Error message

User warning: The following module has moved within the file system: ldap_user. In order to fix this, clear caches or put the module back in its original location. For more information, see the documentation page. in _drupal_trigger_error_with_delayed_logging() (line 1181 of /usr/local/stow/drupal-7.89/lib/drupal-7.89/includes/






All exercises will affect your grade. However, since the exercises mostly serve as milestones towards building and exercising a full system, later exercises will often offer opportunities to remedy mistakes made in early ones. If you do so, the course staff will take this into consideration and look mostly at your later work.

Code reuse


In your submission, you may reuse general-purpose code (e.g., socket setup or sysfs registration), as long as you:

  1. Clearly designate the source of this code
  2. Cleanly integrate it into yours, including the same naming and spacing conventions. It should at least look 100% yours and clean from unnecessary components.

You may NOT reuse any code specific to this workshop, from other students or past semesters.

Late submission


A penalty of (n+1)^2 points of the grade will be reduced from late submissions, while n is the number of days since the midnight at the end of the submission day, rounded up.

The exercises


First assignment:

  • Creating virtual machines and Virtual networks
  • Use netfilter basic features to create simple barrier
  • Write simple Linux module
  • Due to 24/3/15
  • [FirstAssignment]


Second assignment:

  • Completing the environment
  • Use sysfs to communicate with the module from userspace
  • Create simple interface
  • Due to 11/4/15
  • [SecondAssignment]

Third assignment:

  • Implementing real-world security system
  • Be familiar with stateless packet filtering
  • Create user interface which communicate with several devices
  • Due to 14/5/15
  • [ThirdAssignment]
  • Additional file for the exercise: remove the .txt extention after download (needed to add it for security restriction)  [fw.h]
  • Example files for the commands 'load_rule_table_from_file' and 'show_rule_table'

Fourth assignment:

  • Implementing statful connection tracking
  • Be familiar with common protocols
  • Support deep inspection in common complex protocols
  • Due to 10/6/15
  • [FourthAssignment]

Fifth assignment:

  • Implementing Advance security blades
  • Protect your network from real world attacks
  • Gain experience with penetration tools such as Metasploit
  • Students will set meetings in Sep' to show thier presentations
  • [FifthAssignment]
  • [Spreadsheet]