Difference between revisions of "Security Workshop"
From Gridkaschool
m (→Material) |
m (→Content) |
||
Line 8: | Line 8: | ||
* ''Part I'' - '''Introduction''' |
* ''Part I'' - '''Introduction''' |
||
− | ** |
+ | ** What is "hacking"? |
+ | ** How do hacker (and white hat pentesters) break into computers? |
||
− | ** Lab environment |
||
+ | ** Our lab environment |
||
* ''Part II'' - '''Webhacking''' |
* ''Part II'' - '''Webhacking''' |
||
** Injection Attacks (SQL, OS commands, ...) |
** Injection Attacks (SQL, OS commands, ...) |
||
Line 21: | Line 22: | ||
* ''Part IV'' - '''Metasploit''' |
* ''Part IV'' - '''Metasploit''' |
||
** ... |
** ... |
||
− | |||
== Material == |
== Material == |
Revision as of 12:59, 20 August 2014
Important Information
- You need to bring your own notebook (BYOD)!
- An SSH client (OpenSSH, PuTTY) is necessary.
Content
- Part I - Introduction
- What is "hacking"?
- How do hacker (and white hat pentesters) break into computers?
- Our lab environment
- Part II - Webhacking
- Injection Attacks (SQL, OS commands, ...)
- Cross-site Scripting (XSS)
- Inclusion Attacks
- Attacks on browsers
- Part III - Man in the Middle-Attacks
- ARP Spoofing
- DNS Spoofing
- MitM in IPv6 networks
- Part IV - Metasploit
- ...
Material
Slides:
...
Handout:
whatever your notes will be ;-) (we can provide written handouts, but only in German)