User Tools

Site Tools


labs

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
labs [2012/03/05 22:22] marklabs [2012/03/26 22:43] (current) mark
Line 67: Line 67:
  
 ====== Lab 06 ====== ====== Lab 06 ======
-The goal of the {{|Lab 06}} is to gain first-hand experience on different types of overflow vulnerabilities. Such vulnerabilities can be utilized by a malicious user to alter the flow control of the program, even execute arbitrary pieces of code. For instance, buffer overflow vulnerability arises due to the mixing of the storage for data (e.g. buffers) and the storage for controls (e.g. return addresses): an overflow in the data part can affect the flow of the program, because an overflow can change the return address and as a result enable execution of malicious code+The goal of the {{:lab06.pdf|Lab 06}} is to gain first-hand experience on different types of overflow vulnerabilities. Such vulnerabilities can be utilized by a malicious user to alter the flow control of the program, even execute arbitrary pieces of code. For instance, buffer overflow vulnerability arises due to the mixing of the storage for data (e.g. buffers) and the storage for controls (e.g. return addresses): an overflow in the data part can affect the flow of the program, because an overflow can change the return address and as a result enable execution of malicious code
  
 ===== Helpful material ===== ===== Helpful material =====
Line 74: Line 74:
     * **Lecture** {{:lab6.ppt|Slides}}        * **Lecture** {{:lab6.ppt|Slides}}   
  
-<html> <!--+
 ====== Lab 07 ====== ====== Lab 07 ======
  
 The goal of the {{:lab07.pdf|Lab 07}} is to study intrusion protection strategies, and gain hands-on experience with different types of protection methods, such as intrusion detection and prevention software (IDPS), The goal of the {{:lab07.pdf|Lab 07}} is to study intrusion protection strategies, and gain hands-on experience with different types of protection methods, such as intrusion detection and prevention software (IDPS),
 auditing, and honeypots auditing, and honeypots
 +
 ===== Helpful material ===== ===== Helpful material =====
     * **Tools**   [[wp>Snort_(software)|Snort]] [[http://www.honeyd.org/|honeyd]] [[http://www.honeyd.org/|honeyd]] [[http://labrea.sourceforge.net/labrea-info.html|labrea]]     * **Tools**   [[wp>Snort_(software)|Snort]] [[http://www.honeyd.org/|honeyd]] [[http://www.honeyd.org/|honeyd]] [[http://labrea.sourceforge.net/labrea-info.html|labrea]]
     * **Lecture** {{:lab7.ppt|Slides}}       * **Lecture** {{:lab7.ppt|Slides}}  
 +
 +
 ====== Game ====== ====== Game ======
  
-    * **Rules**     {{:game.ppt|Game}}  +    * **Rules**    {{:game.ppt|Game}}   
     * **Projects**       * **Projects**  
---> </html>+        * Team 1  {{:team1.zip|Project}} 
 +        * Team 2  {{:team2_client.tar|Client}} {{:team2_readme.pdf|Readme}} {{:team2_server.tar|Server}} 
 +        * Team 3  {{:team3_team_obfuscate_chat_application.zip|Application}} 
labs.1330986121.txt.gz · Last modified: 2012/03/05 22:22 by mark

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki