Documents

Stern Warning
Any notes found here are intended to supplement your own lecture notes.
They are not a substitute for attending class.

Lec No. Topic & Description PDF link PPTX link
Lec 01 Introduction PDF PowerPoint
  (Course Info, Security Objectives, Avenues of Attack)   
Lec 02 Standards, Principles, and Strategies PDF PowerPoint
  (Standards, Principles, and Strategies)   
Lec 03 Overflow Attack Basics PDF PowerPoint
  (Buffer Overflow Basics, Stack Details, Vulnerable Code)   
Lec 04 Buffers and Assembly Language PDF PowerPoint
  (Reviewing Assembly Language, Cdecl Calling Conventions)   
Lec 05 Stack Overflow Demo & Shellcode PDF PowerPoint
  (Detailed Shellcode Explanation and Stack Overflow Demo)   
Lec 06 Overflow Defenses and Variations PDF PowerPoint
  (ASLR, Stack Canaries, Stack Execution, return-to-libc, ROP)   
Lec 07 Intro to Malware PDF PowerPoint
  (Threat Actors, Attribution, Threat Actor Examples)   
Lec 08 Malware Categories PDF PowerPoint
  (How Malware Spreads, What Malware Does, Systems Malware Targets)   
Lec 09 Malware Lifecycle PDF PowerPoint
  (Malware Lifecycle, Intro to Malware Analysis)   
Lec 10 Malware Analysis PDF PowerPoint
  (Basic / Advanced, Static / Dynamic, Packing, Sandboxes, Exam Info)   
Lec 11 Intro to Cryptology PDF PowerPoint
  (Intro to Crypto, Block Ciphers, DES, 3DES, AES)   
Lec 12 Intro to Cryptography (continued) PDF PowerPoint
  (Block Cypher Modes, Assymetric Encryption, Diffie-Hellman, RSA)   
Lec 13 Hashing and Public Key Infrastructure PDF PowerPoint
  (Man in the Middle, MAC, Hashing, PKI, Certificates, Digital Signatures)   
Lec 14 Cryptanalysis PDF PowerPoint
  (Cryptanalytic Attacks, Pseudorandom Numbers)  Random number slides
Lec 15 Ethics and Computer Security PDF PowerPoint
  (Case Studies: Let's Encrypt, Hutchins, Apple Encryption, etc.)   
Lec 16 Password Authentication and Cracking PDF PowerPoint
  (Authentication, Rainbow Tables, Salting)   
Lec 17 Linux and Windows Authentication PDF PowerPoint
  (Linux Authentication, Windows Authentication, Kerberos)   
Lec 18 OS Security Features PDF PowerPoint
  (Hardening Methods in Windows and Linux)   
Lec 19 Offensive Security PDF PowerPoint
  (Offensive Security, Demonstration)   
Lec 20 Intro to Networks PDF PowerPoint
  (TCP/IP model and Layers (Link, Internet, Transport, Application))   
Lec 21 Network Attacks PDF PowerPoint
  (Network Attacks on Different Layers, Network Security)   
Lec 22 Web Hacking and Security PDF PowerPoint
  (Background Info, Cross-Site Scripting, SQL Injection)   
Lec 23 Wireless Hacking and Security PDF PowerPoint
  (802.11 Standard, Wireless Hacking Techniques)   

Code Files

Below you will find copies of the files we have used for demonstrations and other purposes in class. Brief notes have been provided where appropriate.

Lecture Exercise Links Notes
Lec 05 Stack Overflow Demo exploit.c
vulnerable.c
Code to create the exploit to be used as input
Program that is being exploited