Introducing
[The Mitnik / Diffie-Hellman Lab]

A student-led, faculty-mentored initiative to forge the next generation of industry-ready cybersecurity professionals at MITS.

The Learning Model: Real-World, Hands-On Scenarios

Our lab moves beyond theory into practical application. All activities are confined to our isolated ‘sandbox’ network, simulating professional cybersecurity operations in a safe, controlled environment.

Phase 1

Foundational Skill Building

Students learn core techniques on dedicated vulnerable systems

Key Activities:

  • Using Nmap to map a network topology and identify active services
  • Analyzing web application weaknesses with DVWA (Damn Vulnerable Web Application)
  • Completing guided practical exercises from TryHackMe platform
  • Learning fundamental Linux command line and scripting techniques
Phase 2

Red Team vs. Blue Team Live Fire Exercises

Real-world simulation exercises on isolated lab network

The Red Team (Ethical Hackers)

Mission: Ethically penetrate the target system's defenses using real-world tools and techniques, aiming to retrieve a specific file without being detected.

  • Network reconnaissance and vulnerability assessment
  • Exploitation of identified security weaknesses
  • Stealth techniques to avoid detection systems

The Blue Team (Defenders)

Mission: Actively defend the system using the lab's SIEM platform to detect Red Team activity in real-time and block the attack.

  • Real-time monitoring and threat detection
  • Incident response and attack mitigation
  • Digital forensics and evidence collection

Key Activities:

  • Red Team: Ethical penetration testing using industry-standard tools
  • Blue Team: Active defense using SIEM platforms for real-time monitoring
  • Live attack scenarios with specific objectives and time constraints
  • Digital forensics and incident response procedures
Phase 3

Professional Debrief (Purple Teaming)

Collaborative analysis combining offensive and defensive perspectives

Key Activities:

  • Red Team explains attack methodology and exploitation techniques
  • Blue Team presents digital evidence and detection mechanisms used
  • Joint analysis of security gaps and improvement recommendations
  • Documentation of lessons learned and best practices identified

Project Leadership & Team Structure

Collaborative approach combining faculty supervision with student innovation and technical expertise

Lab Supervisor

Ms. Haritha H.

Faculty oversight and legal accountability

Key Responsibilities:
  • Ultimate authority and legal accountability for all lab operations
  • Final decision-making authority for lab policies and procedures
  • Primary contact for college administration and external stakeholders
  • Ensuring compliance with institutional policies and legal requirements

Lab Staff

Sanal Babu

Technical operations and student guidance

Key Responsibilities:
  • Day-to-day technical operations and maintenance oversight
  • Student guidance and hands-on training support
  • Laboratory equipment management and troubleshooting
  • Coordination between faculty supervision and student activities

Student Implementation Team

Core Technical Team

Technical research and implementation planning

Key Responsibilities:
  • Amalekh Biju - Technical Lead and Architecture Design
  • Muhammed Nihal - Network Specialist and Infrastructure
  • Midhun U - Security Analyst and Monitoring Systems
  • Sudheesh S Pai - Implementation Specialist and Documentation

Ready to Address Security Concerns?

Our comprehensive proposal addresses every potential risk with professional-grade security architecture and complete legal compliance frameworks.

View Our Zero-Risk Design & Legal Framework