SlideShare a Scribd company logo
1 of 1
RESEARCH POSTER PRESENTATION DESIGN © 2015
www.PosterPresentations.com
It is safe to conclude that as time goes on more
vulnerabilities will be present and will be evolving.
In response to this exponential growth in our fields,
vulnerability researchers and forensic experts need
to have the ability scale to level of the threat. The
solution to this issue is to put in students hands the
scalability offered by using ESXi Virtualization for
lab environments.
Abstract
Lab Objectives
Xploit Network Topology
Lab Server Specifications
Challenges
Funding - We acquired funding for this club by
going through the Colleges surplus and accepting
donations made to Xploit Cybersecurity Club.
Sustainability – To do this Xploit Cybersecurity
Club was created and through this we recruit
members and they take an active role in the
implementation and the day to day running of the
lab.
Technical – Most members started off with zero
knowledge of the network setup at the lab but as we
continue these member evolve and gain essential
training within them selves and continue collaborate
with others at the club, thus embodying the student
run aspect of the club
Pictures of the Lab
These are pictures of the Instructors and Members that make our lab great
Acknowledgements
Special Thanks to Instructors Tobi West and Irving Lemus, The Xploit
Cybersecurity Club and the Coastline Community College ASG
ESXi Virtualization is cost effective
The first server of Xploit Cybersecurity club at
Coastline Community College was a small old
Gateway computer, it was a quad core computer
with 6gb of ram and 500gb of storage. As the club
evolved and received more funding, we went on to a
full ESXi dedicated server implementation, because
of the way virtualization works we can clone,
backup and delete any OS to the technical specs
desired.
Virtualization can be contained in the
practice environment and be portable.
We contained the ESXi virtual networks in two
subnets using Pfsense firewall, with this setup we
could have up to 8 or more people collaborating over
the lab host stations at the same time and any
additional guest can use their own personal
computers to access the environment through a web
browser.
Building your own network can provide
a collaborative Network Attack, Defense
and Forensics environment.
The importance of this method of collaboration is
that it allows us as Cyber security professionals to
really be creative with the payload creation and
implementation. The other major advantage of this
that the student of the college go through every step
of making a network from ground up. They learn the
secure and proper implementation of a network from
trial and errors before they enter a real work
environment. In a way this lab provides a way to
implement all the book learning into a real hands on
experience with guidance and support from the
dedicated faculty and its members.
Chatura Ahangama
Coastline Community College
Student Run Collaborative Network Penetration, Defense
and Forensics Environment on a Limited Budget
Dell PowerEdge 1900
2.33GHz
Quad-Core
Dell PowerEdge 1950
3.0ghz
Dual-Core
- 16 GB of RAM
- 500 GB Hard Drive
- Cost $ 300 - 400
-16 GB of RAM
-500 GB Hard Drive
- Cost $ 300 - 400
Essentials
Software Hardware
- VMWare ESXi
- Windows Server
- PfSense
- Linux Flavor’s
-8 x Desktop
Workstations
-Simple Router
-2 x 8 Switches Visit : xploitcyberclub.me
xploitccc@gmail.com

More Related Content

Viewers also liked

Hypermedia for Machine APIs
Hypermedia for Machine APIsHypermedia for Machine APIs
Hypermedia for Machine APIsMichael Koster
 
脱敏治疗市场分析报告2010年
脱敏治疗市场分析报告2010年脱敏治疗市场分析报告2010年
脱敏治疗市场分析报告2010年BingoMed
 
Hypermedia System Architecture for a Web of Things
Hypermedia System Architecture for a Web of ThingsHypermedia System Architecture for a Web of Things
Hypermedia System Architecture for a Web of ThingsMichael Koster
 
Introducing NetBSD 5.0
Introducing NetBSD 5.0Introducing NetBSD 5.0
Introducing NetBSD 5.0Andrew Doran
 
Anestesicos y analgesicos
Anestesicos y analgesicosAnestesicos y analgesicos
Anestesicos y analgesicosAndres Morales
 
"New and traditional media" - Presentation at The Hive 2012
"New and traditional media" - Presentation at The Hive 2012"New and traditional media" - Presentation at The Hive 2012
"New and traditional media" - Presentation at The Hive 2012sisterMAG
 
