May 17, 2025

12 thoughts on “Tech 581W Computer Network Operations, Laboratory 1: Team 3

  1. The abstract for this group starts off talking about what the purpose of this lab is. Then the abstract goes into how the lab will be set up and what is going to be used in the lab. Last the abstract talks about the tools that will be used in the lab and how they will be categorizing them into the OSI model and the McCumber cube. The abstract for this group did leave out how there was going to be a literature review and how that literature review pertains to the lab. Also left out of the abstract were the questions that needed to be answered. Next the group created a very in-depth introduction to the idea of penetration testing and why it is important. The introduction talks about how people have been defending the security of information for a long time and how that defending of the security of information is becoming increasingly more difficult. Next the introduction goes into what penetration testing is and how important it is to keeping up with the increasing threat. At the end of the introduction the group stated that there were three general research concerns: steps and materials to create the penetration mockup, the scope and relevance of the penetration tools available, and an attempt to classify the tools into network and security theoretical models. I believe that the introduction was a bit wordy and could have been simplified. Next the group went into the literature review. The literature reviews in this group’s lab were only a summary of the readings. The literature reviews didn’t explain the theme of the reading, point out the question of each reading, compare each reading to the lab, explain the supporting research, point out the methodology, and what errors or omissions there were in the readings. The group could have done a much better job at comparing and contrasting the articles to the current lab. Also I had to read the review and try to guess the article that the writer was talking about, because he didn’t label each of the articles properly. Next the group did their methodology. In the first part of the methodology the group explained how they set up their lab environment. They did a good job in explaining how they set up the virtual environment and each of the machines by assigning static IP addresses to each of the machines. Next the group defined how they were going to gather the tools they will need for this lab. The group divided up the search into three groups: security tools released in Backtrack, FreeBSD security and Net-tools ports collections, and last was a security tool list on the website http://www.insecure.org. They also took care in discovering new tools and links to tools when looking through these areas. With this collection they were able to create a tree structured to aid in their search. Next in the methodology they explained how they classified the tools they chose into the OSI model. They pointed out that because of a bias the tools could not evenly be distributed between the OSI model. Last the group explained that they were going to classify the tools accordingly to the McCumber cube. Next in the lab the group covered the results of the lab. First they explain that the setting up of the lab was straight forward. Then the group gave the resulting table that was created from the collection of tools and the categorizing of them. This table was in two parts. The first part gave the criteria for each of the categories. The second part actually categorizes the tools into the different layers of the OSI model and then applies the McCumber cube to each one. The way the group did this table worked out very well. The first table tells us what to expect in each of the tools in each layer, this makes categorizing the tools much simpler. Next the group talks about the question of why all the tools fall under technology in the McCumber cube. This group did an excellent job in explaining this question. Last in the results the group answers the question on if there is a bias for penetration testing. The group does a good job in explaining that there is a bias for penetration testing. Next the group discusses the problems that they face with the lab. First they state that because this is a virtualized lab a lot of tools will not be used that could be greatly beneficial. Next the group states that many of the tools that are mentioned work with situations that are impossible or impractical in a virtual environment as this one. The last problem the group had was that a lot of the tools fit into multiple categories in the OSI model and the McCumber cube and that it is the intent of the attack that determines were the tool fits into. The group makes a good point here. Even though we are learning to think like a hacker and learning some of the newest tricks, the scope of this lab is not good enough to cover a real-world view. It would be nice to go beyond the scopes of a virtual environment and make this as realistic as possible, but there are realistic problems that come from this type of lab also. Last the group gives a conclusion. In the conclusion the group states that even though the lab’s scope is not large enough to include all the real-world situations, this lab is adequate enough to cover what we need. Also they discuss the table and the tools that they found.

