Personal tools

Security Lab 2016

Type: Pratical Project Seminar

SWS: 4

ECTS: 8.0

Maximum number of participants: 14

Schedule Type: weekly meetings

Area: Data and Information Management

Lecturer: Prof. Dr. Ulrike Meyer

Teaching Assistant: Dominik Teubert, Florian Kerber

Registration

Registration for the Lab is only possible online via the central registration page.

Entry Challenge

Submitting a solution to the entry challenge significantly increases your chance of getting one of the highly sought-after spots in the lab.

Important dates 

  • Bi-weekly exercises
  • Weekly meetings
    • Room 205 on the second floor in the UMIC Building, Mies-van-der-Rohe Strasse 15

Requirements  

  • Basic IT-security knowledge (e.g. have attended the IT-Security lecture, the Security in Mobile Communications lecture, or the SVS lecture).
  • Basic Linux (command-line) skills.
  • At least decent or advanced programming skills in one programming language.
  • Decent knowledge of networking (TCP/IP).

Topics

We will discuss the following topics and implement various practical attacks in those application fields.

  • Wireless technologies in practice, e.g. session hijacking, WEP/WPA/WPA2 hacking...
  • Network traffic analysis, e.g. analysis of authentication protocols, sniffing...
  • Security countermeasures, e.g. reactive security, system analysis...
  • Attacks against cryptography, e.g. key recovery in cryptographic ciphers, factorization attacks...
  • Web application security, e.g. cross-site scripting, wargames...
  • Code analysis, e.g. java byte code analysis, reverse engineering...
  • Malware analysis, e.g. analysis of botnet samples and rootkits
  • Android security, e.g. analysis of mobile malware and forensic data analysis

You have to solve common tasks every two weeks and work on it in the lab or at home. Each participant has to introduce a special part of a selected topic in a short 30 minute lecture. Be prepared to spend some time in the lab. 

Challenge

Here is a first challenge that you can solve in order to significantly increase your chances of getting a spot in the Security Lab. This is not mandatory but will show us that you are interested in the topic and willing to devote some time to the course.

Task
Find out as much as you can about this document and its content.
There might be more than one layer, so you will have to dig a little deeper....

Submit what you may be able to find to seclab-orga@itsec.rwth-aachen.de

The deadline for submitting your solutions is Wednesday, January 27!

Make sure to tell us

  • How you approached the problem.
  • What you found in each step.
  • Why you pursued or didn't pursue any particular avenue.

Have fun!