Course Administration

System Administration

News of the Week, summary

A summary of what is happening in information security this week.

Dictionaries

A collection of security and general terms.

Tool of the week

Investigate, demonstrate and report on one of the top information security tools. Each tutorial is installed in one of our VMs.

In Depth

In-depth report of a current Information Security Issue or Concept. This includes something concrete (ie working examples). May have an associated tutorial.
TopicTutorial
CVE-2014-6271 Shellshock
Cryptocurrencies
Reverse Engineering
RSA rsa_tutorial.py
Malvertisements (Demo)
Scapy and wifi Scapy and ARP (pdf), Scapy and ARP (odp)
Spectre and Meltdown meltdown
Dirty COW
botnets lab5.py
Stegosploit IMAJS
Sleuth Kit (Demo) Sleuth Tutorial(Instructions)
TOR TOR
KRACK KRACK
LDAP LDAP injection Tutorial(Instructions)
EternalBlue Eternalblue.zip
Vulnerable Javascript
Online Trackability
Proof of Capacity
Power Sidechannel Attacks

OWASP TOP 10

Documenting the OWASP top 10 security issues with full working exploitable examples and their effective mitigation. Issues can also come from Googles Browser Security Handbook, and from OWASP Top 10 Mobile Risks
* indicates content covered in class.

Tutorials

Midterm

Assignment

Challenges/Exercises

Playing around with capture the flag challenges and with security virtual machines.

Interesting

Info Sec Resources