Category Archives: Networking and Operating Systems

Networking and Operating Systems Assignments and Information

CyberStart America Resources: Cryptography Links – Spring 2023

Objective: 

Students will continue preparing for competition in the National Cyber League by familiarizing themselves with common cryptographic methods so that they can effectively identify and decrypt encrypted messages and data.

Topics Discussed:

  • Cryptography
  • Ciphertext
  • Plaintext

Links:

This list is maintained as a resource for students competing in the National Cyber League competition to assist in identification and solution of the presented Cryptography puzzles. If you find any good online Cryptography resources in your travels, let me know and I will add them to the list!

Cryptii  A very cool and very fast “modular” decryption tool that lets you run a string of text through several encryption/decryption methods of your choice.

Dcode.fr  An outstanding French website that offers automatic decoding for a large variety of encryptions. Features include a powerful cipher identifier (that automatically recognizes more than 200 ciphers), decoding tools for the Caesar cipherVigenere cipherPolybius’ square, and dozens of other encryptions.

The Black Chamber  A great collection of interactive tools that explain and allow you to decrypt a variety of common (and some uncommon) encoding schemes.

Tools for Noobs: Online Decryption Tool – Decrypts a string using various algorithms (e.g. Blowfish, DES, TripleDES, Enigma).

MD5hashing.net Encryption and Decryption – At md5hashing.net you can hash (encrypt) any string into 66 different hash types. As you probably know – decryption of any hash is impossible, but they offer reverse decryption via our database (~1000M records, and counting).

Splitbrain.org Encoding/Decoding Tools This tool helps you to quickly run some text through various different encoding/decoding functions available in PHP. Great for a lot of different decoding possibilities rapidly

CodeBeautify.org Encryption/Decryption Tool – A nice, clean tool for decrypting codes that you know the key for, or encrypting codes with your own original key.

SQLite Viewer for Chrome – Chrome plugin for viewing SQLite databases in your browser. Allows opening and editing of SQLite databases without requiring admin access to install.

Posted: January 13th, 2023

Welcome to CyberStart America!

Objective: 

Students will begin preparing for competition in the National Cyber League by participating in CyberStart America, an immersive cybersecurity training game for high school students.

Links:

Topics Discussed:

  • Cyber Security
  • CyberStart America

Assignment:

  1. Welcome back! I hope your holidays were happy and restful! We are going to switch gears as we work towards competition in the National Cyber League and/or Security + Certification at the end of the month.
  2. In the interest of providing you with more hands-on experience with cybersecurity concepts, I am pleased to introduce CyberStart America, an immersive cybersecurity training game for high school students, where you will take the role of an agent with the “Cyber Protection Agency” and solve challenging puzzles based on real-world situations that you might face as a cybersecurity professional.
  3. Visit the CyberStart America website and register for a free account using your haydenmagnet.org email address. You will need to access your haydenmagnet.org Gmail, as the website sends several confirmation emails in sequence. Be sure to keep your Gmail open until you receive the third confirmation email that allows you to set a password before you proceed with the challenges.
  4. Start with the Intern Base to get a feel for what it’s like to work in cybersecurity. You may work at your own pace, and even work from home if you choose to do so. Remember that these challenges start easy and get harder as you progress, so don’t skip forward too far!
  5. Are you completely confused by any particular challenge? Consult the Field Manual! Click the “Field Manual” link in the upper left corner of the website to view background info on the concepts presented in the challenges, and even watch walkthrough videos (Chapter 07) if you’re completely stumped.
  6. You may work at your own pace, and use any resources that you have available to you to complete the challenges (even other students!)
  7. Do you want to work together with a partner or squad up with a group? Click on the “Groups” link at the top of the page, and click “Create Group” to get a group code that you can share with your crew to squad up and tackle the challenges as a team of up to 3 people!
  8. Make sure you join my “NetOp P6” group so I can track your progress, as well. See me for the Join code if you haven’t joined already.
  9. We will continue working with CyberStart America for the next three weeks. At the end of the three weeks, I will buy lunch for the individual or team with the highest point total. Grind solo and get all the food for yourself, or choose your teammates wisely and have a victory feast with your friends!
  10. Good luck, and have fun with the challenges! Bear in mind that the National Cyber League competition will begin at the end of the month. Those who are not studying for Security + certification will begin practicing in the NCL Gym when our accounts become available.

Assigned: January 9th, 2023
Teacher Pacing Due Date: January 27th, 2023

NETWORKING AND CYBERSECURITY 1H MIDTERM EXAM – FALL 2022

Objective: Demonstrate proficiency in Cybersecurity Principles through completion of a final comprehensive assessment.

Resources:

  • All CYBER.ORG Lesson slideshows, Case Studies and Labs presented in class
  • https://apps.cyber.org Kali Linux virtual environment

Assignment:

  • Complete the CYBER.ORG – Networking and Cybersecurity 1H Midterm Exam Fall 2022 assessment provided in today’s Google Classroom assignment post by the end of the class period today.
  • This is an “open resource” exam, meaning you will be able to use any materials accessible on your computer. This includes any websites, past assignments, completed projects, installed applications, or notes you may have taken.
  • You may not, however, collaborate with your classmates; Please remain silent until everyone has completed the quiz.
  • The exam contains fifty multiple-choice questions. Please carefully read all instructions and select the best answer from the available choices for each question.
  • You have seventy-five minutes to complete the test. Be sure to submit your test answers before the end of the class period.
  • While it is advised to check your answers before submitting your exam, please bear in mind that the testing session will end at 12:10pm, so you must use your time wisely.

