Date | Lectures | Labs | Projects |
---|---|---|---|
9/23 (Week 1) |
Course Logistic Cryptography |
IRC | Project 1 (Programming Languages) out |
9/30 (Week 2) |
Authentication | Quiz | Project 1 in |
10/07 (Week 3) |
Reverse Engineering | Netcat and Reverse Engineering | Project 2 (Reversing) Out |
10/14 (Week 4) |
Passwords
Password Security: A Case History |
Password Cracking |
|
10/21 (Week 5) | Shellcode and Buffer Overflow | Shellcode | Project 2 (Reversing) in (Thursday midnight) Project 3 (Shellcode) out |
10/28 (Week 6) | Buffer Overflows | Project 3 (Shellcode) in (Thursday midnight) Project 4 (Overflows I) out |
|
11/04 (Week 7) | Scanners
and Metasploit |
Nessus and Nmap | |
11/11 (Week 8) | Web Attacks Symantec Web Attacks White Paper |
Web Attacks Lab (SQLi, XSS) | |
11/18 (Week 9) | Web Attacks Lab (More XSS, Shell Attacks) | Project 4 (Overflows I) in (Thursday midnight) Project 5 (Web Attacks) Out |
|
11/25 (Week 10) | Thanksgiving | ||
12/02 (Week 11) | Firewall, IDS and Snort | Firewall and Snort | Project 5 (Web Attacks) in (Thursday midnight) |
References
- A Taxonomy of Computer Worms, N. Weaver, et al, the First ACM Workshop on Rapid Malcode (WORM), 2003.
- Botnet Chronicles: A Journey to Infamy, Trend Micro white paper 2010.
- A Survey of Botnet Technology and Defenses, in the Proc. of the Cybersecurity Applications Technology Conference for Homeland Security, 2009.
- Smashing The Stack For Fun And Profit
- The Art of Port Scanning
- The Art of Writing Shellcode