Difference between revisions of "Summerschool Aachen 2005/Schedule"

From C4 Wiki
Jump to: navigation, search
Line 44: Line 44:
 
***Forensics / hidden data in documents (Maximillian Dornseif)
 
***Forensics / hidden data in documents (Maximillian Dornseif)
 
***OracleSecurity (Alexander Konbrust) [http://lufgi4.informatik.rwth-aachen.de/movies/summerschool/kornbrust-oracle1-2005-09-26.mov MOV1] [http://lufgi4.informatik.rwth-aachen.de/movies/summerschool/kornbrust-oracle2-2005-09-26.mov MOV2] [http://www.red-database-security.com/wp/IT_summerschool_Books_and_Websites.pdf Intro/pdf] [http://www.red-database-security.com/wp/google_oracle_hacking_us.pdf Google hacking Oracle] [http://www.red-database-security.com/wp/IT_summerschool_Oracle_Database_Basic_Hardening_and_Common_Exploits.pdf Hardening and Common Exploits/pdf] [http://www.red-database-security.com/wp/IT_summerschool_db_rootkits.pdf rootkits/pdf]
 
***OracleSecurity (Alexander Konbrust) [http://lufgi4.informatik.rwth-aachen.de/movies/summerschool/kornbrust-oracle1-2005-09-26.mov MOV1] [http://lufgi4.informatik.rwth-aachen.de/movies/summerschool/kornbrust-oracle2-2005-09-26.mov MOV2] [http://www.red-database-security.com/wp/IT_summerschool_Books_and_Websites.pdf Intro/pdf] [http://www.red-database-security.com/wp/google_oracle_hacking_us.pdf Google hacking Oracle] [http://www.red-database-security.com/wp/IT_summerschool_Oracle_Database_Basic_Hardening_and_Common_Exploits.pdf Hardening and Common Exploits/pdf] [http://www.red-database-security.com/wp/IT_summerschool_db_rootkits.pdf rootkits/pdf]
 
 
 
**Lab: Playing with [[/Oracle]] (Alexander Konbrust & Christian Klein)
 
**Lab: Playing with [[/Oracle]] (Alexander Konbrust & Christian Klein)
 
**Coffe Table Talk: Signature Forging and PIN observation (Marek Kumpost)
 
**Coffe Table Talk: Signature Forging and PIN observation (Marek Kumpost)

Revision as of 09:09, 30 September 2005

Warning: The schedule is somewhat messed up. It needs to be synced with the 'official' schedule.

Course Schedule

Mon 19.

    • Lecture:
      • Introduction (Maximillian Dornseif) PDF
      • Hardware Security (Maximillian Dornseif) PDF
    • Lab: Get Started, Wargames on the Net, Unscrew things. (Maximillian Dornseif)
      • Coffee Table Talk: Lock Picking (Patrick Hof, Jens Liebchen)

Tue 20.

Wed 21.

    • Lecture:
      • Fingerprinting (Maximillian Dornseif) PDF
      • ScaPy (Philippe Biondi) PDF MOV
    • Lab: Play with ScaPy, scanning the net (Philippe Biondi, Maximillian Dornseif)
    • Coffee Table Talk: HeapOverflow Protection (Yves Younan) PDF
    • Tech Report 'till then: (Yves Younan & Daniel Hodson) PDF

Thu 22.

    • Lecture: Formatstring bugs PDF MOV and Race conditions PDF MOV (Ilja van Sprundel)
    • Lab: Find an exploit, write an advisory
    • Coffee Table Talk: The Game of Go (Paul Boehm) MOV

Fri 23.

    • Lecture: Fuzzing (Ilja van Sprundel) PDF MOV
    • Lab: Fuzz whatever you can get your hands on (Ilja van Sprundel)
    • CoffeeTableTalk the scene (Christian Klein)
    • Evening: Visit at the Netzladen
    • Tech Report 'till then: Harald Vogt & NN

Mon 26.

Tue 27.

    • Lecture: Breaking the web (Maximillian Dornseif) PDF MOV, XSS Thesis.
    • Lab: Breaking the Web for real (Maximillian Dornseif) PDF /Exercises
    • Coffee Table Talk: Security, Science and Education (Felix Freiling), Security Visualisation (Florian Mansmann) PDF
    • Evening: CCCAC

Wed 28.

    • Lecture:
      • Malware (Christian Klein) [PDF]
      • Botnets, Firewall traversal, distributed C&C (Thorsten Holz)
    • CoffeeTableTalk: Breaking VPNs (Lars Völker)
    • Lab:

Thu 29.

    • Lecture:
      • Attacking Anonymity Systems (Lexi Pimenidis)
      • Sniffing, Spoofing (ThorstenHolz) [slides here]
    • Lab:
    • Coffee Table Talk: Secure Software (Paul Boehm)
    • CoffeeTableTalk: the topology of covert conflict (Shishir Nagaraja) [Paper]
    • Evening: Party (Felix Freiling)

Fri 30.

    • Lecture:
      • Forensics (Maximillian Dornseif)
    • Fix loose ends