Project 5
Attack Familiarization
COSC 352
Spring 2003
Due April 22, 2003


My experience in the military has convinced me that in order to defend against attacks, you need to be able to see your defences the way that an attacker will. You therefore need to understand how an attacker does this. This assignment is intended to allow you to experiment in reconnaissance and attack tools in a safe (for everyone else) environment.

You still have an account on the machine named ia-class.georgetown.edu. Your assignment is to log onto this machine, and to determine how you would go about breaking into the host named "victim'' (IP address 192.168.14.8) which is on a private subnet and is only accessible from ia-class. Notice I said "how you would" break in. Your assignment is not to break in, but to learn how it might be possible to do so.

I would suggest the following strategy:

What to turn in:
IMPORTANT

It is possible to use the scanning tools on ia-class against other hosts on the Georgetown Campus and on the Internet. This is forbidden (verboten, prohibited, not allowed) by class policy and by the Georgetown Acceptable Use Policy, and anyone caught doing this will receive a severe grade
penalty. Don't think that I am not watching.

Additionally, remember the goal of the assignment is not to turn you into a computer attacker. It is instead to allow you to learn the basics of how attackers operate so that you may more successfully defend your systems in the future. Breaking into other computers, even if it is easy to do so, is a crime and is punishable under many state and federal laws.