COURSE OUTLINE
Session 5-6
Network vulnerabilities
Session 7-8
Client Side vuln
Session 10
Common attacks on block ciphers and hashes (based on matasano)
Labs extending the theme (CBC, CTR, length extension)
Session 9
Automated Tools
Session 11
PRNG misconceptions and attacks on PRNGs
Labs extending the theme (MT19937, DUAL EC DRBG, LCG)
Session 12
Asymmetric Cryptography attacks
Labs extending (attacks on RSA, DSA, EC)
Session 4
Mobile App Pentesting
Session 3
Web App Pentesting
Session 1
Recon Stage and Tools
Session 2
Web App Pentesting
Session 14
Volatility, yara, sleuth kit (tools)
Session 13
Incident Response first steps.
Dumping the memory, dumping the disks, first steps you can take to discover activity while the dumping process is completing
Session 15
CTF.Zone Workshop/Final exam