  2. The group had a well stated abstract. They stated what the lab was about as well as what they were planning to accomplish during the laboratory experiment. The next part of the group’s lab report was an introduction. Although the introduction was well stated with a background about penetration testing, it made this lab report read more like a technical paper as opposed to a lab report. I agree with the statements about security and penetration testing. The next step of the lab report was the literature reviews. The reviews of each paper could have been longer. The reviews did not have all of the components that were required for a literature review. Also the literature reviews were missing citations with page numbers as well as the works cited used. The group did not compare and contrast the papers with the other papers that were part of the required readings.
    The methodology section was very well stated with the steps of the process of performing the lab clearly stated. There were no screenshots of the steps of the process. The group then described the process of selecting the tools, putting them into categories and then putting them into the proper spots in the table. The next step of the lab report is the results of the lab experiment and the questions. The questions were quite lengthy but answered the questions fully and well stated. The group did not answer the question stating the difference between Ethereal and Wireshark. The problems section was also lengthy, but the problems were well defined. Most of the problems that the group had were also brought up by most of the other groups. The most common problem seems to be finding the right sections to put the tools into. In the conclusion section, the final results were not really talked about, but rather conclusions about penetration testing. The group seems to have found more layer 9 tools that the other groups did. The one main issue I had with the groups table is that it was separated into two different tables instead of following the example. This made for a hard time of reading the table. This made me have to scroll up and down a lot to see the tools and where they fit into the OSI model and where they fit into the McCumber cube. I thought the group could have done more with layer 0. The group seemed to focus solely on tools that dealt with technology than simple tools that could produce a kinetic effect such as a bomb or even a hammer. The only links they had were for the required readings. I do not any of the sites were they found the extra tools other than the backtrack suite. Overall I felt that this group had one of the most detailed lab reports.

  3. The third team also presented a complete and well thought out lab exercise. The lab met most of the requirements as per the syllabus. There were no real apparent issues or problems that stuck out at first examination. However, there were a few items that could be improved upon. The abstract did not meet the requirements of the syllabus in terms of length. Team three also took a different approach to the literature then any of the other teams. Team three placed their literature into six primary areas of focus, and discussed the merits of the papers that fell into those focus areas. Their introduction was complete and read very well. The literature review was rather cohesive and was a unique way to complete it. There were only three issues that jumped out upon reviewing the review. The first was that there seemed to be no APA5 style citations as per the directions in the syllabus. The second was that the Arce & McGraw paper seemed to not have been reviewed at all, but rather was just a source listed in the works cited section. The third was that the literature did not seem to take a stance as to what the reviewer though about the particle reading. The questions that were presented in the syllabus to be answered in the literature review section did not seem to be present. Like the other teams, team three did agree with everyone as to how the objectives listed in the lab were worked out. The same format that was followed by all was included here in completing the technical portion of the lab. The technical merit of the team’s position cannot be questioned as there was no real position taken on the literature, and the other tasks of the lab were completed as per the syllabus instructions. The VMs were built as per the lab instructions, the questions that needed to be answered were answered, and a complete taxonomy was presented. The only real enhancement that can be made in team three’s lab is in the literature review section. Including in text citations, as well as answering the questions for literature review in the syllabus will show the stance the team has taken with regards to the literature. Like team one, as with all the teams, I’m sure material on working as a team could be helpful, as it seems to be the major problem with all the labs (including team two). Team three does have the most complete methods section out of the five teams that posted labs and those methods cannot be questioned as they follow the format of a complete lab found in the syllabus. They also had the most complete taxonomy in the entire group of five teams. And their answers for layer eight & layer zero were extremely well considered. The remaining seven layers were about the same as the other teams. All in all, team three’s lab was closely related to teams five’s lab, complete and well thought out.

