Software Security | ||||
Linux Security Basics | Video-A:01 | Slides | Problems | -- |
Set-UID Programs | Video-A:02 | Slides | Problems | Lab |
Environment Variables and Attacks | Video-A:02 | Slides | Problems | Lab |
Buffer Overflow Attack | Video-A:04 | Slides | Problems | Lab1, Lab2 |
Return-to-libc Attack and ROP | Video-A:05 | Slides | Problems | Lab |
Format String Vulnerability | Video-A:09 | Slides | Problems | Lab |
Race Condition Vulnerability | Video-A:06 | Slides | Problems | Lab |
Dirty COW | Video-A:07 | Slides | Problems | Lab |
Shellcode | Video-A:04 | Slides | Problems | Lab |
Web Security | ||||
Web Security Basics | Video-C:01 | Slides | Problems | -- |
Cross-Site Request Forgery Attack | Video-C:02 | Slides | Problems | Lab |
Cross-Site Scripting Attack | Video-C:03 | Slides | Problems | Lab |
SQL Injection Attack | Video-C:04 | Slides | Problems | Lab |
Clickjacking Attack | Video-C:05 | Slides | Problems | Lab |
Shellshock Attack | Video-A:03 | Slides | Problems | Lab |
Hardware Security | ||||
Meltdown Attack | Video-A:08 | Slides | Problems | Lab |
Spectre Attack | Video-A:08 | Slides | Problems | Lab |
Network Security | ||||
Network Security Basics | Video-B:01 | Slides | Problems | Lab |
MAC Layer and Attacks | Video-B:03 | Slides | Problems | Lab |
IP Layer and Attacks | Video-B:04 | Slides | Problems | Lab |
Packet Sniffing & Spoofing | Video-B:02 | Slides | Problems | Lab |
UDP and Attacks | Video-B:05 | Slides | Problems | -- |
TCP and Attacks | Video-B:06 | Slides | Problems | Lab1, Lab2 |
Firewall | Video-B:09 | Slides | Problems | Lab |
Virtual Private Network | Video-B:08 | Slides | Problems | Lab1, Lab2 |
Tunneling and Firewall Evasion | -- | Slides | Problems | Lab |
DNS and Attacks | Video-B:07 | Slides | Problems | Lab1, Lab2, Lab3, Lab4 |
DNSSEC | -- | Slides | -- | Lab |
BGP and Attacks | Video-B:10 | Slides | Problems | Lab |
The Heartbleed Bug and Attack | Video-B:11 | Slides | Problems | Lab |
Reverse Shell | Video-B:06 | Slides | Problems | - |
Morris Worm (a future chapter) | Video | -- | -- | Lab |
Cryptography | ||||
Secret-Key Encryption | Video-D:02 | Slides | Problems | Lab |
One-Way Hash Function | Video-D:03 | Slides | Problems | Lab1, Lab2 |
Public Key Cryptography | Video-D:04 | Slides | Problems | Lab |
PKI: Public Key Infrastructure | Video-D:05 | Slides | Problems | Lab |
TLS: Transport Layer Security | Video-D:06 | Slides | Problems | Lab |
Bitcoin and Blockchain | Video-D:07 | Slides | Problems | - |
Ethereum Blockchain (a future chapter) | -- | -- | -- | Lab |
Note to instructors: solutions to the problems will only be given to the instructors who have adopted the book as a required text (any version and any edition) in their courses. You can use your course syllabus as a proof.