from the network!!! Document what you did.

To pass off

You will present your findings above in class during finals week. Please create a slideshow presentation and have the entire group participate.