Difference between revisions of "Red Team Project"

From CyberSecurity
Jump to: navigation, search
Line 39: Line 39:
 
Thanks,
 
Thanks,
 
-geoff
 
-geoff
 
 
 
* [http://www.cse.ucsd.edu/users/voelker/cse291/redteam.html Description of Programming Component]
 

Revision as of 21:08, 10 October 2005

Instructions for the programming part of the red team project are available at:

Note that Kiran Tati (ktati@cs.ucsd.edu) is serving as the TA for the programming aspect of the project.

Apologies for being a day late; I decided that the framework for doing it entirely as a networking exploit was getting in the way of the core process of implementing the exploit itself. So I reverted to a simpler form of the project.

Some things to keep in mind:

  • We have yet to finalize group membership.
  • We have created accounts on the machines at the granularity of

groups. Since we don't have groups yet, though, you cannot login. But you should still be able to make substantial progress on the project, particularly if you already have an account on some other Linux machine. In reality, you only need our machines to do the very last step (and the last step is the easy one). And you should be reading the background material before you do any programming.

  • If you want to go solo on the project, let us know and we can give

you your own account.

  • With the background reading and the tutorial slides, implementing

the exploit should not take much time. If you find yourself spending more than a day without making substantial progress, send mail to me and Kiran.

Let us know if you have any questions or encounter difficulties.

Our hope is that you'll find the project to be an enjoyable one, and a useful learning experience.

Thanks, -geoff