Ben Becker is a sophomore at Vincennes University in the IT Support and Cyber Security Program. He not only wants an Associate degree, but he is going for his B.S degree in Cyber Security at Vincennes University. He was the Treasurer for the CCI Club for the first semester at Vincennes University, but later on he became the Vice President of the CCI Club. Ben has a multitude of talents including, graphic design, drone footage, and video and photo editing. He also has his own business called Cyber Wizard Of Indy. He enjoys helping people, especially elderly people who have a difficult time with how to use their electronic devices. He seems to have a lot of patience with them. Mr. Becker not only enjoys electronics, but he lives and breathes them.
Colton Eide is a sophomore in the VU IT Support and Cyber Security degree. His duties include, managing events, money, and disbursement. He is also responsible for keeping the books to give a full report whenever requested.
Nick Ricce is a sophomore in the VU IT Support and Cyber Security degree. His duties include, managing events, money, and disbursement. He is also responsible for keeping the books to give a full report whenever requested.
After gaining a foothold on a PC in a secured network, students learned how to traverse the network like an experienced hacker and learned the following skills:
1. The use of lock picking skills and techniques to trick the tumblers and circumvent the security of a mechanical lock.
2. Bypass the security of a PC that required a supervisor password in order to boot.
3. Using command line and PowerShell utilities alone, connecting to a domain controller and
gaining remote PowerShell access.
4. Using PowerShell commands within the remote PowerShell session on the domain controller, the students created a new unauthorized user on the network masquerading as a legitimate user.
It took students about 2 hours to complete all of these tasks with Team 4 (Chris Magna, Noah Ross, Jon Stephens) completing all tasks first. Students were able to learn how hackers attack endpoints, gain a foothold in a real network, and then how experienced hackers are able to escalate privileges by creating rouge users.
“It is very important that students understand the methodology that hackers use to escalate their privileges on a network and the security flaws that allow this to happen. I am very proud of these students and the skill sets they are developing.”
Greg Hirsch, Assistant Professor of Information Technology.