Title

Integrate hacking technique into information assurance education

Document Type

Conference Proceeding

Publication Date

5-17-2016

Publication Title

Proceedings - IEEE 30th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2016

First Page

381

Last Page

387

Keywords

Cybersecurity, Host exploitation, Network mapping, Post exploitation, Vulnerability scanning

Abstract

© 2016 IEEE. It has become a trend that more and more institutions offer offensive techniques in information assurance education. In this paper, up the discussion of network mapping and vulnerability scanning, gaining access to a target via vulnerability exploitation, and maintaining an access to a victim host through HackerDefender rootkit techniques, we propose integrating the hacking techniques into information security education. Five hands-on lab exercises are proposed and the platform iVLab to conduct the labs are also presented.

This document is currently not available here.

Share

COinS