Security Workshop: Difference between revisions
From Gridkaschool
Jump to navigationJump to search
m (Created page with "== Important Information == * You need to bring your own notebook (BYOD)! * An SSH client (OpenSSH, PuTTY) is necessary. == Content == * ''Part I'' - '''Introduction''' ** Ho…") |
m (→Material) |
||
Line 29: | Line 29: | ||
'''Handout:'''<br> |
'''Handout:'''<br> |
||
whatever your notes will be ;-) (we can provide written handouts but only in German) |
whatever your notes will be ;-) (we can provide written handouts, but only in German) |
Revision as of 12:57, 20 August 2014
Important Information
- You need to bring your own notebook (BYOD)!
- An SSH client (OpenSSH, PuTTY) is necessary.
Content
- Part I - Introduction
- How to hack
- Lab environment
- Part II - Webhacking
- Injection Attacks (SQL, OS commands, ...)
- Cross-site Scripting (XSS)
- Inclusion Attacks
- Attacks on browsers
- Part III - Man in the Middle-Attacks
- ARP Spoofing
- DNS Spoofing
- MitM in IPv6 networks
- Part IV - Metasploit
- ...
Material
Slides:
...
Handout:
whatever your notes will be ;-) (we can provide written handouts, but only in German)