El bogotazo
El bogotazoEl bogotazo
El bogotazoJuanda37
 

Viewers also liked (7)

Hypermedia for Machine APIs
Hypermedia for Machine APIsHypermedia for Machine APIs
Hypermedia for Machine APIs
 
脱敏治疗市场分析报告2010年
脱敏治疗市场分析报告2010年脱敏治疗市场分析报告2010年
脱敏治疗市场分析报告2010年
 
Hypermedia System Architecture for a Web of Things
Hypermedia System Architecture for a Web of ThingsHypermedia System Architecture for a Web of Things
Hypermedia System Architecture for a Web of Things
 
Introducing NetBSD 5.0
Introducing NetBSD 5.0Introducing NetBSD 5.0
Introducing NetBSD 5.0
 
Anestesicos y analgesicos
Anestesicos y analgesicosAnestesicos y analgesicos
Anestesicos y analgesicos
 
"New and traditional media" - Presentation at The Hive 2012
"New and traditional media" - Presentation at The Hive 2012"New and traditional media" - Presentation at The Hive 2012
"New and traditional media" - Presentation at The Hive 2012
 
El bogotazo
El bogotazoEl bogotazo
El bogotazo
 

Similar to PosterPresentations.com-36x48-Trifold-V5

Developing Web-based Interactive Teaching System for Core Network Technology ...
Developing Web-based Interactive Teaching System for Core Network Technology ...Developing Web-based Interactive Teaching System for Core Network Technology ...
Developing Web-based Interactive Teaching System for Core Network Technology ...drboon
 
COVMUG Lab Manager Slide Deck
COVMUG Lab Manager Slide DeckCOVMUG Lab Manager Slide Deck
COVMUG Lab Manager Slide Deckesarakaitis
 
Best Java Fullstack Online Training in Hyderabad
Best Java Fullstack Online Training in HyderabadBest Java Fullstack Online Training in Hyderabad
Best Java Fullstack Online Training in Hyderabadbharathtsofttech
 
Best Fullstack java online training in Hyderabad
Best Fullstack java online training in HyderabadBest Fullstack java online training in Hyderabad
Best Fullstack java online training in Hyderabadbharathtsofttech
 
Emulating cisco network laboratory topologies in the cloud
Emulating cisco network laboratory topologies in the cloudEmulating cisco network laboratory topologies in the cloud
Emulating cisco network laboratory topologies in the cloudronan messi
 
CSE Lab on Cloud
CSE Lab on CloudCSE Lab on Cloud
CSE Lab on CloudInkiad
 
Java Frameworks Training in Noida.pptx
Java Frameworks Training in Noida.pptxJava Frameworks Training in Noida.pptx
Java Frameworks Training in Noida.pptxashishthakur730937
 
Secure Computing With Java
Secure Computing With JavaSecure Computing With Java
Secure Computing With Javawhite paper
 
159747608 a-training-report-on
159747608 a-training-report-on159747608 a-training-report-on
159747608 a-training-report-onhomeworkping7
 
Six Principles of Software Design to Empower Scientists
Six Principles of Software Design to Empower ScientistsSix Principles of Software Design to Empower Scientists
Six Principles of Software Design to Empower ScientistsDavid De Roure
 
Nus case study07
Nus case study07Nus case study07
Nus case study07shyamn1969
 
Azure Virtual Network Tutorial | Azure Virtual Machine Tutorial | Azure Train...
Azure Virtual Network Tutorial | Azure Virtual Machine Tutorial | Azure Train...Azure Virtual Network Tutorial | Azure Virtual Machine Tutorial | Azure Train...
Azure Virtual Network Tutorial | Azure Virtual Machine Tutorial | Azure Train...Edureka!
 
