||- Attacking web applications
* Request forgery
* Cookie tampering
* HTML tampering
* Session-Surfing / Hijacking
- Attacking compiled programmes
* Buffer overflow
+ Stack Overflow
+ Heap overflow
+ Heap spraying
- More general attacks
* Random number generators
* Race Conditions
||- Koziol et al., The Shellcoder's Handbook, Wiley, 2004
- Erickson, Forbidden Code, mitp, 2004
- Hoglund, McGraw, Explointing Software, Addison Wesly, 2003
||In this lecture participants will learn how software (in)securities are exploited and how to prevent their exploitation.
By analysing typical security issues of both web applications and desktop applications, participants will be able to utilise security issues in modern programmes to leverage functionality not intended by the original programmer.
The course is thought as blended learning, with theoretical background being covered via Moodle as an elearning course, whereas the practical aspects will be thought in labs in real life.
The course is thought in English.
||To participate in this course, a bachelor of computer science is a requirement.
To take full advantage of this course, programming skills in C, Assembler and a scripting language such as PHP are useful, as well as an understanding of SQL and the Bash.
Most of the Assembler, C and PHP needed in this course are however easy to understand and should probably be self explanatory to anyone with programming skills.