Category Archives: IST 894 Portfolio
In this lab we take a look at how Snort rules are written and configured, as well as how to make use of them when they are noisy. We then look at iptables, and configure a local host-based firewall to … Continue reading
This lab is titled: Hands-on with Encryption Primitives and Block Cipher Modes of Operation. In it we use and compare four different AES-128 modes of operation in different file types and situations to see which are more secure and which … Continue reading
This laboratory exercise is about password auditing and buffer overflows.
This laboratory exercise focuses on Linux networking and command line tools.
This report performs a comparative analysis of three commercial cyber range platforms based on a comparison matrix to score them based on their features.