Integrate hacking technique into information assurance education
Proceedings - IEEE 30th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2016
Cybersecurity, Host exploitation, Network mapping, Post exploitation, Vulnerability scanning
© 2016 IEEE. It has become a trend that more and more institutions offer offensive techniques in information assurance education. In this paper, up the discussion of network mapping and vulnerability scanning, gaining access to a target via vulnerability exploitation, and maintaining an access to a victim host through HackerDefender rootkit techniques, we propose integrating the hacking techniques into information security education. Five hands-on lab exercises are proposed and the platform iVLab to conduct the labs are also presented.
Yang, Jianhua; Wang, Yien; and Reddington, Thomas, "Integrate hacking technique into information assurance education" (2016). Faculty Bibliography. 2996.