Security Workshop

From Gridkaschool
Revision as of 13:15, 20 August 2014 by Raimund (talk | contribs) (Course Material)

Abstract

We will change ends and take the role of a computer hacker. ...

Requirements

  • You need to bring your own notebook (BYOD), Unix-based preferred.
  • An SSH client (OpenSSH, PuTTY) is necessary.

Agenda

  • Part I - Introduction
    • What is "hacking"?
    • How do hackers (and white hat pentesters) break into computers?
    • Our lab environment
  • Part II - Webhacking
    • Injection Attacks (SQL, OS commands, ...)
    • Cross-site Scripting (XSS)
    • Inclusion Attacks
    • Attacks on browsers
  • Part III - Man in the Middle-Attacks
    • ARP Spoofing
    • DNS Spoofing
    • MitM in IPv6 networks
  • Part IV - Metasploit Framework
    • Exploits
    • Payloads
    • Post-Exploitation scripts

Course Material

Handout:
Whatever your notes will be ;-) (we can provide written handouts, but only in German)