  4. The introduction to the article was excellent, I hadn’t considered an introduction to my team’s lab report before but this section sets the tone for the rest of the lab report and raises some interesting points about the history and necessity of security in general that provide a framework for the rest of the report. One small item lacking from the introduction was any citations from the literature. It appeared that some of the statements made were done so based on the readings and definitions given in the literature.
    The literature review lacked cohesion between the various topics addressed in the readings as well as missed the connection to any of the work done in the class exercises. Each paper was only addressed individually and the output was basically a summary of the article, something that could probably be easily gained through each article’s abstract. Also missing from each article was a treatment of its methodologies and results, what the reviewer thought of the points the article made and any errors or omissions that were evident in the readings.
    The methodologies section of the report was very informative, particularly related to the configuration of the different NIC adaptors on the VM hosts, particularly for the Debian system where some users may not be familiar with the specifics of configuring the network interfaces. The methodology for classification of the tools was very well thought out and presented. The discussion on legality and ethics issues about the relation of the tools to layers eight and zero was a good addition contrasted against the purely technical nature of most of the tools in the stack. The designation of technical tools as a “locally predictable force” was interesting and sounds like it comes from military-based literature but no citation was given for any frame of reference.
    The problems area listed some problems with application of some of the tools found to the virtual lab environment. While some of these tools do not specifically focus on the environment created for purposes of this lab, they’re still useful in the context of the taxonomy and the class in general. One thing that should be mentioned is about the amount of tools focusing on Cisco. Someone tasked with securing a network would certainly be concerned seeing the sheer volume of tools that target Cisco equipment that they should ensure that they keep their configurations and patch levels up to date.
    Understandably there is a lot of information in the taxonomy to attempt to fit into a 3” space and the inclusion of a description of each tool was beneficial but not having links to the tools could make it difficult to directly access the tools the authors are referencing. The layer eight examples cover quite a range of tools that could be used but one that stands out and doesn’t appear to fit is Trojans which seems like more of technical tool that would fit in layer seven, even with the component of deception involved in getting the user to run the tool. I was hoping to see its McCumber cube coordinates but it is absent from the layer eight list.

  5. Mvanbode, if you look at layer 1, you’ll see that we have both a hammer and explosives listed. I disagree with your idea of what level 0 should be.

  6. Team 3’s abstract was excellent. They described their lab and how they were going to use it. I appreciated their introduction. Personally, it helped to to better understand what we are trying to accomplish with this exercise. I liked how theyy organized their literature review. It made it very easy to read and understand how the articles tied back to the lab exercise. The methodology section was well written and the steps of the process of performing the the lab were detailed. Just like the other groups there weren’t any screen shots of the steps of the process.
    I thought they could have done a better job of organizing their charts and tables. It seemd like they jumped around a bit and that made it hard to follow. Their problems were well documented and seemed to be representative of the problems other groups encountered. The conclusions section was rather light given the detail of the report but overall I thought their paper was well written.

  7. At the beginning of your methodology you give great overview of what was done to the virtual machines that were assigned to the groups. Given was the name of the virtual machine software, the virtual network they were put on as well as the IP scheme of that subnet. Even more so the directory was given in Debian where the interface was changed to an assign address. For there they talked about how they gathered different security tools from different locations. This is good because different locations such as backtrack, FreeBSD security, and Net-tools. This increases the number of different tools however there will be repeats with the more popular tools. There matrix chart is a little difficult to read, mainly because of the clutter in the last section that might be Host/MediaExploit Method.
    The Literature reviews were nicely divided into separate paragraphs and give a good concise response to them. Highly agree with short paragraph about at the Indiana University of Pennsylvania, there cyberwar lab running a Linux server that does not provide any services is extremely security. Also agree with that being unrealistic in the business world.

  8. The introduction section did a nice job relating red teaming to the realm of network security and reflecting on how the concept related to the lab assignment.

    The literature section contained a few discrepancies that I noticed right away. The summaries did not contain in text citations. Everything appeared to be paraphrased like it should, but even paraphrases require in text citations. The team did a good job summarizing the supporting data but did not address the methodologies used, what the research questions were if any, any errors or omissions found the articles if any, and compare the theme of the articles to each other.

    The methodology was quite thorough for it described in great detail how your team implemented your virtual environment and the rationale for the classification of tools within the exploit table. Your team described the difficulty of classifying some of the attack tools because they did not always fit smoothly into the theoretical framework of the OSI model, but did your team also have difficulty in determining what exactly the attack tool would affect in the McCumber cube?

