Here are the exercise Grades
Note: Please read the general instructions first.
Week |
Submission Date |
Topic |
Recitation |
Exercise |
Comments |
1 |
03/03/2013 |
x86 Assembly & Reverse Engineering |
[pdf] [pptx] |
Please use 'Save target as' and NOT just click on the 'ex_pack'. |
|
2 |
10/03/2013 |
|
Please use 'Save target as' and NOT just click on the 'ex_pack'. First run ex_unpack upd.png upd |
||
3+4 |
17/03/2013 |
More advanced shellcodes and binary patching |
[pptx] [pdf] |
Please use 'Save target as' and NOT just click on the 'ex_pack'. |
|
5 |
07/04/2013 |
Return Orient Programming (ROP) |
[pptx] [pdf] |
|
|
6 |
14/04/2013 |
Fuzzing |
[pptx] [pdf] |
The exercise has been uploaded later than planned. The new submission deadline is 28/04/13, by midnight. Note: Both the PDF and the exercise pack have been updated to make the exercise slightly more straight-forward. Please download the new revision. |
|
7 |
21/04/2013 |
Web primer - HTTP, HTML, PHP, SQL |
Submission deadline has been changed to 01/05/13. |
||
8 |
28/04/2013 |
continued. |
[pptx] [pdf] |
|
Exercise for this subject will be given next week. |
9 |
05/05/2013 |
SOP, CSRF, XSS, RFI / LFI, DNS Rebinding |
[pptx] [pdf] |
The exercise has been posted later than expected. The submission date will be 15/05/13. This is exercise is actually excersize 8+9 combined. |
|
10 |
12/05/2013 |
Network basics, security, and compromise |
[pdf] [pptx] |
I've updated the presentation to include some of the drawings I drew on the board, and some screenshots from the demo Due date is: 20/5/2013 |
|
11 |
19/05/2013 |
Network protocol attacks continued |
[pdf] [pptx] |
Due data is 30.5.13. Notes: There was a small error on 2.b. The PDF has been updated. Apparently there was a problem on the server leading to students not being able to access the PDF. The due date has been updated. Note: There was a bug in the ex_pack, which on some machines made the simple_switch_sim utility less useful. Please use the updated version. |
|
12 |
26/05/2013 |
Rootkits |
[pdf] [pptx] |
|
The homework is to read the article about the Sony rootkit, and understand the concepts used in the rootkit mentioned. |
13 |
02/06/2013 |
Forensics |
[pdf] [pptx] |
|
|
14 |
09/06/2013 |
Network Traversal |
[pdf] [pptx] |
|
|
15 |
16/06/2013
|
Final recitation - Metasploit, extended topics |
[pdf] [pptx] |
|
|
Resources:
Will be added soon. Please talk to the teaching assistants if there is any particular subject you need a good reference to.