2016-04-18_145304_20160418145409
  • Description

成本的完整解決方案
此套資訊安全實驗平台提供創新的方式,可在最佳的網路安全觀念下的實做並傳遞網路安全與密碼學主題的經驗。訓練模組採用了在不同的網路安全風險時,特別針對不同的服務所採取的攻擊與反反制措施。

透過擁有詳細實驗題材的實驗室,親身體驗包括公鑰基礎建設(PKI),病毒,木馬,列舉(Enumeration),DOS (Denial of Service)等經驗。這些實驗皆有相關的理論基礎與技術說明所支撐,並著重於各大企業所遵循的各種資安與管理階層政策。使用者也能自行針對進階的資安主題做專案研究。....

實驗室設置的技術範圍:

■密碼學(Cryptography)

1.資料保護(Data protection)

2.驗證,授權/數位簽名(Verification, certificates/digital signatures)

■網路/電腦有關的威脅(Network/PC related threats)

1.侵入(Intrusion)

2.系統詳細的驗證(System details identification)

3.病毒(未知/隱藏)攻擊(Malware (unknown/hidden) actions)

4易受攻擊的事件(Vulnerable actions):中斷系統(Make systems inactive)&捕獲入侵者(Capture intruders actions)

■加密、解密技術(Cryptography)

1.由一組已知的資料來進行(A method by which known data can be:)

2.轉換進入到一個無法解讀或無法辨別的資料(Transformed into an unreadable or unrecognizable data)

隱藏進入一些其他的資料(Hidden into some other data - also called as Steganography)

3常用密碼術(Popular Crypto techniques:)

  • Symmetric stream cipher – RC4
  • Symmetric block cipher – DES, 3-DES
  • Asymmetric block cipher – RSA
  • Block cipher techniques – ECB etc

Hashing schemes – MD5
■網路服務上的密碼學技術(Web services using crypto techniques)

1.驗證完整的資料-找出任何被修改的資料(Validate the integrity of data – find out if any of ......the data is modified)

2.鑒定技術-系統的協助(Authentication techniques – for system access)

3.服務的範圍涵蓋(Services covered are:)

公共鑰匙平臺(PKI – Public Key Infrastructure)

資料應用驗證的一種認證方式(A certification method by which data/application is validated)
認證方案Authentication schemes, -CHAP, IP based
密碼加密學Steganography -(A method by which data is hidden into image or audio files.)


■電腦/網路驗證(PC/Network Identification)...
1.驗證任何系統的被使用及收集訊息(Identify what system is in use and collect details like:):

What is the OS;
What are ports that are in use;
What are the ports openly available;
2.Techniques used are:
Ping, Fast scan, port scan, don’t ping, TCP connect.
■網路系統的威脅(Network or System threats)...
1.DoS- Denial of Service:

重復快速的攻擊導致系統的崩潰(Bring down a system by repeated quick actions attack).
Example:servers sometimes saying no services available
2.DDoS- Distributed DoS: 模擬各個不同位置的電腦攻擊,快速的導致系統的崩潰(Attack from various locations/PCs simultaneously to quickly bring down the services)

3.Sniffer: 竊取複製網路中傳送中的資料(Capture copies of packets/data that travel in network)

4.Spoofing: 發送資料給系統中儲存的收件人(Send packets/data as if it is sent from a known friend to recipient)

實驗層級

根據實驗主題,針對不同的層級做研究。

● 層級I:執行服務
在這個層級中,將會討論需執行的網路服務與採取的程序。

● 層級II:網路攻擊與服務中斷
在這個層級中,將會解釋攻擊與中斷網路服務的方法,並在手冊中一步一步地講解這些步驟。

● 層級III:反反制
在這個層級中,討論在層級II中有關保護網路免於被攻擊經驗的管理與監控方法。

■網路攻擊( Web vulnerabilities)-誘捕系統 (Honeypots)

設計用來吸引攻擊者遠離關鍵系統的誘餌系統(A decoy system that are designed to lure an attacker away from a critical system)
攻擊者會認為這可能是一個真實的系統,並嘗試所有的攻擊技術(Attacker thinks that it may be a real system and tries all techniques)
攻擊者在攻擊時的手段會被紀錄下來並做分析,以了解攻擊者的動機與活動(These steps are captured for anlaysis to understand the attacker’s motive, activity)
病毒攻擊(Malware)
1.木馬(Trojans & backdoor concept): 就像木馬屠城計那樣,把惡意程式植到系統/電腦中(Malicious codes arriving into a system/PC like Trojan horse story)

2.病毒(Virus): 病毒活動的範例,還有簡單的偵測機制(Virus activity example and a simple detection mechanism)

■Advanced Experiments(Can be taken up as Projects)

駭客入侵網路伺服器並且偽造伺服器的認證(Hacking a web server and hosting a faked web server with credentials verified)
設置誘捕系統,並擷取資訊(Setting up a Honeypot and gathering information)
設置防火牆並且透過防火牆使網路變得更安全(Setting up a firewall and securing the network with a firewall)
調查並修復緩衝區溢位攻擊(Investigating and fixing buffer overflow exploits)
TCP對話劫持與包級維護(TCP session hijacking and packet level manipulation)
透過應用程式對已知的後門做弱點攻擊(Exploiting vulnerabilities of some application with a known backdoor)
分類嗅探器的資料並管理記錄檔(Categorizing sniffer data and log file management)
建立一個安全應用系統,如PKI(Setting up an application security system (like PKI))
建立一個端對端的網路安全基礎設施(Setting up an end-to-end network security infrastructure