"Räuber und Gendarm" (CTF-Szenarien) (Sommersemester 2010)
Dozent:
Prof. Dr. Christoph Meinel
(Internet-Technologien und -Systeme)
,
Dr. Feng Cheng
(Internet-Technologien und -Systeme)
Tutoren:
Christian Willems
Allgemeine Information
- Semesterwochenstunden: 4
- ECTS: 6
- Benotet:
Ja
- Einschreibefrist: 30.04.2010
- Lehrform:
- Belegungsart: Wahlpflichtmodul
Studiengänge
- IT-Systems Engineering BA
Beschreibung
This experimental project seminar is about advanced techniques in practical system and networking security.
We will have two teams defeating each other or the tutoring team within three challenges - with changing roles either as an attacker or defender of a target IT system.
For each challenge, the teams will have 4 weeks to prepare their arms: setting up a secure system (under given constraints) for the defenders, choosing and testing recon and penetration tools for the attackers. After preparation, the teams will fight out a supervised Capture-the-Flag contest.
Topics for the challenges:
- Network Security
- Web- and Application Security
- The whole bunch
Important Notice: We are NOT guiding you for hacking and participation in this seminar could NOT be an excuse for any kinds of your malicious actions towards unauthorized resources over Internet!!!
Voraussetzungen
Good knowledge in
- networking technologies (TCP/IP stack, ...)
- operating systems (memory management, ...)
Very good knowledge in security basics (i.e. lecture on Internet Security - Weaknesses and Targets)
This seminar has a limited number of participants! Up to 10 students can apply!
Literatur
- William R. Cheswick, Steven M. Bellovin, “Firewalls and Internet Security”, second Edition, Addison-Wesley, 2003.
- Andrew S. Tanenbaum, "Computer Networks", fourth edition, Prentice Hall PTR, 2003.
- Charlie Kaufman, Radia Perlman, and Mike Speciner. "Network Security: Private Communication in a Public World", second Edition, Prentice Hall PTR, 2002.
- Dafydd Stuttard, Marcus Pinto, "The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws", Wiley & Sons, 2007.
- Interesting Websites: Phrack Magazine,
Milw0rm, Metasploit, THC, openPGP, nmap, ...
Leistungserfassung
Team presentation after each challengeIndividual written report (<8 pages LNCS) from every student after every challenge: law and ethics in IT-Security, emerging security issues and techniques, as well as what they have done/learned from that phase
Intensive collaboration and discussion within the teams and challenges
Termine
(last update on 20.07.2010)
Zurück