Difference between revisions of "Summerschool Aachen 2005/Schedule"
Line 44: | Line 44: | ||
***Forensics / hidden data in documents (Maximillian Dornseif) | ***Forensics / hidden data in documents (Maximillian Dornseif) | ||
***OracleSecurity (Alexander Konbrust) [http://lufgi4.informatik.rwth-aachen.de/movies/summerschool/kornbrust-oracle1-2005-09-26.mov MOV1] [http://lufgi4.informatik.rwth-aachen.de/movies/summerschool/kornbrust-oracle2-2005-09-26.mov MOV2] [http://www.red-database-security.com/wp/IT_summerschool_Books_and_Websites.pdf Intro/pdf] [http://www.red-database-security.com/wp/google_oracle_hacking_us.pdf Google hacking Oracle] [http://www.red-database-security.com/wp/IT_summerschool_Oracle_Database_Basic_Hardening_and_Common_Exploits.pdf Hardening and Common Exploits/pdf] [http://www.red-database-security.com/wp/IT_summerschool_db_rootkits.pdf rootkits/pdf] | ***OracleSecurity (Alexander Konbrust) [http://lufgi4.informatik.rwth-aachen.de/movies/summerschool/kornbrust-oracle1-2005-09-26.mov MOV1] [http://lufgi4.informatik.rwth-aachen.de/movies/summerschool/kornbrust-oracle2-2005-09-26.mov MOV2] [http://www.red-database-security.com/wp/IT_summerschool_Books_and_Websites.pdf Intro/pdf] [http://www.red-database-security.com/wp/google_oracle_hacking_us.pdf Google hacking Oracle] [http://www.red-database-security.com/wp/IT_summerschool_Oracle_Database_Basic_Hardening_and_Common_Exploits.pdf Hardening and Common Exploits/pdf] [http://www.red-database-security.com/wp/IT_summerschool_db_rootkits.pdf rootkits/pdf] | ||
− | |||
− | |||
**Lab: Playing with [[/Oracle]] (Alexander Konbrust & Christian Klein) | **Lab: Playing with [[/Oracle]] (Alexander Konbrust & Christian Klein) | ||
**Coffe Table Talk: Signature Forging and PIN observation (Marek Kumpost) | **Coffe Table Talk: Signature Forging and PIN observation (Marek Kumpost) |
Revision as of 08:09, 30 September 2005
Warning: The schedule is somewhat messed up. It needs to be synced with the 'official' schedule.
Contents
Course Schedule
Mon 19.
Tue 20.
Wed 21.
Thu 22.
Fri 23.
- Lecture: Fuzzing (Ilja van Sprundel) PDF MOV
- Paper Ilja talked about (free on the RWTH campus)
- Lab: Fuzz whatever you can get your hands on (Ilja van Sprundel)
- CoffeeTableTalk the scene (Christian Klein)
- Evening: Visit at the Netzladen
- Tech Report 'till then: Harald Vogt & NN
- Lecture: Fuzzing (Ilja van Sprundel) PDF MOV
Mon 26.
- Lecture:
- Forensics / hidden data in documents (Maximillian Dornseif)
- OracleSecurity (Alexander Konbrust) MOV1 MOV2 Intro/pdf Google hacking Oracle Hardening and Common Exploits/pdf rootkits/pdf
- Lab: Playing with /Oracle (Alexander Konbrust & Christian Klein)
- Coffe Table Talk: Signature Forging and PIN observation (Marek Kumpost)
- Evening:
- Lecture:
Tue 27.
- Lecture: Breaking the web (Maximillian Dornseif) PDF MOV, XSS Thesis.
- Lab: Breaking the Web for real (Maximillian Dornseif) PDF /Exercises
- Coffee Table Talk: Security, Science and Education (Felix Freiling), Security Visualisation (Florian Mansmann) PDF
- Evening: CCCAC
Wed 28.
- Lecture:
- Malware (Christian Klein) [PDF]
- Botnets, Firewall traversal, distributed C&C (Thorsten Holz)
- CoffeeTableTalk: Breaking VPNs (Lars Völker)
- Lab:
- Lecture:
Thu 29.
- Lecture:
- Attacking Anonymity Systems (Lexi Pimenidis)
- Sniffing, Spoofing (ThorstenHolz) [slides here]
- Lab:
- Coffee Table Talk: Secure Software (Paul Boehm)
- CoffeeTableTalk: the topology of covert conflict (Shishir Nagaraja) [Paper]
- Evening: Party (Felix Freiling)
- Lecture:
Fri 30.
- Lecture:
- Forensics (Maximillian Dornseif)
- Fix loose ends
- Lecture: