Advertisement

Using Kali Linux Security Tools to Create Laboratory Projects for Cybersecurity Education

  • Ahmad GhafarianEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 881)

Abstract

Cybersecurity education is an integral part of many undergraduate computer science curriculums. The draft ACM Computer Science Curricula 2013 recommends cybersecurity as a required body of knowledge for a typical computer science program. In the past few years, researchers and educators have developed various approaches and tools to implement laboratory projects for cybersecurity courses. Without doubt, cybersecurity education would be more effective, if we include hands-on activities to the relevant courses. This inclusion of hands-on activities can be achieved in various forms. Some institutions have the resources and expertise to set up physical laboratories for this purpose. Others use tools such as Second Life to create virtual classes and laboratories. This research reports our approach to hands-on activities for cybersecurity courses. In this approach, we use Kali Linux 2017.3 release pre-installed and preconfigured tools to create a set of laboratory projects. We also use VMware to setup virtual machine networks and then utilize security tools for hands-on part of our security courses. Finally, we report the details of the laboratory projects as well as their implementation.

Keywords

Cybersecurity Virtual machine Kali Linux 2017.3 VMware Laboratory 

Notes

Acknowledgment

The author would like to thank our department head, the Dean and the Provost of the University of North Georgia for their support my professional activities including this project.

References

  1. 1.
    Asadoorian, P.: Enabling Nessus on Kali Linux - The Official Guide. http://www.tenable.com/blog/enabling-nessus-on-backtrack-5-the-official-guide
  2. 2.
    Buffer Overflow using Backtrack 5. http://www.hackerthreads.org/Topic-47252
  3. 3.
    Choi, Y.B., Lim, S, Oh, T.H.: Feasibility of virtual security laboratory for three tiered distance education. In: Proceedings of the 2010 SIGITE Conference (SIGITE 2010), pp. 53–57 (2010)Google Scholar
  4. 4.
    Du, W., Wang, R.: A suite of instructional laboratory projects for computer security education (SEED Project). ACM J. Educ. Resour. Comput. 8(1) (2008). Article 3CrossRefGoogle Scholar
  5. 5.
    Edge, C., Stamey, J.: Security education on budget: “Getting the most Bang for Buck” with limited time and resources. In: InforSecCD 2010, 1–2 October 2010, Kennesaw, pp. 29–35 (2010)Google Scholar
  6. 6.
    Goodrich, M., Tamassia, R.: Introduction to Computer Security. Prentice Hall, Upper Saddle River (2011)Google Scholar
  7. 7.
  8. 8.
    InfoSec Institute: Web Analysis, Vulnerability Assessment, and Exploitation using Backtrack 5. http://resources.infosecinstitute.com/web-analysis-bt-5/
  9. 9.
  10. 10.
    Louthan, G., Warren, R., Butler, M., John, H.: An offensive exercise for building network, systems and web security awareness. In: Proceedings of the 3rd International Conference on Cyber Security Experimentation and Test, Washington, DC, pp. 1–7. USENIX Association (2010)Google Scholar
  11. 11.
    Danseglio, M.: Adding a new non-root user in Kali Linux. https://www.interfacett.com/blogs/adding-a-new-non-root-user-in-kali-linux/
  12. 12.
    Nmap Security Scanner. http://nmap.org/
  13. 13.
    Ryoo, J., Techatassanasoontorn, A., Lee, D.: Security education using second life. IEEE Secur. Priv. 7(2), 71–74 (2009)CrossRefGoogle Scholar
  14. 14.
    Sharma, S.K., Sefchek, J.: Teaching information systems security courses: a hands-on approach. J. Comput. Secur. 26(4), 290–299 (2007)CrossRefGoogle Scholar
  15. 15.
    Staff, how to set up a limited user account in Windows. http://www.surfnetkids.com/tech/360/how-to-set-up-a-limited-user-account-in-windows/
  16. 16.
    Trabelsi, Z.: Switch’s CAM table poisoning attack: hands-on lab exercises for network security education. In: Proceedings of the Fourteenth Australian Computing Education (ACE 2012), vol. 123, pp. 113–120 (2012)Google Scholar
  17. 17.
  18. 18.
  19. 19.
    Howtoforge: Getting started command line encryption tools in Linux. https://www.howtoforge.com/tutorial/linux-commandline-encryption-tools/
  20. 20.
  21. 21.

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Computer Science and Information SystemsUniversity of North GeorgiaDahlonegaUSA

Personalised recommendations