Security Workshop

From Gridkaschool
Revision as of 13:12, 20 August 2014 by Raimund (talk | contribs) (→‎Abstract)
Jump to navigationJump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

Abstract

We will change ends and take the role of a computer hacker. ...

Requirements

  • You need to bring your own notebook (BYOD), Unix-based preferred.
  • An SSH client (OpenSSH, PuTTY) is necessary.

Agenda

  • Part I - Introduction
    • What is "hacking"?
    • How do hackers (and white hat pentesters) break into computers?
    • Our lab environment
  • Part II - Webhacking
    • Injection Attacks (SQL, OS commands, ...)
    • Cross-site Scripting (XSS)
    • Inclusion Attacks
    • Attacks on browsers
  • Part III - Man in the Middle-Attacks
    • ARP Spoofing
    • DNS Spoofing
    • MitM in IPv6 networks
  • Part IV - Metasploit Framework
    • Exploits
    • Payloads
    • Post-Exploitation scripts

Course Material

Handout:
whatever your notes will be ;-) (we can provide written handouts, but only in German)