Difference between revisions of "Summerschool Aachen 2005/Schedule"
(12 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
+ | cogetdomta | ||
'''Warning:''' The schedule is somewhat messed up. It needs to be synced with the 'official' schedule. | '''Warning:''' The schedule is somewhat messed up. It needs to be synced with the 'official' schedule. | ||
==Course Schedule== | ==Course Schedule== | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
=== Wed 21. === | === Wed 21. === | ||
− | + | *[http://www.secdev.org/projects/scapy/ ScaPy] | |
− | + | * Tech Report 'till then: (Yves Younan & Daniel Hodson) [http://vault.fort-knox.org/~yyounan/techreport-summerschool.pdf PDF] | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
=== Fri 23. === | === Fri 23. === | ||
− | + | Fuzzing - [http://ieeexplore.ieee.org/iel5/8013/30742/01423963.pdf?tp=&arnumber=1423963&isnumber=30742 Paper Ilja talked about] (free on the RWTH campus) | |
− | |||
− | |||
− | |||
− | |||
− | |||
=== Mon 26. === | === Mon 26. === | ||
Line 44: | Line 19: | ||
***Forensics / hidden data in documents (Maximillian Dornseif) | ***Forensics / hidden data in documents (Maximillian Dornseif) | ||
***OracleSecurity (Alexander Konbrust) [http://lufgi4.informatik.rwth-aachen.de/movies/summerschool/kornbrust-oracle1-2005-09-26.mov MOV1] [http://lufgi4.informatik.rwth-aachen.de/movies/summerschool/kornbrust-oracle2-2005-09-26.mov MOV2] [http://www.red-database-security.com/wp/IT_summerschool_Books_and_Websites.pdf Intro/pdf] [http://www.red-database-security.com/wp/google_oracle_hacking_us.pdf Google hacking Oracle] [http://www.red-database-security.com/wp/IT_summerschool_Oracle_Database_Basic_Hardening_and_Common_Exploits.pdf Hardening and Common Exploits/pdf] [http://www.red-database-security.com/wp/IT_summerschool_db_rootkits.pdf rootkits/pdf] | ***OracleSecurity (Alexander Konbrust) [http://lufgi4.informatik.rwth-aachen.de/movies/summerschool/kornbrust-oracle1-2005-09-26.mov MOV1] [http://lufgi4.informatik.rwth-aachen.de/movies/summerschool/kornbrust-oracle2-2005-09-26.mov MOV2] [http://www.red-database-security.com/wp/IT_summerschool_Books_and_Websites.pdf Intro/pdf] [http://www.red-database-security.com/wp/google_oracle_hacking_us.pdf Google hacking Oracle] [http://www.red-database-security.com/wp/IT_summerschool_Oracle_Database_Basic_Hardening_and_Common_Exploits.pdf Hardening and Common Exploits/pdf] [http://www.red-database-security.com/wp/IT_summerschool_db_rootkits.pdf rootkits/pdf] | ||
− | |||
− | |||
**Lab: Playing with [[/Oracle]] (Alexander Konbrust & Christian Klein) | **Lab: Playing with [[/Oracle]] (Alexander Konbrust & Christian Klein) | ||
**Coffe Table Talk: Signature Forging and PIN observation (Marek Kumpost) | **Coffe Table Talk: Signature Forging and PIN observation (Marek Kumpost) | ||
Line 51: | Line 24: | ||
=== Tue 27. === | === Tue 27. === | ||
− | * | + | * [http://md.hudora.de/presentations/wehrmann-xss.pdf XSS Thesis]. |
− | * | + | * [[/Exercises]] |
− | + | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
=== Thu 29. === | === Thu 29. === | ||
− | + | *CoffeeTableTalk: the topology of covert conflict (Shishir Nagaraja) [[http://www.cl.cam.ac.uk/TechReports/UCAM-CL-TR-637.html Paper]] | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
=== Fri 30. === | === Fri 30. === | ||
**Lecture: | **Lecture: | ||
*** Forensics (Maximillian Dornseif) | *** Forensics (Maximillian Dornseif) | ||
+ | **** [http://www.fuckallyall.com/article1585.html Cat Schwarz Example] [http://www.snopes.com/photos/risque/kettle.asp Reflections] | ||
**Fix loose ends | **Fix loose ends | ||
+ | [[Category:Summerschools]] |
Latest revision as of 01:04, 17 October 2007
cogetdomta Warning: The schedule is somewhat messed up. It needs to be synced with the 'official' schedule.
Course Schedule
Wed 21.
Fri 23.
Fuzzing - Paper Ilja talked about (free on the RWTH campus)
Mon 26.
- Lecture:
- Forensics / hidden data in documents (Maximillian Dornseif)
- OracleSecurity (Alexander Konbrust) MOV1 MOV2 Intro/pdf Google hacking Oracle Hardening and Common Exploits/pdf rootkits/pdf
- Lab: Playing with /Oracle (Alexander Konbrust & Christian Klein)
- Coffe Table Talk: Signature Forging and PIN observation (Marek Kumpost)
- Evening:
- Lecture:
Tue 27.
Thu 29.
- CoffeeTableTalk: the topology of covert conflict (Shishir Nagaraja) [Paper]
Fri 30.
- Lecture:
- Forensics (Maximillian Dornseif)
- Fix loose ends
- Lecture: