CS6035 Intro To Info Security
Lectures are optional. This course is projects based: 7 mandatory projects, 1 bonus projects. Overall, this is ha ands-on course. I practiced my skills across various topics about software securities.
Projects, score percentage and its spent time
Man in the Middle 13% - 11 hrs
In this project, we need to analyze the Wireshark captured network packages to do Internet Relay Chat(IRC) analysis, manually and programatically via PyShark , The traffic may involve TCP , DNS , HTTP , IRC, etc.
We may use CyberChef to decipher some code.
Database Security 13% - 12 hrs, 5 hrs review lectures
We will analyze SQL injection, Database, Spreadsheet information leak.
Malware Analysis 13% - 7.5 hrs
Here we analyze various malware reports: including:
- Data obfuscation
- Defense evasion
- Network indicators
- Host based indicators
- Malware family associations
- Data theft and exfiltration
- Persistence mechanisms
API Security 13% - 8 hrs
We will try to exploit REST API for information. The topics covered:
- Web-based RESTful http services
- JSON, XML and Yaml serialization formats
- Swagger
- Postman
- OAUTH based security protocols
- JWT security tokens
- CORS browser protection
Cryptography 16% - 13 hrs
Using Python to study cryptography and symmetric and asymmetric crypto algorithms.
Binary Exploitation 16% - 11 hrs
In this project, we’re using C Code to exploit C Memory handling with respect to Stack , Heap via pwndbg and GDB .
Background:
Binary and Hexadecimal Numbering Systems
Capture The Flag style competition
Log4Shell 16% - 7 hrs
We’re using JNDI/LDAP knowledge in Java and exploit via
https://github.gatech.edu/pages/cs6035-tools/cs6035-tools.github.io/Projects/Log4Shell/
[NIST CVE Overview ] [Randori: What is Log4Shell ]
Log4Shell Reference Materials
- General Project Introduction This is a general overview. Some details may change each semester (i.e., login credentials)
- LDAP server used to run the exploit.
- Log4JExploit Intro
- How Log4Shell Works
- Log4J Documentation
- Log4Shell Example
- Helpful Linux Networking Commands
- NCAT Command
- Java Unmarshaller Security
- A Journey From JNDI/LDAP Manipulation To RCE
- Hands on Introduction to Log4Shell exploit in general (not this project but helpful)
- If you have no experience in Java, Log4j/logging, RESTful applications, JNDI, LDAP, we STRONGLY encourage you to do research into the topics.
- A Real World Recent Example of This Exploit and Its Dangers
Machine Learning in Cybersecurity 2.5% - 0.5 hr
Learning Goals of this Project
- Learning Basic Pandas Dataframe Manipulations
- Learning more about Machine Learning (ML) Classification models and how they are used in a Cybersecurity Context.
- Learning about basic Data pipelines and Transformations
- Learning how to write and use Unit Tests when developing Python code