Difference between revisions of "Security Workshop"

From Gridkaschool
m (Material)
m (Content)
Line 8: Line 8:
   
 
* ''Part I'' - '''Introduction'''
 
* ''Part I'' - '''Introduction'''
** How to hack
+
** What is "hacking"?
  +
** How do hacker (and white hat pentesters) break into computers?
** Lab environment
 
  +
** Our lab environment
 
* ''Part II'' - '''Webhacking'''
 
* ''Part II'' - '''Webhacking'''
 
** Injection Attacks (SQL, OS commands, ...)
 
** Injection Attacks (SQL, OS commands, ...)
Line 21: Line 22:
 
* ''Part IV'' - '''Metasploit'''
 
* ''Part IV'' - '''Metasploit'''
 
** ...
 
** ...
 
   
 
== Material ==
 
== Material ==

Revision as of 12:59, 20 August 2014

Important Information

  • You need to bring your own notebook (BYOD)!
  • An SSH client (OpenSSH, PuTTY) is necessary.


Content

  • Part I - Introduction
    • What is "hacking"?
    • How do hacker (and white hat pentesters) break into computers?
    • Our lab environment
  • Part II - Webhacking
    • Injection Attacks (SQL, OS commands, ...)
    • Cross-site Scripting (XSS)
    • Inclusion Attacks
    • Attacks on browsers
  • Part III - Man in the Middle-Attacks
    • ARP Spoofing
    • DNS Spoofing
    • MitM in IPv6 networks
  • Part IV - Metasploit
    • ...

Material

Slides:
...

Handout:
whatever your notes will be ;-) (we can provide written handouts, but only in German)