Cisco Packet Tracer 6.0.1 at a glance
Cisco Packet Tracer 6.0.1 at a glanceCisco Packet Tracer 6.0.1 at a glance
Cisco Packet Tracer 6.0.1 at a glanceSon Trinh
 
A Security Capstone Course An Innovative Practical Approach To Distance Educ...
A Security Capstone Course  An Innovative Practical Approach To Distance Educ...A Security Capstone Course  An Innovative Practical Approach To Distance Educ...
A Security Capstone Course An Innovative Practical Approach To Distance Educ...Ann Wera
 
Untitled document (1).pdf
Untitled document (1).pdfUntitled document (1).pdf
Untitled document (1).pdfAvllo
 
Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0Concentrated Technology
 
Java Frameworks Training Institute in Noida.pptx
Java Frameworks Training Institute in Noida.pptxJava Frameworks Training Institute in Noida.pptx
Java Frameworks Training Institute in Noida.pptxashishthakur730937
 

Similar to PosterPresentations.com-36x48-Trifold-V5 (20)

Developing Web-based Interactive Teaching System for Core Network Technology ...
Developing Web-based Interactive Teaching System for Core Network Technology ...Developing Web-based Interactive Teaching System for Core Network Technology ...
Developing Web-based Interactive Teaching System for Core Network Technology ...
 
Wise6 davidson
Wise6 davidsonWise6 davidson
Wise6 davidson
 
COVMUG Lab Manager Slide Deck
COVMUG Lab Manager Slide DeckCOVMUG Lab Manager Slide Deck
COVMUG Lab Manager Slide Deck
 
Best Java Fullstack Online Training in Hyderabad
Best Java Fullstack Online Training in HyderabadBest Java Fullstack Online Training in Hyderabad
Best Java Fullstack Online Training in Hyderabad
 
Best Fullstack java online training in Hyderabad
Best Fullstack java online training in HyderabadBest Fullstack java online training in Hyderabad
Best Fullstack java online training in Hyderabad
 
Emulating cisco network laboratory topologies in the cloud
Emulating cisco network laboratory topologies in the cloudEmulating cisco network laboratory topologies in the cloud
Emulating cisco network laboratory topologies in the cloud
 
CSE Lab on Cloud
CSE Lab on CloudCSE Lab on Cloud
CSE Lab on Cloud
 
Java Frameworks Training in Noida.pptx
Java Frameworks Training in Noida.pptxJava Frameworks Training in Noida.pptx
Java Frameworks Training in Noida.pptx
 
[IJET V2I2P29] Authors: Praveen Ghuge, ChavanNitishR. ,KatteSagar S. ,PawarSu...
[IJET V2I2P29] Authors: Praveen Ghuge, ChavanNitishR. ,KatteSagar S. ,PawarSu...[IJET V2I2P29] Authors: Praveen Ghuge, ChavanNitishR. ,KatteSagar S. ,PawarSu...
[IJET V2I2P29] Authors: Praveen Ghuge, ChavanNitishR. ,KatteSagar S. ,PawarSu...
 
Secure Computing With Java
Secure Computing With JavaSecure Computing With Java
Secure Computing With Java
 
159747608 a-training-report-on
159747608 a-training-report-on159747608 a-training-report-on
159747608 a-training-report-on
 
Six Principles of Software Design to Empower Scientists
Six Principles of Software Design to Empower ScientistsSix Principles of Software Design to Empower Scientists
Six Principles of Software Design to Empower Scientists
 
Nus case study07
Nus case study07Nus case study07
Nus case study07
 
Azure Virtual Network Tutorial | Azure Virtual Machine Tutorial | Azure Train...
Azure Virtual Network Tutorial | Azure Virtual Machine Tutorial | Azure Train...Azure Virtual Network Tutorial | Azure Virtual Machine Tutorial | Azure Train...
Azure Virtual Network Tutorial | Azure Virtual Machine Tutorial | Azure Train...
 
Cisco Packet Tracer 6.0.1 at a glance
Cisco Packet Tracer 6.0.1 at a glanceCisco Packet Tracer 6.0.1 at a glance
Cisco Packet Tracer 6.0.1 at a glance
 
A Security Capstone Course An Innovative Practical Approach To Distance Educ...
A Security Capstone Course  An Innovative Practical Approach To Distance Educ...A Security Capstone Course  An Innovative Practical Approach To Distance Educ...
A Security Capstone Course An Innovative Practical Approach To Distance Educ...
 
