Spiceworks-helpdesk ticketing system

Spiceworks Network Monitor keeps an eye on the networks performance in real-time from your desk.  We’re focusing on the help desk ticketing system portion of spiceworks. The local non-for-profit companies that are being monitored by the helpdesk need to have their tickets routed to the responsible coordinator of the company, to be viewed separately. We’re also researching how to set up each company as a remote site, which could possibly be another way to keep them separate.

We decided to create two virtual servers for the local non-profit companies. Windows Server 2008 and spiceworks was installed. After all the issues encountered with logging into spiceworks through the browser, we discovered that a new rule needed to be created for the firewall to allow such access.  The non-profit companies can now access spiceworks by entering the web address in the browser.  A user portal was also created for helpdesk ticket submission, but registration needs to be completed before logging in.

Project Student: Yolanda Winbush

Openfiler NAS System

The purpose of the Openfiler project was to replace the old existing NAS hardware in the server room with some updated storage spaces. Three desktop PCs were re-purposed with four 160 GB hard-drives each. Openfiler software was installed on all of them and RAID 5 was configure on the hard-drives using the Openfiler web client. The machines were then configured with static IP addresses and placed in the server room.

Project Students: Blake Kindred, Craig Mishler

CITCON

The purpose of CITCON project was to create an environment that students can come into and test their security knowledge against our systems. Our challenges include WEP Cracking, Cryptanalysis, Remote Exploitation Attacks, and Web-App Hacking. This allows students to go through process of discovery, information gathering, risk assessment, exploitation, and exfiltration. Students will get a flag for challenges they complete.

CITCON project can be expanded to include more challenges that are more suitable for high school students or graduate level students. Current implementation supports college students with some background in security.

Project Students: Blake Kindred, Craig Mishler, Nicholas Luedeman, Rushabh Vyas

SNORT – Intrusion Detection System

The SNORT project is a continuation of building up a network security monitoring server to monitor the networks of classrooms located in a basement. There will be 2 phases that need to be accomplished.  The software that would be using to monitor the network would be “SNORT” , an Intrusion Detection Software.

Phase 1: Snort will need to catch the flow of the in and out traffic on one of the VLANs. Snort has already been built, but may need updates to continue on to the next phase. Security Onion was used initially for the Linux system, but new equipment should allow for SNORT to run on a direct Linux system. Possible start over for the build.

Phase 2: Snort will need to connect to an additional VLAN. Additionally have to make sure there is minimum – 0 redundancy and a way to have separate log files for the VLANs. No further information on this phase until checks on the first phase are complete.

Paused work on the snort project. Will need further research before continuing.

Project Team Members: Raffielle Miller, Shawnie Springfield

Optimize Non-Profit Company Network Performance

Monitored and studied network to isolate and eliminate performance hindering problems. First, an extra DHCP server had been installed unintentionally and the service was shut down. The actual DHCP server was then found to be issuing old DNS information and causing an extreme lag when DNS always had to be routed to the secondary Google servers. The DNS information was updated to reflect the new DCs on the intranet.
This caused systems to be much more responsive, but brought to light a new problem. The whole intranet had become an island where time was not being properly read from NTP servers. Noticed by a client when her computer and cell phone clocks did not match, the intranet was about 5 minutes slow. The problem ended up residing in the firewall, which maintained an NTP service with incorrectly configured time. Whats more is that the firewall also redirected externally addressed NTP traffic to itself, causing everything inside the network to get its time. Once time was updated on the firewall, the intranet began keeping in time with external sources.

 

Project Student: Blake Kindred

Policy Report

The Living Lab serves the students by giving them opportunities to have hands on experience in networking, security, and many other CIT departments. Every year new students gets to know about the work that the Living Lab provides. It is important to acknowledge them about policies and the procedures in the lab while they use the computer systems. There are many new policies that needs to be created as the changes in the computer lab are constantly happening. It can be on the updates, workstations, unwanted software, room access by card swipe, or monitoring the traffic on the computer by checking the network. Having The Living Lab’s own administrator level users will provide much easier detail to the staff, teachers, TA’s and be helpful for the students too.

    Project Student: Dhaval Joshi

 

 

Installation of Security Cameras

Room 007 is a certified testing center and had only 2 cameras for coverage, aside from that the 007 and 005 rooms house important workstations and network devices for the campus, external clients, and the server room. There was a serious need to monitor all the activities of 007 and 005. The project was to install POE cameras at strategic locations to monitor all entry and exits of server room, 007 and 005 as well as monitor the testers on test days

007 and 005 were successfully installed, but the server room has not been covered yet, foundations have however been set such that, whoever undertakes the project in the future would have no issues whatsoever.

 

Project Student: Oluwatobi Omorodion 

Cyber Security Open

The Cyber Security Open is a convention that the Living Lab will host, intended for beginners and professionals interested in the field of security. It is broken into 5 different missions. We went through, ran through the missions, and familiarized ourselves with them. We also updated the existing setups for each mission so they would be ready for the day of the event. Due to unexpected circumstances, we had to cancel the event this semester, but everything is ready for the students to host the event next semester.

Project Team Members: Bandar Alotibi, Luke Cotton

Cyber Security Open

The Cyber Security Open Project will serve the purpose of educating undergraduate college students in how to use Information Security tools such as Kali Linux, Nmap, and Wireshark. The project consists of six missions, each requiring the use of specific hardware and software tools. Our job is to review and edit the current documentation, and add more instructions to help the students understand the missions clearly. Also, we are going to test the missions to make sure that all the software is up to date and the hardware tools are functioning properly.

We were able to accomplish the missions and recreate documentations for each mission. Each mission now has a setup and step-by-step guides. We also added screenshots to each guide to make the missions easier to accomplish by other students.

Student Team Members:  Abdulaziz Alzaben, Toby Robinson

 

IT Specialist consulting for non-profit organizations

This project was created to assist two non-profit organizations with any technical support needs that they should have. Both received assistance with their IT needs, and had wireless connectivity issues troubleshot. One organization additionally had donated and purchased equipment installed and set up, while the other was assisted in choosing a new ISP.

Project Team Members:  Evan Cloe, Ahmed Alhassoun, John Stipe