Labtainer Lab Summary
The following labs are packaged within the Labtainer distribution. There is no separate download step required for any of the labs. Whenever they are run the first time, the framework automatically downloads whatever is needed from the Docker Hub.
- shellbasics: An introduction to a set of Linux shell commands.
- telnetlab: The student uses telnet to access a remote computer, and employs the tcpdump tool to view plaintext passwords, and to observe how use of ssh mitigates that vulnerability.
- onewayhash: Cryptographic hashes are generated via the openssh utility, using different algorithms (derived from the Crypto Hash SEED lab).
- sshlab: Use of a public/private key pair to access a server via ssh.
- vpnlab: Example use of OpenVPN to protect network traffic.
- nmap-discovery: The nmap utility is used to locate an ssh server on a network and to discover the port number being used by the service.
- pcapanalysis: The tshark network traffic analysis tool is used to identify and display a specific network packet containing a plaintext password.
- nmap-ssh: The nmap utility is utilized in combination with the tshark network traffic analysis utility to demonstrate a security problem with an ssh server.
- iptables: The iptables utility is used to configure a “firewall” component to only forward selected application service traffic between a client and a server.
- plc: A simulated PLC is deployed to control the water level in a farm’s pond. The student must implement a protection mechanism to prevent the PLC from being loaded with corrupt software. This lab assumes a basic working knowledge of Python programming.
- bufoverflow: An example program vulnerable to a stack buffer overflow is exploited by crafting data consumed by the program. (Derived from the Buffer Overflow SEED Lab).
- formatstring: Explore C library printf function vulnerabiliteis. (Derived from the Format String SEED Lab.)