Untitled document (1).pdf
Untitled document (1).pdfUntitled document (1).pdf
Untitled document (1).pdf
 
chaithra_resume
chaithra_resumechaithra_resume
chaithra_resume
 
Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0
 
Java Frameworks Training Institute in Noida.pptx
Java Frameworks Training Institute in Noida.pptxJava Frameworks Training Institute in Noida.pptx
Java Frameworks Training Institute in Noida.pptx
 

PosterPresentations.com-36x48-Trifold-V5

  • 1. RESEARCH POSTER PRESENTATION DESIGN © 2015 www.PosterPresentations.com It is safe to conclude that as time goes on more vulnerabilities will be present and will be evolving. In response to this exponential growth in our fields, vulnerability researchers and forensic experts need to have the ability scale to level of the threat. The solution to this issue is to put in students hands the scalability offered by using ESXi Virtualization for lab environments. Abstract Lab Objectives Xploit Network Topology Lab Server Specifications Challenges Funding - We acquired funding for this club by going through the Colleges surplus and accepting donations made to Xploit Cybersecurity Club. Sustainability – To do this Xploit Cybersecurity Club was created and through this we recruit members and they take an active role in the implementation and the day to day running of the lab. Technical – Most members started off with zero knowledge of the network setup at the lab but as we continue these member evolve and gain essential training within them selves and continue collaborate with others at the club, thus embodying the student run aspect of the club Pictures of the Lab These are pictures of the Instructors and Members that make our lab great Acknowledgements Special Thanks to Instructors Tobi West and Irving Lemus, The Xploit Cybersecurity Club and the Coastline Community College ASG ESXi Virtualization is cost effective The first server of Xploit Cybersecurity club at Coastline Community College was a small old Gateway computer, it was a quad core computer with 6gb of ram and 500gb of storage. As the club evolved and received more funding, we went on to a full ESXi dedicated server implementation, because of the way virtualization works we can clone, backup and delete any OS to the technical specs desired. Virtualization can be contained in the practice environment and be portable. We contained the ESXi virtual networks in two subnets using Pfsense firewall, with this setup we could have up to 8 or more people collaborating over the lab host stations at the same time and any additional guest can use their own personal computers to access the environment through a web browser. Building your own network can provide a collaborative Network Attack, Defense and Forensics environment. The importance of this method of collaboration is that it allows us as Cyber security professionals to really be creative with the payload creation and implementation. The other major advantage of this that the student of the college go through every step of making a network from ground up. They learn the secure and proper implementation of a network from trial and errors before they enter a real work environment. In a way this lab provides a way to implement all the book learning into a real hands on experience with guidance and support from the dedicated faculty and its members. Chatura Ahangama Coastline Community College Student Run Collaborative Network Penetration, Defense and Forensics Environment on a Limited Budget Dell PowerEdge 1900 2.33GHz Quad-Core Dell PowerEdge 1950 3.0ghz Dual-Core - 16 GB of RAM - 500 GB Hard Drive - Cost $ 300 - 400 -16 GB of RAM -500 GB Hard Drive - Cost $ 300 - 400 Essentials Software Hardware - VMWare ESXi - Windows Server - PfSense - Linux Flavor’s -8 x Desktop Workstations -Simple Router -2 x 8 Switches Visit : xploitcyberclub.me xploitccc@gmail.com

Editor's Notes

  1. Abstract ESXi Cost Effective Now instead of getting a stationary computer dedicated to running one OS or multiple depending on the partition, instead we have limitless options and different memory configurations. By doing this helps us save money when it comes to scaling and changing the network environment for the future Virtualization can be contained Now important to note in the future we are planning to make it available on the internet for remote access, For this we plan to use services of a dynamic DNS, this would mean we would host the Lab servers at a DMZ designated . Building your own network can provide a collaborative Network Attack, Defense and Forensics environment. Also important to note is that it takes away the static and repetitive aspect that most labs currently share.  As a defender we try to harden our security before running the infected payload that our friends on the attacking network has created. Then we run this virus payload on the defender network and the two team can actively participate on both sides of the Defense and Attack of the Network Environment. Forensics comes in at the end when we the attack debrief and learn collectively and understand how, what and why this happened.