    In the Results and Questions section I had to somewhat disagree with the statement “Additionally, the extended layers, layers zero and eight, represent ‘tools’ of an abstract or solely theoretical construction. It is assumed that these will lie outside the bounds of experimental scope, as actual application of many of these ‘tools’ would be unethical and illegal, issues of practicality aside.” The objective was to find exploits for these layers, which may or may not be tools. Since Layer 8 is the people layer, there would not be any available tools for download to extract information from people, but as your team has also pointed out there are characteristics and vices that make people susceptible to social engineering attacks, which could count as exploits. Just as a con artist could duke people into scams, a hacker with people-centric skills could extract useful data from people as he or she could from a computer. The kinetic layer is not really that abstract either because if a computer is able to attack another system or network that contains devices that interact with other objects or have the ability to interact with an environment, this will cause a kinetic affect. I have began to look to Industrial networking as a theoretical means for creating kinetic affects, which falls in the realm of Process Automation and Control but share similar protocols such as EtherNet/IP , which is very similar to Ethernet. Here is an article describing cyber threats to Industrial devices on an Industrial network from ISA.org http://www.isa.org/CustomSource/ISA/Div_PDFs/PDF_News/Glss_2.pdf

    There were a few discrepancies discovered in the section that had the exploits table. Some of the sections such as the Kinetic layer and Data link did not contain the required number of 30 exploits. However, it seemed that everyone struggled to fill the Kinetic layer to the desired target number level. I was not clear on why attack tools and exploits were tabulated twice

  9. Beginning with this abstract this team did a good abstract and explaining what was going to be accomplished. But I did notice that the point about tools being put in to a chart seemed almost repeated. I just think next time it could be more refined. Next the group set out to talk about an introduction. Which was a more in depth abstract version of the abstract. I was kind of thrown by this section because student are to explain about the lab in brief during the abstract and then go into the lab. This part should have been put after the literature reviews. That would also help with making the lab sound less redundant. The next part of there lab that they covered was going over the article reviews. I feel that this was this groups strong point as they did well with the reviews. They reviewed each paper and related it to class in a way that flows and is easy to read. One thing that can be improved on the article is that they can have an overall topic of the articles and how they relate to each other. The next part of the teams lab went into the actual lab environment and how it was created. One thing that I have notice throughout not only this group is that everyone got into describing how the lab environment was setup but the could be enhanced by the use of a flowchart of the environment giving the users a visual aid. Then the lab concluded on the on what they learned during this exercise. One thing that was off was the group had 2 tables and was at the end of the lab when they should have been put into their steps of process. Another thing with the tables was that it seemed like the group gave up on cleaning the second table up and making it more compact. They could have actual reorganized both and combined the tables into one. Another problem with the second table seemed that it was backwards. When going over the osi model it is usually the norm to start at the highest layer and work down to the lowest level. Other than that they did do a good job of categorizing what their thought for the position of the tools within the Mccumber cube. Overall the group did what they where suppose to do with the lab 1. They just need to clean their lab documentation up some and they will have better lab write ups in the future.

  10. I think that group 3’s write-up for lab 1 is very good overall. The literary review was adequate, although could have been a little bit lengthier and should have answered all of the required questions. I was unable to find any proper APA 5 citing in the text for the literary review. Also, the page number for the references should have been included. The setup portion of the lab describing the networking of the machines was well done. The group specifically reported how they were able to properly configure the Linux network interfaces. The table containing the penetration testing tools was very good. The layout for the table was good and easy to read. Also, there were many explanations to why a tool was chosen for that layer. The group discussed which tools covered multiple layers, and also their reasoning for covering multiple layers.

  11. @tnovosel: In answer to your comments/questions: We found that some tools have more than one possible coordinate set in the cube, as demonstrated by the table. What is the difference between “tool” and “exploit”? The point wasn’t that they weren’t feasible, just hard to test in a lab setting. I don’t really understand what you’re trying to say about level 0 of our table. If you’re trying to tell me it should be SCADA, you may want to read a little more. the things we have listed are generalized components of a SCADA system.

  12. @shumpfer: A flow chart for a network setup at this level of the game feels a little pedantic. I can list the OSI layers any way I want to. It describes data communication, so it doesn’t matter if we start at the top or the bottom. information flows both ways through the layers. Also, it’s a model, not a law of physics.

Comments are closed.