Winter 2018

Introduction to Hacking:

Exploitation and Protection of Systems and Software

00000000 ef bb bf 45 43 45 20 39 36 30 39 62 20 2f 20 39 |...ECE 9609b / 9| 00000010 30 36 39 62 0a 57 69 6e 74 65 72 20 32 30 31 36 |069b.Winter 2017| 00000020 0a 49 6e 74 72 6f 64 75 63 74 69 6f 6e 20 74 6f |.Introduction to| 00000030 20 48 61 63 6b 69 6e 67 0a 00 00 00 00 00 00 00 | Hacking........|

Overview

It is difficult to read the news today without encountering a story about a new security vulnerability. Have you ever wondered how these vulnerabilities come about, and how they are discovered and exploited?

This course will introduce you to basic concepts and techniques used in the exploitation of systems and software (i.e., hacking). From activists to cyber criminals to national security agencies, hackers are an inescapable reality of the information age. The goal of this course is, as the saying goes, to know your enemy so that you might defend yourself against them.

Announcements

Mar 7th
Assignment 3 VM is available in OWL and is due Friday, March 30th. Assignment 3 notes and resources are available here.
Feb 21st
Tool/method presentation schedule is now available
Feb 8th
Presentations for tool/method case study can be made in groups of 1 or 2. Please email me your name(s), intended topic, and preferred presentation date by 10:00am on Friday Feb. 16th
Feb 8th
Assignment 2 is available in OWL
Jan 26th
Assignment 1 is available in OWL
Dec 28
First lecture will be held on Friday January 12th, 2018