Security Lab 2014
SWS: 4, ECTS: 8.0, Maximum number of participants: 14
Lecturer: Prof. Dr. Ulrike Meyer
Student Assistants: Florian Kerber, Felix Glaser
Registration for the Lab is only possible online via the central registration page.
Submitting a solution to the entry challenge significantly increases your chance of getting one of the highly sought-after spots in the lab.
- Bi-weekly exercises
- Weekly meetings
- Tuesday, 2-5 pm
- Room 205 on the second floor in the UMIC Building, Mies-van-der-Rohe Strasse 15
- Basic IT-security knowledge (e.g. have attended the IT-Security lecture, the Security in Mobile Communications lecture, or the SVS lecture).
- Basic Linux (command-line) skills.
- At least decent or advanced programming skills in one programming language.
- Decent knowledge of networking (TCP/IP).
We will discuss the following topics and implement various practical attacks in those application fields.
- Wireless technologies in practice, e.g. session hijacking, WEP hacking...
- Network traffic analysis, e.g. analysis of authentication protocols, sniffing...
- Security countermeasures, e.g. reactive security, system analysis...
- Attacks against cryptography, e.g. key recovery in cryptographic ciphers, factorization attacks...
- Web application security, e.g. cross-site scripting, wargames...
- Code analysis, e.g. java byte code analysis, reverse engineering...
- Malware analysis, e.g. analysis of botnet samples and rootkits
- Android security, e.g. analysis of mobile malware and forensic data analysis
You have to solve common tasks every two weeks and work on it in the lab or at home. Each participant has to introduce a special part of a selected topic in a short 30 minute lecture. Be prepared to spend some time in the lab. At the end of the semester you can test your skills in a CTF-like event.
Here is a first challenge that you can solve in order to significantly increase your chances of getting a spot in the Security Lab. This is not mandatory but will show us that you are interested in the topic and willing to devote some time to the course.
Find out as much as you can about this photo and its content.
There might be more than one layer, so you will have to dig a little deeper....
Submit what you may be able to find to firstname.lastname@example.org
The deadline for submitting your solutions is Monday, January 27!
Make sure to tell us
- How you approached the problem.
- What you found in each step.
- Why you pursued or didn't pursue any particular avenue.