Documents
Stern Warning
Any notes found here are intended to supplement your own lecture notes.
They are not a substitute for attending class.
Lec No. | Topic & Description | PDF link | PPTX link |
---|---|---|---|
Lec 01 | Introduction | PowerPoint | |
(Course Info, Security Objectives, Avenues of Attack) | |||
Lec 02 | Standards, Principles, and Strategies | PowerPoint | |
(Standards, Principles, and Strategies) | |||
Lec 03 | Overflow Attack Basics | PowerPoint | |
(Buffer Overflow Basics, Stack Details, Vulnerable Code) | |||
Lec 04 | Buffers and Assembly Language | PowerPoint | |
(Reviewing Assembly Language, Cdecl Calling Conventions) | |||
Lec 05 | Stack Overflow Demo & Shellcode | PowerPoint | |
(Detailed Shellcode Explanation and Stack Overflow Demo) | |||
Lec 06 | Overflow Defenses and Variations | PowerPoint | |
(ASLR, Stack Canaries, Stack Execution, return-to-libc, ROP) | |||
Lec 07 | Intro to Malware | PowerPoint | |
(Threat Actors, Attribution, Threat Actor Examples) | |||
Lec 08 | Malware Categories | PowerPoint | |
(How Malware Spreads, What Malware Does, Systems Malware Targets) | |||
Lec 09 | Malware Lifecycle | PowerPoint | |
(Malware Lifecycle, Intro to Malware Analysis) | |||
Lec 10 | Malware Analysis | PowerPoint | |
(Basic / Advanced, Static / Dynamic, Packing, Sandboxes, Exam Info) | |||
Lec 11 | Intro to Cryptology | PowerPoint | |
(Intro to Crypto, Block Ciphers, DES, 3DES, AES) | |||
Lec 12 | Intro to Cryptography (continued) | PowerPoint | |
(Block Cypher Modes, Assymetric Encryption, Diffie-Hellman, RSA) | |||
Lec 13 | Hashing and Public Key Infrastructure | PowerPoint | |
(Man in the Middle, MAC, Hashing, PKI, Certificates, Digital Signatures) | |||
Lec 14 | Cryptanalysis | PowerPoint | |
(Cryptanalytic Attacks, Pseudorandom Numbers) | Random number slides | ||
Lec 15 | Ethics and Computer Security | PowerPoint | |
(Case Studies: Let's Encrypt, Hutchins, Apple Encryption, etc.) | |||
Lec 16 | Password Authentication and Cracking | PowerPoint | |
(Authentication, Rainbow Tables, Salting) | |||
Lec 17 | Linux and Windows Authentication | PowerPoint | |
(Linux Authentication, Windows Authentication, Kerberos) | |||
Lec 18 | OS Security Features | PowerPoint | |
(Hardening Methods in Windows and Linux) | |||
Lec 19 | Offensive Security | PowerPoint | |
(Offensive Security, Demonstration) | |||
Lec 20 | Intro to Networks | PowerPoint | |
(TCP/IP model and Layers (Link, Internet, Transport, Application)) | |||
Lec 21 | Network Attacks | PowerPoint | |
(Network Attacks on Different Layers, Network Security) | |||
Lec 22 | Web Hacking and Security | PowerPoint | |
(Background Info, Cross-Site Scripting, SQL Injection) | |||
Lec 23 | Wireless Hacking and Security | PowerPoint | |
(802.11 Standard, Wireless Hacking Techniques) |
Code Files
Below you will find copies of the files we have used for demonstrations and other purposes in class. Brief notes have been provided where appropriate.
Lecture | Exercise | Links | Notes |
---|---|---|---|
Lec 05 | Stack Overflow Demo |
exploit.c vulnerable.c |
Code to create the exploit to be used as input Program that is being exploited |