Lab activities
The topics of labs in future weeks are subject to adjustment
until the instructions are linked here, but the topics are
generally indicative of what is coming up.
- Lab 1 (1/27) (web page), (PDF): Virtual machine usage
- Lab 2 (2/3) (web page), (PDF): Command-line usage
- Lab 3 (2/10) (web page), (PDF): Stack smashing
- Lab 4 (2/17) (web page), (PDF): Pass-thru (shell code injection) attacks
- Lab 5 (2/24) (web page), (PDF): Password guessing
- Lab 6 (3/3) (web page), (PDF): Docker containers
- Lab 7 (3/17) (web page), (PDF): Capturing network traffic
- Lab 8 (3/24) (web page), (PDF): Network scanning
- Lab 9 (3/31) (web page), (PDF): Network intrusion detection
- Lab 10 (4/7) (web page), (PDF): Middleperson proxy
- Lab 11 (4/14) (web page), (PDF): Command-line encryption
- Lab 12 (4/21) (web page), (PDF): SQL injection
- Lab 13 (4/28) (web page), (PDF): Cross-site scripting
- Lab 14 (5/5) (web page), (PDF): Replay attack