Week 1 (Intro / Overview):
Lecture 1: Intro, Ethics, & Overview:
This lecture covers the course Intro, syllabus review, distinction between hacking vs. penetration testing, ethics discussion, course motivation, threat models and some of the basics.
Resources:0x200 up to 0x260 (HAOE)
Lecture 2: Secure C Coding 101:
What you absolutely need to know about secure coding in C. C is everywhere.
Resources:Week 2 (Secure C / Code Auditing):
Lecture 3: Secure C Coding 102:
What you absolutely need to know about secure coding in C. C is everywhere.
Resources:0x280 up to 0x300 (HAOE) and 0x350 up to 0x400
Understanding Integer Overflow in C/C++
Integer Undefined Behaviors in Open Source Crypto Libraries
Lecture 4: Code Auditing:
Auditing C Code, basic tips / strategies / and exercises
Resources:Week 3 (Permissions Spectrum):
Holiday (No Class, Jan 20)
MLK Day Holiday
Lecture 5: The Permissions Spectrum:
Intro to Vulnerability Research topics and the Permissions spectrum.
Resources:Week 4 (Reverse Engineering Week):
Lecture 6: Reverse Engineering Workshop 1
Guest lecturer Mitch Adair will lead a two day RE workshop, exposing students to x86 reverse engineering with IDA and CFF Explorer. Meet in the lecture room prepared (See email).
Resources:
Lecture 7: Reverse Enginerring Workshop 2:
Guest lecturer Mitch Adair will lead a two day RE workshop, exposing students to x86 reverse engineering with IDA and CFF Explorer. Meet in the lecture room prepared (See email).
Week 5 (Fuzzing Week):
Lecture 8: Fuzzing Lecture 1
Week 6 (MIDTERM 1 and Exploit Development Week 1):
MIDTERM 1
Lecture 10: Fuzzing Lecture #2 and Exploitation Lecture 101:
PART 2:
Resources:
Week 6 (MIDTERM 1 and Exploit Development Week 1):
Lecture 11: Exploit Development 102
Resources:
Read 0x500 up to 0x540 in HAOE (Writing shellcode)
Read 0x6A0 up to 0x700 in HAOE
This class was cancelled (postponed to next week)
Week 7 (Exploit Development / Networking):
Lecture 12: Exploit Development 103
Resources:
Read 0x680 up to 0x6A0 in HAOE
Lecture 13: Networking Lecture 101:
This lecture covers an overview of networking concepts and network security concepts. Topics covered: Wireshark, Nmap, nc, Hubs vs switches vs routers, manufacturer default logins / backdoors... ARP & dns (dnssec), proxies, weak IP vs strong IP model (RFC 1122)
Resources:Read 0x400 up to 0x450 in HAOE.
Defcon 18 - How to hack millions of routers- Craig Heffner
Week 8 (Exploit Dev / Web Application Hacking/Security)
Lecture 14: Exploit Development 102
Resources:
Read 0x450 up to 0x500 in HAOE(27 pages)
Read 0x540 up through 0x550 in HAOE(11 pages)
Read Chapter 1 in WAHH (15 pages)
Lecture 15: Wireshark and Web Application Hacking/Security 101
[Video on Wireshark coming soon]
Resources:
Related Reading:
Week 10 (Web Applications):
Lecture 16: Web Application Hacking/Security 102
Resources:
Reading: Chapters 9 of WAHH
Advaned SQLi
Lecture 17: Web Application Hacking/Security 103
Resources:
Week 11 (Web Applications and Exploitation):
Lecture 18: Web Application Hacking/Security 104 and Exploitation 104
Resources:
Reading: Chapters 12 of WAHH
Chapter 0x550 in HAOE
Lecture 19: Midterm review #2 and Exploitation 105
ROP Lecture:
Resources:
Week 12 (ROP and Metasploit):
Lecture 21: Guest Lecturer Devin Cook on ROP and a brief history of exploitation
Resources:
ROPC part 2 blog post
Week 13 (MIDTERM #2 and Post Exploitation):
MIDTERM #2
Lecture 23: Meterpreter and Post Exploitation
Week 14 (Forensics and Incident Response):
Lecture 24: Volatility and Forensics
Resources:
Lecture 25: Revisiting Old Topics
Week 15 (Last Week: Physical Security and Social Engineering):
Lecture 26: Social Engineering
Lecture 27: Physical Security & Locks/Lockpicking
This work is licensed under a Creative Commons license.
