Abstract Within this lab it continues to build upon the previous labs, and this week we discuss...
Abstract Securing a computer can be a daunting task. To aid in hardening a computer, there are...
Abstract The purpose of this exercise is to discover usable attack methods by reverse engineering security documents....
Abstract Based on all of the literature provided in previous labs, performing a penetration test is all...
Abstract This lab will allow us to gain an understanding of the reverse engineering process. In this...
It looks like the Department of Defense (DOD) is going to create a cyber warfare command that...
Seeing this meme roll through the Web 2.0 sphere as shocked and horrified stories of adult children...
How do you wage cyber warfare? How do you make a world wide reach? What does it...
Abstract The focus of this lab is security vulnerabilities. Specifically, how do system administrators know that there...
Abstract In lab four, this group is researching vulnerabilities and exploits. In this lab the group learns...
Abstract The purpose of this exercise is to evaluate the concept of a security ‘exploit,’ both by...
Abstract In this lab we will be researching exploits and testing to see if they actually work...
ABSTRACT This lab will build on the research and findings from the previous labs. This lab will...
Want to put a deep crimp in cyber warfare capability of foreign nations? Do you have a...