09.01.2013 Views

SESSION SECURITY AND ALLIED TECHNOLOGIES Chair(s) TBA

SESSION SECURITY AND ALLIED TECHNOLOGIES Chair(s) TBA

SESSION SECURITY AND ALLIED TECHNOLOGIES Chair(s) TBA

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

30 Int'l Conf. Security and Management | SAM'11 |<br />

Viruses and<br />

Worms<br />

Password<br />

Cracking<br />

• Learn computer<br />

viruses types<br />

and structure.<br />

• Program a simple<br />

virus.<br />

• Learn how does<br />

an anti virus<br />

work.<br />

• Program an anti<br />

virus for the<br />

previously<br />

created virus.<br />

• Differentiate<br />

between a<br />

computer virus<br />

and worm.<br />

• Learn how does a<br />

computer worm<br />

work using the<br />

famous<br />

“msblaster”<br />

worm example.<br />

• Learn password<br />

cracking<br />

techniques.<br />

• Learn how to<br />

attack Windows<br />

LM hash<br />

passwords<br />

using dictionary<br />

attack.<br />

• Learn how to<br />

attack Windows<br />

LM hash<br />

passwords<br />

using brute<br />

force attack.<br />

• Learn how to<br />

attack Windows<br />

LM hash<br />

passwords<br />

using hybrid<br />

attack.<br />

• Learn how to<br />

choose a strong<br />

password.<br />

- Borland C<br />

compiler<br />

- LCP<br />

password<br />

cracker.<br />

Buffer<br />

Overflow and<br />

Shell Coding<br />

• Buffer Overflow<br />

description and<br />

exploits.<br />

• Buffer Overflow<br />

programming<br />

tutorial<br />

(Practice).<br />

• Shell Coding in<br />

theory.<br />

• Shell Coding<br />

programming<br />

tutorial<br />

(Practice).<br />

• Take home<br />

exercise: Buffer<br />

Overflow<br />

exploit using<br />

Shell Coding<br />

Cryptography • Practice and learn<br />

Simple<br />

Encryption<br />

Using classic<br />

Caesar<br />

Algorithm<br />

• Practice and learn<br />

Alphabetic<br />

Substitution<br />

Encryption and<br />

Attack Using<br />

Language<br />

Analysis.<br />

• Practice and learn<br />

Data<br />

Encryption<br />

Standard<br />

“DES” and<br />

develop attacks<br />

on it.<br />

• Practice RSA<br />

Crypto systems.<br />

Borland C<br />

compiler or<br />

other<br />

IDA Pro<br />

CrypTool<br />

• Practice message<br />

signature<br />

generation.<br />

Table 1: Developed Labs, Objectives and Tools<br />

By the end of the class, the students are expected to have<br />

basic understanding of general issues in network security and<br />

the approaches that can be followed to resolve them.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!