Differences between revisions 13 and 14
Revision 13 as of 2013-09-04 13:18:14
Size: 5397
Editor: scot
Comment:
Revision 14 as of 2013-09-04 13:18:39
Size: 5401
Editor: scot
Comment:
Deletions are marked like this. Additions are marked like this.
Line 15: Line 15:
=== Presenting Peer-Reviewed Papers === Presenting Peer-Reviewed Papers ===

CPTR 541

This page provides hints, insights and direction for the graduate class in Network Security. As a graduate class I am not interested in just teaching you how to use tools to exploit systems. I also want you to be able to research new methods to exploit and protect systems. Consequently you will find a balance between learning about tools and known techniques and pushing the boundary to extend those techniques and create new tools for exploits and defense. Because of this, research is a big part of this class. As we look at existing tools, we'll discuss what it does, how it works, and how to extend the functionality and research possibilities related to what we are learning.

Research Resources

When doing research it helps to know where to look. Dr. Gu does a nice job of rating security conferences that you might want to research from. IEEE S & P and ACM's Conference on Computer and Communications Security top the list and are good candidates to watch.

Research Assignment

Presenting Peer-Reviewed Papers

You will be required to find and present peer-reviewed papers in this class. One presentation must introduce a new attack or attack technique. One presentation must deal with privacy issues inside the US. The other papers are up to you.

Writing your own Research Paper

  1. Your first paper should be a survey paper that analyzes current and historically significant research of your particular topic and makes recommendations about use. I would suggest some aspect of hacking, such as code-security analysis techniques and tools for various languages.
  2. Your second paper should be an implementation of a previously un-implemented idea or extension/application of some area you found interesting in your first paper.

Ideas:

  • You might implement a method of attach to provide new proof of concept code
  • Research specific activities related to personal privacy compromised by companies or governments that may be illegal in other countries or protected by the US constitution
  • Vulnerability monitoring system based on OSVDB and nvd.nist.gov – Create a system that monitors installed list of programs and alerts to new vulnerabilities listed in the above databases. This may be used as a tool to attack or defend systems.

Homework Assignments

  1. Research:
    1. Use peer reviewed articles in ACM/IEEE etc., to find the conditions necessary to "more easily" attack the RSA algorithm. What known attacks exist against RSA?
    2. Determine if there exists known attacks against AES. Do we consider AES to be secure?
    3. What attacks exist against hash algorithms? What algorithms are not considered secure?
  2. Install Backtrack on your system. Let me know if you need a virtual machine for this. Write a planning and scope document that covers the issues from Chapter 1. Make sure to cover all your bases for this document. You may collaborate to write this document as a class. The target is brain2.scotnpatti.com (this server)
  3. Use the techniques covered in Chapter 2 to
    1. RECON both cs.southern.edu and scotnpatti.com - make sure you follow the ROE agreed upon in the previous assignment.
    2. Find a willing personal target and profile that person to discover what you can about them online.
  4. Using the enumeration techniques from Chapter 3
    1. Enumerate the machine targets available for exploitation and any information collected.
    2. Enumerate separately any network hardware available for exploitation.
    3. Be ready to discuss enumeration avoidance techniques
  5. Exploit something from the allowed target list in our pentest plan and bring proof of your exploit. What remediation is needed.
  6. Your goal this week is to attack OwnCloud - successfully if possible. I will specify a server for you to attack.

  7. Think of an tool to solve a common problem, something that would be useful to an administrator and write a vulnerable tool. Show how to exploit it using one of the automated techniques from the chapter.
  8. Write a report for your client on what you found. I will ask what tools you used for reporting, and proof that you were able to break into systems. If you have questions, I will give you time to ask in class.
  9. To date you should have been able to find some sort of way into the cs domain and perhaps created your own administrator account, stolen files, or changed web pages. You must now fix what you broke, changed or pilfered, and then try to Cover your tracks.
  10. Give a detailed penetration test report of vulnerabilities found, exploits performed, proof of exploits and remediation recommendations etc.

Common Vocabulary and Acronyms

  • ROE = Rules of Engagement
  • [We'll add more as the semester progresses]

OffensiveSecurity (last edited 2021-08-18 23:18:29 by scot)