??????? The Attack and Defense of Computers PowerPoint PPT Presentation

presentation player overlay
1 / 5
About This Presentation
Transcript and Presenter's Notes

Title: ??????? The Attack and Defense of Computers


1
??????? The Attack and Defense of Computers
  • CE6107
  • ???

2
Reference Books
  • Hacking Exposed, Fifth Edition
  • Authors Stuart McClure, Joel Scambray, and
    George Kurtz
  • Publisher Mc Graw Hill
  • Practical Unix Internet Security, 3rd Edition
  • Authors Simson Garfinkel and Gene Spafford
  • Publisher O Reilly

3
Contents
  • Footprinting
  • Scanning
  • Enumeration
  • Port-Scanning
  • OS fingerprinting.
  • Hacking Unix
  • Buffer Overflow Attacks/Return Into Libc Attacks
  • Internet Worm
  • Format String Attacks
  • Input Validation Attacks
  • Integer Overflow and Integer Sign Attacks
  • TCP session Hijackng
  • Denial of Service Attacks/Distributed DoS
  • Malware Virus, Trojan Horse, Spyware, Rootkit,
    Dialer, Key logger
  • Cross Site Script (XSS)
  • SQL Injection

4
Important Security Conferences
  • http//www.cl.cam.ac.uk/Research/Security/conferen
    ces/all.html
  • IEEE Symposium on Security and Privacy
  • USENIX Security Symposium ACM Conference on
    Computer and Communications Security (CCS)
  • International Symposium on Recent Advances in
    Intrusion Detection (RAID)
  • Sigcomm (http//www.acm.org/sigs/sigcomm/)
  • Infocom (http//www.ieee-infocom.org/)
  • ICDCS
  • ACSAC

5
Grading
  • Final 40
  • Assignment 55
  • Attendance 5
Write a Comment
User Comments (0)
About PowerShow.com