Security Challenges

Objectifs pédagogiques

The goal of this course is to tackle different aspects of what computing security is by working on practical cases shaped as small challenges. The main idea is to provide a set of exercises that could be encountered in a daily job as a technical engineer. It also aims at putting the technical skills gained in other disciples into practice and to push the students to think outside the box and find solutions to various problems by themselves.

Description du cours

This course is mainly focused on practice. Students will be provided with different challenges on various topics that all require to research information about the inner working of a technology, attack vectors or ways to communicate with a component, before being able to succeed. The purpose is not to provide turnkey solutions to specific problems but to give entry points that could be used in multiple situations.

Mots-clés

Challenge, reverse engineering, pentest, cryptography, development, steganography, forensic.

Prérequis

This course will use knowledge built throughout the year (reverse engineering, pentesting, cryptography, etc.) but their mastery is not compulsory. The main skills that are required, however, is to be curious, tenacious and motivated.

Bibliographie

  • Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation, by Bruce Dang, Alexandre Gazet and Elias Bachaalany, 2014
  • Serious Cryptography: A Practical Introduction to Modern Encryption, by Jean-Philippe Aumasson, 2017
  • Modern Operating Systems (4th edition), by Andrew S. Tanenbaum, 2014
  • SSTIC Challenge Solutions
Ce site utilise des cookies afin d’améliorer votre expérience utilisateur et de réaliser des statistiques d’audience.
J'accepteJe refuseEn savoir plus