Date
|
Subject
|
Resources
|
Week 1, Jan 19
|
Hacking Background. Course introduction, Core network and computing concepts (Networking, Command line utlities, File permissions, Programming languages, Web technologies)
|
|
Week 2, Jan 26
|
Cyber Ethics and Vulnerability Scoring.
|
|
Week 3, Feb 2nd
|
Hacking the Web.
|
|
Week 4, Feb 9th
|
Hacking Networks.
|
|
Week 5, Feb 16th
|
Hacking Systems.
|
-
File and OS permissions. Identity, access and privilege
-
Lecture 5: Phishing and Password hashing
-
Tutorial notes for the Passcode challenge
|
Week 6, Feb 23rd
|
Reading week. No class.
|
|
Week 7, March 1st
|
Hacking Software.
|
-
Program flow, stacks, buffer overflows, return-oriented programming, shellcode
-
Lecture 6: Buffer overflows
|
Week 8, Mar 8th
|
Presentations. 9069 Tool/Method case study presentations (Day 1). 9609 Research paper seminar (Day 1)
|
|
Week 9, Mar 15th
|
Presentations. 9069 Tool/Method case study presentations (Day 2). 9609 Research paper seminar (Day 2)
|
-
Presentation 1: Shodan Search Engine - Jiefang H.; Qiancheng H.; Xiaona M.
-
Presentation 2: TOR The Onion Router - Haoming Z., Peiwen Z., Aozhuo Z., Yiyang H., Xinyue L.
-
Presentation 3: Burp Suite - Xianghu D., Xutong L., Weixi S., Baitong W., Junhao H.
-
Presentation 4: Autopsy digital forensics tool. Xiaoyun H., En Y., Mathangi C., Prashansa A., Fatema H.
-
Presentation 5: Frida binary injection tool. Yao G., Zhijie Z., Xi H., Wang Z., Jiateng L.
-
Research paper 1: Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems. Finn H.
-
Research paper 2: Partitioning Ethereum without Eclipsing It. James Z.
|
Week 10, Mar 22nd
|
Presentations. 9069 Tool/Method case study presentations (Day 3). 9609 Research paper seminar (Day 3)
|
-
Presentation 1: O.MG Elite cable - Andrea A., Justin C., Liam F. Roman K.
-
Presentation 2: Mobile device and application security - Tiansheng H., Yeyang L., Wei W., Ruiqi Z., Zichen Z.
-
Presentation 3: Zed Attack Proxy (ZAP) - Reza M., Stephan D., Saeid A., Rishabh J.
-
Presentation 4: GNU project debugger. Syed H., Siddhartha K., Harshit K., Omar F.
-
Presentation 5: Data Loss Prevention. Yinglun S., Jian L., Yanhua Z., Zelin Z., Yujia Z.
|
Week 11, Mar 29
|
No class (Good Friday)
|
|
Week 11, April 5th
|
Presentations. 9069 Tool/Method case study presentations (Day 4). 9609 Research paper seminar (Day 4)
|
-
Presentation 1: SQL Injection Jimmy A., Clay C., Hadi S., Tristan H., Mohammed K.
-
Presentation 2: API hacking with Postman - Wangyang Y., Shuyi L., Yue H., Pinxuan Y., Jingyi W.
-
Presentation 3: OpenBSD PF packet filter. Haoxuan X., Ruiqing S., Haoran W.
-
Presentation 4: Wireshark network traffic analysis. Kaixin W., Kexun N., Haoxiang W.
-
Research paper: BotScreen: Trust Everybody, but Cut the Aimbots Yourself. Zakiya A.
-
Research paper: Pool-Party: Exploiting Browser Resource Pools for Web Tracking. Aalia H.
-
Research paper: Enabling Blockchain Services for IoE with Zk-Rollups. Aikam M.
|