Your team should use your IRC-Chat server, which is hosted on your DNS, to communicate during the lab. This will give your team members a convenient way to communicate and, in particular, to share information as you attack your opponent's network. Once you've logged in to your host on the virtual network and pulled up a shell, start up the IRC client and connect to your team's IRC server as follows:
- Go to the the Applications Menu --> Internet-->XChat IRC
- When the client comes up, choose your team's IRC network
from the list of Networks, and click connect.
- In the resulting window: a) Enter your nickname (change the generic studentXX), b) choose to join the channel
#team. Note that 'nickname' is the only field you need to change.
copy and ctrl-v
[+] Team Leader Note
First organize your team so that you all carry out a coordinated distributed denial of service attack on your opponent's web server using the tool
loic. When you've demonstrated to your instructor that that's working, then organize your team members to have them try other kinds of attacks on your opponent's web server, DNS server, and workstation. Three or four students per target should work well. Encourage students to share information and try out attacks on other targets as well, after they've made progress on their own target. Consolidate all attack information into one central report, which you will turn in. You, the team leader, should be mostly managing, coordinating, and recording, not focusing on executing attacks. Help your team members if they get stuck.
Part 1 - DDoS attack from the outside
In this part of the lab, your team will try performing a Denial of Service Attack on your opponent's web server from outside their network. This portion of the lab comes first and is really independent of the rest. We will move from Part 1 to Part 2 as a class.
DDOS Attack on the Opponents' Web Server
Stop and wait until your instructor directs you to continue.
Part 2 - Infiltrate and attack from the inside
In this part of the lab, your team will try to gain access to various parts of your opponent's network. Team Leaders should assign their team members to target a particular host. When you have finished with that host, you should try to infiltrate and attack other hosts. It is important to always communicate with your team members about what you discover: passwords, sensitive information, useful information, etc. Note: The "sensitive data" you're looking for are tokens — just silly pieces of ASCII art that symbolize important, secret information.
Attack the Opponents' Name Server (DNS)
Attack the Opponents' Web Server
Attack the Opponents' Workstation