TP Information Security <Quelques techniques d’attaques classiques>

By DGHAIES Ahmed, ZOUARI Nohamed and KOUBAA Olfa GL5

All the exercices are made and tested using docker-compose configuration. That allows us to create a testing system based on preconfigured images that runs in the same way on any system supporting docker without any future configuration

Exercices

  1. Cracking
  2. Sniffing
  3. Spoofing
  4. Dos