IT4510 @ utahtech
In this project you will create an instance of a linux machine, a Windows XP machine, and a Windows 7 machine. On each OS you should enable between 5-10 services that can be seen on the network. Another group will try to compromise your machines and you will try to compromise another groups’ machines.
The services that you select to run on your OS should be minimally configured (and perhaps even have some glaring holes that the other group can find fairly readily). You should also configure a couple of different users on each OS (some could have dictionary based passwords).
Choose one of you machine and install a HIDS on it. Hopefully it will let you know if you have been compromised.
The machines of the group that you are to attack:
When/if you receive notification from the other group that they were able to compromise your machine, you should take steps necessary to secure it so that the vulnerability will be gone. Security does not consist of simply unplugging the machine from the network!!! Document what you did.
You will present your findings above in class during finals week. Please create a slideshow presentation and have the entire group participate.