| Date | Lectures | Labs | Projects |
|---|---|---|---|
| 9/16 (Week 1) |
Course Logistic Cryptography |
IRC | Project 1 (Programming Languages) out |
| 9/23 (Week 2) |
Authentication | Quiz | Project 1 in |
| 9/30 (Week 3) |
Reverse Engineering | Netcat and Reverse Engineering | Project 2 (Reversing) Out |
| 10/07 (Week 4) |
Passwords
Password Security: A Case History |
Password Cracking |
|
| 10/14 (Week 5) | Shellcode and Buffer Overflow | Shellcode | |
| 10/21 (Week 6) | Buffer Overflows | Project 3 (Shellcode) out |
|
| 10/28 (Week 7) | Scanners
and Metasploit |
Nessus and Nmap | Project 2 (Reversing) in (Monday midnight) |
| 11/04 (Week 8) | Web Attacks Symantec Web Attacks White Paper |
Web Attacks Lab (SQLi, XSS) | Project 5 (Web Attacks) Out |
| 11/11 (Week 9) | Web Attacks Lab (More XSS, Shell Attacks) | Project 3 (Shellcode) in (Wednesday midnight) | |
| 11/18 (Week 10) | Thanksgiving | ||
| 11/25 (Week 11) | Firewall, IDS and Snort | Firewall and Snort | Project 5 (Web Attacks) in (Sunday midnight) |
References
- A Taxonomy of Computer Worms, N. Weaver, et al, the First ACM Workshop on Rapid Malcode (WORM), 2003.
- Botnet Chronicles: A Journey to Infamy, Trend Micro white paper 2010.
- A Survey of Botnet Technology and Defenses, in the Proc. of the Cybersecurity Applications Technology Conference for Homeland Security, 2009.
- Smashing The Stack For Fun And Profit
- The Art of Port Scanning
- The Art of Writing Shellcode