Personal tools

Security Lab SS2013

SWS: 4, ECTS: 8.0, Maximum number of participants: 14

Lecturer: Prof. Dr. Ulrike Meyer

Teaching Assistant: Johannes Gilger, AndrĂ© EgnersDominik Teubert

Student Assistants: Florian Kerber


Registration for the Lab is only possible online via the central registration page.

Submitting a solution to the entry challenge at the end of this page increases your chance of getting one of the highly sought-after spots in the lab.

Important dates 

  • Bi-weekly exercises
  • Weekly meetings
    • Tuesday, 2-5 pm
    • Room 205 on the second floor in the UMIC Building, Mies-van-der-Rohe Strasse 15
  • First Meeting: Tuesday, 09.04.2013, 2-5 pm 


  • Basic IT-security knowledge (e.g. have attended the IT-Security lecture, the Security in Mobile Communications lecture, or the SVS lecture).
  • Basic Linux (command-line) skills.
  • At least decent or advanced programming skills in one programming language.
  • Decent knowledge of networking (TCP/IP).


We will discuss the following topics and implement various practical attacks in those application fields.

  • Wireless technologies in practice, e.g. session hijacking, WEP hacking...
  • Network traffic analysis, e.g. analysis of authentication protocols, sniffing...
  • Security countermeasures, e.g. reactive security, system analysis...
  • Attacks against cryptography, e.g. key recovery in cryptographic ciphers, factorization attacks...
  • Web application security, e.g. cross-site scripting, wargames...
  • Code analysis, e.g. java byte code analysis, reverse engineering...
  • Malware analysis, e.g. analysis of botnet samples and rootkits
  • Android security, e.g. analysis of mobile malware and forensic data analysis

You have to solve common tasks every two weeks and work on it in the lab or at home. Each participant has to introduce a special part of a selected topic in a short 30 minute lecture. Be prepared to spend some time in the lab. At the end of the semester you can test your skills in a CTF-like event.

First Challenge

Here is a first challenge that you can solve in order to increase your chances of getting a spot in the Security Lab. This is not mandatory but will show us that you are interested in the topic and willing to devote some time to the course.

Find out as much as you can about this photo and its content.
There might be more than one layer, so you will have to dig a little deeper....


Submit what you may be able to find to

The deadline for submitting your solutions is Wednesday, January 30!

Make sure to tell us

  • How you approached the problem.
  • What you found in each step.
  • Why you pursued or didn't pursue any particular avenue.

Have fun!