This quick reference page provides a summary of the specifications of the MSEC pod.
This topology was designed through a grant initiative by the Center for Systems Security and Information Assurance (CSSIA) and the Network Development Group (NDG), funded by the National Science Foundation’s (NSF) Advanced Technological Education (ATE) program Department of Undergraduate Education (DUE) Award No. 0702872 and 1002746. The topology is designed to be used with a series of lab exercises mapped to CompTIA Security+® domains.
You may request virtual machine templates for the MSEC pod from CSSIA.
A description of the virtual machines in the MSEC Pod is provided in the table below.
|BackTrack 5 Attack||BackTrack 5|
|Windows 7 Attack||Microsoft Windows 7 Professional|
|Red Hat Linux Victim||Microsoft Windows 2003 Server (internal network)|
|Windows 2k3 Server Victim||Microsoft Windows 2003 Server|
|Sniffer||Linux based Sniffer|
|BackTrack 4 Attack||BackTrack 4|
|Windows 2k3 Server Victim||Microsoft Windows 2003 Server (external network)|
The Center for Systems Security and Information Assurance (CSSIA) provides virtual machine templates to install on the pod.
To request access to the preconfigured virtual machine templates from CSSIA:
Please refer to the NETLAB+ Multipurpose Security Pod (MSEC) Install and Configuration Guide for details on installing the VMs on your NETLAB+ system.