Sumários

Firewalls

19 Outubro 2015, 10:30 Naercio David Pedro Magaia

Configure a firewall using the iptables and fwbuilder applications.


Cryptography (continued)

15 Outubro 2015, 11:00 Miguel Filipe Leitão Pardal

Block cipher modes: ciphertext stealing.

Meet-in-the-middle attack on multiple encryption.

Hash functions.

Birthday attack on hash functions.

Message authentication code (MAC) and digital signatures.

RSA computations overview and example.


Traffic analysis and TCP/IP Vulnerabilities

12 Outubro 2015, 15:00 Naercio David Pedro Magaia

  • Gather information about the machines in the network.
  • Explore some of the vulnerabilities of TCP / IP.
  • Learn about tcpdump, Ethereal (Wireshark), nmap, nemesis and nessus tools.


Cryptography

12 Outubro 2015, 12:00 Miguel Filipe Leitão Pardal

Cryptography terminology

Modern cipher types

Symmetrical ciphers: block and stream

Asymmetrical ciphers

Block cipher modes


Traffic analysis and TCP/IP Vulnerabilities

12 Outubro 2015, 10:30 Naercio David Pedro Magaia

  • Gather information about the machines in the network.
  • Explore some of the vulnerabilities of TCP / IP.
  • Learn about tcpdump, Ethereal (Wireshark), nmap, nemesis and nessus tools.