Introducing
[The Mitnik / Diffie-Hellman Lab]
A student-led, faculty-mentored initiative to forge the next generation of industry-ready cybersecurity professionals at MITS.
The Learning Model: Real-World, Hands-On Scenarios
Our lab moves beyond theory into practical application. All activities are confined to our isolated ‘sandbox’ network, simulating professional cybersecurity operations in a safe, controlled environment.
Foundational Skill Building
Students learn core techniques on dedicated vulnerable systems
Key Activities:
- Using Nmap to map a network topology and identify active services
- Analyzing web application weaknesses with DVWA (Damn Vulnerable Web Application)
- Completing guided practical exercises from TryHackMe platform
- Learning fundamental Linux command line and scripting techniques
Red Team vs. Blue Team Live Fire Exercises
Real-world simulation exercises on isolated lab network
The Red Team (Ethical Hackers)
Mission: Ethically penetrate the target system's defenses using real-world tools and techniques, aiming to retrieve a specific file without being detected.
- Network reconnaissance and vulnerability assessment
- Exploitation of identified security weaknesses
- Stealth techniques to avoid detection systems
The Blue Team (Defenders)
Mission: Actively defend the system using the lab's SIEM platform to detect Red Team activity in real-time and block the attack.
- Real-time monitoring and threat detection
- Incident response and attack mitigation
- Digital forensics and evidence collection
Key Activities:
- Red Team: Ethical penetration testing using industry-standard tools
- Blue Team: Active defense using SIEM platforms for real-time monitoring
- Live attack scenarios with specific objectives and time constraints
- Digital forensics and incident response procedures
Professional Debrief (Purple Teaming)
Collaborative analysis combining offensive and defensive perspectives
Key Activities:
- Red Team explains attack methodology and exploitation techniques
- Blue Team presents digital evidence and detection mechanisms used
- Joint analysis of security gaps and improvement recommendations
- Documentation of lessons learned and best practices identified
Project Leadership & Team Structure
Collaborative approach combining faculty supervision with student innovation and technical expertise
Lab Supervisor
Ms. Haritha H.
Faculty oversight and legal accountability
Key Responsibilities:
- Ultimate authority and legal accountability for all lab operations
- Final decision-making authority for lab policies and procedures
- Primary contact for college administration and external stakeholders
- Ensuring compliance with institutional policies and legal requirements
Lab Staff
Sanal Babu
Technical operations and student guidance
Key Responsibilities:
- Day-to-day technical operations and maintenance oversight
- Student guidance and hands-on training support
- Laboratory equipment management and troubleshooting
- Coordination between faculty supervision and student activities
Student Implementation Team
Core Technical Team
Technical research and implementation planning
Key Responsibilities:
- Amalekh Biju - Technical Lead and Architecture Design
- Muhammed Nihal - Network Specialist and Infrastructure
- Midhun U - Security Analyst and Monitoring Systems
- Sudheesh S Pai - Implementation Specialist and Documentation
Ready to Address Security Concerns?
Our comprehensive proposal addresses every potential risk with professional-grade security architecture and complete legal compliance frameworks.
View Our Zero-Risk Design & Legal Framework