RAVE Lab Scenarios

RAVE Lab Scenarios


Labman v2

Labman v2 is a set of VMs that go with the Principles of Computer Security Lab Manual, Second Edition. However, this scenario can also be used basis for various other labs as it provides a Windows server, Windows desktop, and Linux desktop all on the same network. This means that many existing labs involving networking basics, security fundamentials, system administration, etc can be done within this environment without needing specialized modifications. Specifically, the Lab Manual book uses this environment for the following:

  • General Security Concepts
  • Operational/Organizational Security
  • The Role of People in Security
  • Cryptography
  • Public Key Infrastructure
  • Standards and Protocols
  • Physical Security
  • Network Fundamentals
  • Infrastructure Security
  • Authentication and Remote Access
  • Wireless Security
  • Intrusion Detection Systems and Network Security
  • Baselines
  • Types of Attacks and Malicious Software
  • E-mail and Instant Messaging
  • Web Components
  • Secure Software Development
  • Disaster Recovery, Business Continuity, and Organizational Policies
  • Risk Management
  • Change Management
  • Privilege Management
  • Computer Forensics
  • Legal Issues and Ethics
  • Privacy

Labman v4

Labman v4 is a set of VMs that go with the Principles of Computer Security Lab Manual, Fourth Edition. However, this scenario can also be used basis for various other labs as it provides a Windows server, Windows desktop, and Linux desktop all on the same network. These VMs are a version newer than found in Labman v2. This means that many existing labs involving networking basics, security fundamentials, system administration, etc can be done within this environment without needing specialized modifications. Specifically, the Lab Manual book uses this environment for the following:

  • Configuring workstation network connectivity
  • Analyzing network communication
  • Establishing secure network application communication using TCP/IP protocols
  • Penetration testing with Nmap, metasploit, password cracking, Cobalt Strike, and other tools
  • Defending against network application attacks, including SQL injection, web browser exploits, and email attacks
  • Combatting Trojans, man-in-the-middle attacks, and steganography
  • Hardening a host computer, using antivirus applications, and configuring firewalls
  • Securing network communications with encryption, secure shell (SSH), secure copy (SCP), certificates, SSL, and IPsec
  • Preparing for and detecting attacks
  • Backing up and restoring data
  • Handling digital forensics and incident response

Novice Linux CTF

The Novice Linux CTF (Capture the Flag) is a single Linux Desktop VM designed to introduce students to Linux environments. Students will be guided through a process to find flags - strings of information - contained within the VM by performing basic operations. This scenario with introduce students to the following fundamentals:

  • Introduction to Capture the Flag
  • Web Basics - HTML, Ports, and Hosts
  • Using the Command Line
  • Common Command Line Tools
  • Open Source Intelligence

No prior information is expected, and all technical information needed to complete the challenges is contained within the VM.

SPECTRE CTF

The SPECTRE CTF (Capture the Flag) is a network of Virtual Machines designed to get students thinking like an attacker. During this game environment, students will be tasked with challenges such as guessing default passwords, finding hidden network services, and conducting network forensics to find flags - strings of information - contained within the network. Students are awarded points for finding a flag, and they can compete with their peers for high scores. This scenario will introduce students to the following fundamentals:

  • Open Source Intelligence
  • Network Scanners and Enumeration
  • Digial Forensics
  • Password Cracking
  • Web Pen Testing

Basic Linux knowledge is expected, and all technical information needed to complete the challenges is contained within the VM.