Assigned: December 21st, 2022
Teacher Pacing Due Date: December 21st, 2022

NETWORKING AND CYBERSECURITY 1: SEMESTER 1 FINAL EXAM FALL 2022 REVIEW

Objective:

  • I can demonstrate my understanding of CyberSecurity Principles through a summative exam.

Links:

Google Classroom: https://classroom.google.com/

Topics Discussed:

  • Linux
  • CyberSecurity Law
  • Security Basics
  • Actors and Vulnerabilities

Assignment:

  1. Click the Google Classroom link and log in with your Haydenmagnet.org email address.
  2. You will find a Class Announcement titled “NETWORKING AND CYBERSECURITY 1: SEMESTER 1 FINAL EXAM FALL 2022 REVIEW“. Attached, you will find a copy of the Final Exam that you may use to review for tomorrow’s test.
  3. This is an “open resource” exam, meaning you will be able to use any materials accessible on your computer. This includes any websites, past assignments, completed projects, installed applications, or notes you may have taken.
  4. You may not, however, collaborate with your classmates; Please remain silent until everyone has completed the quiz.
  5. The exam contains fifty multiple-choice questions. Please carefully read all instructions and select the best answer from the available choices for each question.
  6. You have seventy-five minutes to complete the test. Be sure to submit your test answers before the end of the class period.

Posted: December 19th, 2022

CYBER.ORG – 1.2.5 – Hoaxes

Objective:

Compare and contrast types of attacks.

Resources:

  • See PowerPoint presentation: 1.2.5 Hoaxes
  • See PDF Document: Case Study – Hoaxes

Assignment:

  1. Begin reading the 1.2.5 Hoaxes.pptx presentation.
  2. Read the Case Study – Hoaxes.pdf document and be prepared to answer the questions at the end.
  3. Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
  4. Please do your best to complete this Case Study by the end of the class period today.

Assigned: December 14th, 2022
Teacher Pacing Due Date: December 14th, 2022

CYBER.ORG – 1.1.6 – Prepending, 1.1.7 – Identity Fraud & 1.1.9 – Reconnaissance

Objective: Compare and contrast types of attacks.

Resources:

  • See PowerPoint presentations: 1.1.6 – Prepending, 1.1.7 – Identity Fraud & 1.1.9 – Reconnaissance.

Assignment:

  1. Begin reading the 1.1.6 – Prepending.pptx, 1.1.7 – Identity Fraud and 1.1.9 – Reconnaissance presentations.

Assigned: January 13th, 2022

CYBER.ORG – 1.1.3 – Dumpster Diving & 1.1.4 – Shoulder Surfing, & Case Study – Dumpster Diving

Objective:

Compare and contrast different types of social
engineering techniques.

Resources:

See Powerpoint Presentations: 1.1.3 – Dumpster Diving.pptx, 1.1.4 – Shoulder Surfing.pptx and Case Study – Dumpster Diving.pdf

Assignment:

  1. Read the 1.1.3 – Dumpster Diving.pptx presentation. This lesson will introduce you to a form of information harvesting that involves digging through literal trash.
  2. Read the 1.1.4 – Shoulder Surfing.pptx presentation. This lesson will introduce you to a form of information harvesting that should make you a little more aware of who’s behind you while you’re entering sensitive information into a form or field.
  3. Begin reading the Case Study – Dumpster Diving.pdf document and be prepared to answer the questions at the end.
  4. Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
  5. Please do your best to complete this Case Study by the end of the day on Tuesday, December 13th.

Assigned: December 12th, 2022
Teacher Pacing Due Date: December 13th, 2022

CYBER.ORG – 1.1.2 – Phishing and Spam & Phishing LAB

Objectives:

Compare and contrast different types of social engineering techniques.

Resources:

  • See PowerPoint presentations: 1.1.2 – Phishing and Spam.pptxLab – Phishing.pptx

Assignment:

  • Begin reading the 1.1.2 – Phishing and Spam.pptx presentation. This lesson will provide you with an overview of phishing methods.
  • Next, begin the Lab – Phishing.pptx lab. Use the phishery tool to conduct a Phishing attack, and note the difference between the Credential Harvesting method conducted in our last class session and the development and deployment of a Phishing email message with the intent to “hook” a victim.
  • Play the victim, and upload a screenshot of the successful attack screen with the “New credentials harvested!” message to today’s Google Classroom assignment post to confirm completion of the lab.

Assigned: December 9th, 2022
Teacher Pacing Due Date: December 12th, 2022

CYBER.ORG – 1.1.8 Credential Harvesting & Credential Harvesting Lab

Objectives:

Compare and contrast different types of social engineering techniques.

Resources:

  • See PowerPoint presentations: 1.1.8 Credential Harvesting.pptxLab – Credential Harvesting

Assignment:

  • Begin reading the 1.1.8 Credential Harvesting.pptx presentation. This lesson will introduce you to social engineering-based attacks designed to acquire login credentials from victims.
  • Next, begin the Lab – Credential Harvesting.pptx lab. This lab will introduce you to the Social Engineering Toolkit, a powerful set of tools that you can use to set up a number of credential-stealing attacks. In this activity, you will use the Social Engineering Toolkit to launch a phishing attack within the confines of the CYBER.ORG Cyber Range.
  • Play the victim, and upload a screenshot of the successful attack screen with the “GOT A HIT!” message to today’s Google Classroom assignment post to confirm completion of the lab.

Assigned: December 7th, 2022
Teacher Pacing Due Date: December 9th, 2022