Saturday 5 November 2011

Week8

Security Randomness

DLL Preloading AKA DLL Hijacking, we talked about the steps on how to do an exploit:

-Create 'Evil Twin' of DLL
-Place DLL with binary
-Execute binary

Could load from a remote location (WebDav, SMB Share), but microsoft released KB2264107 which prevents DLLs from loading from remote locations

We also looked at a very useful tool called Firesheep. Its a firefox extension SideJacking, Harvests credentials for twitter, google, facebook, flickr.

Also talked about Pass-the-Hash.

Sunday 30 October 2011

Week6

loooooong Lecture... but very interesting..

We did a live example on how to use Immunity debugger for the lab on how to find g1 and g2...

Also how to use and interpret Process Monitor, a very useful tool specially when analyzing malware.

Week7

Web Application Security

We talked about how webpages changed from static to more dynamic, how desktop apps are able to run on web like google apps for example and how this impact in security. More apps, more codes that need to be run, which means more vulnerability and of course, exploits.

We also covered Cross Site Scripting (XSS) the ability to inject JavaScript into a page and also SQL Injection (BAD).

Also we had a very interesting discussion about how important is web security and should be worry.