Winter 2019

Introduction to Hacking:

Exploitation and Protection of Systems and Software

00000000 ef bb bf 45 43 45 20 39 36 30 39 62 20 2f 20 39 |...ECE 9609b / 9| 00000010 30 36 39 62 0a 57 69 6e 74 65 72 20 32 30 31 36 |069b.Winter 2017| 00000020 0a 49 6e 74 72 6f 64 75 63 74 69 6f 6e 20 74 6f |.Introduction to| 00000030 20 48 61 63 6b 69 6e 67 0a 00 00 00 00 00 00 00 | Hacking........|

Overview

It is difficult to read the news today without encountering a story about a new security vulnerability. Have you ever wondered how these vulnerabilities come about, and how they are discovered and exploited?

This course will introduce you to basic concepts and techniques used in the exploitation of systems and software (i.e., hacking). From activists to cyber criminals to national security agencies, hackers are an inescapable reality of the information age. The goal of this course is, as the saying goes, to know your enemy so that you might defend yourself against them.

Announcements

Mar 2
Assignment 2 is available. Download the Assignment 2 virtual machine under the Resources tab in OWL and then take the Assignment 2 quiz in the Tests and Quizzes tab.
Jan 14th
Assignment 1 is available in OWL under the "Tests and Quizzes" tab.
Jan 14th
Congratulations to the top scoring teams of the Pico CTF.
  1. First place: Wayne with 1685 points
  2. Second place: vatsalshah2210 with 1500 points
  3. Third place: chuckz1321 with 1385 points
  4. Fourth place: MH1234 with 1300 points
  5. Honourable mentions: deadpool, Vlad, cyber123, b4hk, hellohi, rough_edge, wan2609, TheTardis, Raja, SrujanaB, ykaranam
Jan 13th
Winter 2019 site is available