All these sections listed bellow are proposals of developments for our students, to be implemented as their final Thesis at the end of their degree. With the participation of the students we make the project evolve and improve with new functionalities.

 
 #
Section Name
Description
Status
 1
The Server Land
Provides an increment of the physical servers in the network that are able to handle more virtual machines running at the same time. All this in order to improve the difficulty and the diversity of available operating systems.
Done
 2
The Manage Mind
Provides a web based interface in order to improve and simplify all the management tasks related to the testbed. As well, it duplicates and improves the firewall part of the original scenario used by ISECOM. 
Done
 3 
The Hacking Walkthrough
Adds to the testbed more virtual machines containing vulnerable web applications and guides the user in a self-hacking "learning by doing" process.
Done
 4
The War of Malware
Provides an analysis of malware and botnets and implements one in the LOST Testbed.
Done
 5
The Manage Mind Reloaded
Redesign of the web based interface in order to improve and simplify all the tasks related to user access and testbed management.
Done.
 6
The Legal and the EthicalSeek
 Analyzes lows and regulations about hacking and "security testing".
Done
 7
The Meta Sploiter
Adds to the testbed the virtual machines of the Metasploit project (Metasploitable machine and UltimateLAMP VM), which contain multiple challenges on vulnerable web applications, and a guide for solving these challenges.
Done
 8
The ICE Kingdom
Adds to the testbed the virtual machines of the DE-ICE project, which contain multiple challenges on vulnerable web applications and a guide for solving these challenges.
Done
 9
The NetWorld 2.0
Improves the LOST platform with new networking, virtualization, storage infrastructure and other functionalities.
Done
10
The Sixth Sense
Introduces version 6 of IP protocol to the testbed, complementing the existing virtual machines with examples and vulnerabilities based on IPv6.
Done  
11 
The Honey Potter
Creates a Honeypot into the testbed. 
Done
12 
The Attack of the ICMPs
Explores techniques and scenarios based on ICMP attacks.
Done
13
The MoniTHOR 
Provides the project with monitoring tools to monitor students' activity (IDS, IPS, Logs, reports). The section will also provide the instructors with reports about these activities.
Done
14 
The Replicant Net
Implements a system that emulates different servers/systems using traffic signatures to customize scans/responses.
Done
15 
In the Name of Domain 
Explores techniques and scenarios based on DNS attacks
Done
16
The Hostile Denial
Analyzes DoS and DDoS techniques.
Done
17
The Talented Mr. Manager
Introduces advanced tools to manage the LOST network.
Done
18
The Database Nightmare  
Analyzes database attacks (SQL injection, etc) and protection mechanisms.
 Done
19
The Great Escape  
Analyzes techniques to avoid firewalls and IDSs.  
Under Dev.
20
The Crossing Lines 
Analyzes XSS and CSRF attacks and protection mechanisms. 
Under Dev.
21 
The War of Trojans  
Analyzes the world of Trojans, from the beginning. 
Under Dev.
The Hijacked Session
Analyzes the methods of session hijacking.  
To Do
The Fort Apache
Analyzes the vulnerabilities and security of the Apache Server.
To Do
The Attack of ... Episode IIS
Analyzes the vulnerabilities of the Windows IIS (Internet Information Server). 
To Do
The Vulnerable Road  
Analyzes the existing vulnerability scanners.
To Do
The Independence Play
Provides a small environment with VMs and tools in a single DVD for users to test at home, to avoid the need of using the testbed.
To Do
The Good Method
Shows how to implement a "pen-test" using the OSSTMM methodology.
To Do
The Outsider Ones
Provides the users with improved remote desktops where they will be able to connect to and from where they will be able to develop the scans.
To Do
The Million Dollar Password  
Analyzes password cracking attacks and protection mechanisms.
To Do
 
The Finger of Printing  
Explores scenarios based on IP and ICMP fingerprinting techniques Analyzes the world of Trojans, from the beginning.  
To Do