Presentation is loading. Please wait.

Presentation is loading. Please wait.

電腦攻擊與防禦 The Attack and Defense of Computers CE6107許富皓.

Similar presentations


Presentation on theme: "電腦攻擊與防禦 The Attack and Defense of Computers CE6107許富皓."— Presentation transcript:

1 電腦攻擊與防禦 The Attack and Defense of Computers CE6107許富皓

2 Reference Books Hacking Exposed, Fifth Edition Hacking Exposed, Fifth Edition –Authors: Stuart McClure, Joel Scambray, and George Kurtz –Publisher: Mc Graw Hill Practical Unix & Internet Security, 3rd Edition Practical Unix & Internet Security, 3rd Edition –Authors: Simson Garfinkel and Gene Spafford –Publisher: O Reilly

3 Contents: Footprinting Footprinting Scanning Scanning Enumeration Enumeration Port-Scanning Port-Scanning OS fingerprinting. OS fingerprinting. Hacking Unix Hacking Unix Buffer Overflow Attacks/Return Into Libc Attacks Buffer Overflow Attacks/Return Into Libc Attacks Internet Worm Internet Worm Format String Attacks Format String Attacks Input Validation Attacks Input Validation Attacks Integer Overflow and Integer Sign Attacks Integer Overflow and Integer Sign Attacks TCP session Hijackng TCP session Hijackng Denial of Service Attacks/Distributed DoS Denial of Service Attacks/Distributed DoS Malware: Virus, Trojan Horse, Spyware, Rootkit, Dialer, Key logger Malware: Virus, Trojan Horse, Spyware, Rootkit, Dialer, Key logger Cross Site Script (XSS) Cross Site Script (XSS) SQL Injection SQL Injection

4 Important Security ConferencesImportant Security Conferences: Important Security Conferences

5 Grading: Midterm 30% Midterm 30% Final 35% Final 35% Assignment 30% Assignment 30% Attendance: 5% Attendance: 5%


Download ppt "電腦攻擊與防禦 The Attack and Defense of Computers CE6107許富皓."

Similar presentations


Ads by Google