Launching attacks to exploit the vulnerabilities of the TCP/IP protocol, including session hijacking, SYN flooding, TCP reset attacks, etc.
Using the heartbleed attack to steal secrets from a remote server.
Using several methods to conduct DNS pharming attacks on computers in a LAN environment.
Using the Kaminsky method to launch DNS cache poisoning attacks on remote DNS servers.
Writing programs to sniff packets sent over the local network; writing programs to spoof various types of packets.
Writing a simple packet-filter firewall; playing with Linux's built-in firewall software and web-proxy firewall; experimenting with ways to evade firewalls.
Implement a simple vpn program (client/server), and use it to bypass firewalls.
Design and implement a transport-layer VPN system for Linux, using the TUN/TAP technologies. This project requires at least a month of time to finish, so it is good for final project.
Implement the IPSec protocol in the Minix operating system and use it to set up Virtual Private Networks.
Implementing a simple firewall in Minix operating system.