Summary of CS4238 Lectures

Lecture 1 (15/08/2011)

Lecture topic: Module Overview, and administrative information

Lecture 2 (22/08/2011)

Lecture topic: Linux overview and system administration

Skills and tools:

Lecture 3 (29/08/2011)

Lecture topic: Reconnaissance and Scanning

Milestones: Form project team, finish setting up Linux on the external USB drive

Skills and tools:

Lecture 4 (05/09/2011)

Lecture topic: Vulnerability-scanning, buffer overflow exploits and analysis

Skills and tools:
Resources:

Lecture 5 (12/09/2011)

Lecture topic: Buffer overflow attacks, exploit engine, buffer overflow defense, password attacks

Skills and tools:
Resources:

Lecture 6 (19/09/2011)

Lecture topic: Linux network administration and firewall

Skills and tools:

Resources:

Lecture 7 (26/09/2011)

Lecture topic: Fuzzing, vulnerability detection, binary analysis

Skills and tools:
Resources:

Lecture 8 (03/10/2011)

Lecture topic: Network attacks, sniffing, IP spoofing, session hijacking, and denial-of-service

Skills and tools:
Resources:

Lecture 9 (10/10/2011)

Lecture topic: Malware analysis, trojan and backdoor, user-level rootkit, kernel-level rootkit, botnets

Skills and tools:

Lecture 10 (17/10/2011)

Lecture topic: Web session cloning, CSRF attacks, SQL injection, Cross-site scripting, Drive-by download.

Skills and tools:
Resources:

Lecture 11 (24/10/2011)

Lecture topic: Guest lecture on web attacks.

Lecture 12 (31/10/2011)

Lecture topic:  Review

Resources:

Lecture 13 (8/11/2011, 9/11/2011)

Lecture topic:  Practice session