Computer Security: CW1 - Frequently Asked Questions

The following are answers to commonly asked questions about the first coursework. We will add to this FAQ as new questions come up. Please check here before emailing course staff about coursework confusions.

Setup: the /group/teaching/ folder is empty, there is no "cs".
You need to type in the full path. The folder is there, it is just hidden.
Setup: I deleted a VM by mistake, how do I put it back?
You should re-run the setup script, just like you did the first time. Doing so should bring back any lost VMs. If that does not work, then there are likely left over VM bits in the VirtualBox directory which need to be deleted manually.
Setup: I get "VT-x/AMD-V hardware acceleration" errors
Switch lab rooms. A small number of AT computers do not have hardware acceleraton. Particularly the labs with the flip down computers.
Tutorial: How do I create a file?
Information Services has a nice Introduction to Unix workbook which covers how to create, copy, print and destroy files, and access files created by other people.
Tutorial: How do I filter packets on Wireshark?
You should look at the Wireshark Wiki which has piles of examples of how to work with the Display Filters on Wireshark.
General: Where can I go for peer help?
There is an unofficial slack channel for the course. Course staff try and check it periodically and answer questions about coursework 1. Though we do not promise to do so.
General: Can I run the VMs from my home computer?
Yes. The Virtual Machines for the lab can be run on any system with VirtualBox installed. Just download the vdi and vmdk files from: /group/teaching/cs/cw1/ on DICE and then manually import them into VirtualBox. The setup script you ran in tutorial is necessary on DICE to make sure the VMs doen't use up all the space in your home directory, but on another computer you only need to import the VM files.
General: I tried to start Kali but it will not start properly.
Delete the "~/VirtualBox VMs/CS2017/" folder and re-run the setup script. Doing so will reset all the VMs back to their initial state.
2.C: The vulnerability has two CVE numbers but the coursework only lets me enter one.
Some identified vulnerabilities have two CVE/CWE/CVSS numbers. In these cases we will take either number as a correct answer. Please only provide one number though as the auto-marker will attempt to pattern match the answer.
2.D: I found an awesome script for Metasploit online but I can't get it onto the VM.
The VMs are intended to be disconected from the Internet for a reason. You will never need to take any scripts or long files from the Internet to complete the coursework. You may need to copy short command line statements, but never more than what can be reasonably typed in by hand.
2.D: I have found the correct exploit but it isn't working...
You need facts from both the OpenVAS scan AND the earlier port scan to properly setup the attack. It will not just work out of the box, you have to get all the settings correct first. There are several Metasploit modules which can be used to correctly complete the coursework. If you get stuck on one sometimes it is worth trying another as it may make more sense to you. It is also worth doing a search for the difference between Metasploit "auxiliary" and "exploit" modules.
3.B: Blocking SSH makes the coursework nearly impossible.
Your TA made a good point that having you block SSH on 3.B makes the coursework overly annoying for no good reason. We will therefore be accepting answers to this question that allow SSH and answers that block SSH. The coursework document has also been updated to reflect the change.


Home : Teaching : Courses : Cs 

Informatics Forum, 10 Crichton Street, Edinburgh, EH8 9AB, Scotland, UK
Tel: +44 131 651 5661, Fax: +44 131 651 1426, E-mail: school-office@inf.ed.ac.uk
Please contact our webadmin with any comments or corrections. Logging and Cookies
Unless explicitly stated otherwise, all material is copyright © The University of Edinburgh