Abstract The purpose of this exercise is to discover usable attack methods by reverse engineering security documents....
Abstract Based on all of the literature provided in previous labs, performing a penetration test is all...
Abstract This lab will allow us to gain an understanding of the reverse engineering process. In this...
It looks like the Department of Defense (DOD) is going to create a cyber warfare command that...
Seeing this meme roll through the Web 2.0 sphere as shocked and horrified stories of adult children...
How do you wage cyber warfare? How do you make a world wide reach? What does it...
Abstract The focus of this lab is security vulnerabilities. Specifically, how do system administrators know that there...
Abstract In lab four, this group is researching vulnerabilities and exploits. In this lab the group learns...
Abstract The purpose of this exercise is to evaluate the concept of a security ‘exploit,’ both by...
Abstract In this lab we will be researching exploits and testing to see if they actually work...
ABSTRACT This lab will build on the research and findings from the previous labs. This lab will...
Want to put a deep crimp in cyber warfare capability of foreign nations? Do you have a...
With this ten part series I wanted to get some ideas down and hopefully start some discussion....