• Home
  • SEED Labs
  • Lab Setup
  • Documentations
    • Instructor Guides and Manuals
    • Publications
    • Miscellaneous Manuals
  • Workshops
  • About
    • About Us
    • Fundings
    • Who are using SEED Labs?
  • News

Network Security Labs

  • TCP/IP Attack Lab

    Launching attacks to exploit the vulnerabilities of the TCP/IP protocol, including session hijacking, SYN flooding, TCP reset attacks, etc.

  • Heartbleed Attack Lab

    Using the heartbleed attack to steal secrets from a remote server.

  • Local DNS Attack Lab

    Using several methods to conduct DNS pharming attacks on computers in a LAN environment.

  • Remote DNS Attack Lab

    Using the Kaminsky method to launch DNS cache poisoning attacks on remote DNS servers.

  • Packet Sniffing and Spoofing Lab

    Writing programs to sniff packets sent over the local network; writing programs to spoof various types of packets.

  • Firewall Exploration Lab

    Writing a simple packet-filter firewall; playing with Linux's built-in firewall software and web-proxy firewall; experimenting with ways to evade firewalls.

  • Firewall Bypassing Lab

    Implement a simple vpn program (client/server), and use it to bypass firewalls.

  • Virtual Private Network (VPN) Lab

    Design and implement a transport-layer VPN system for Linux, using the TUN/TAP technologies. This project requires at least a month of time to finish, so it is good for final project.

  • Minix IPSec Lab

    Implement the IPSec protocol in the Minix operating system and use it to set up Virtual Private Networks.

  • Minix Firewall Lab

    Implementing a simple firewall in Minix operating system.

Copyright © Wenliang Du, Syracuse University