Sumários
Firewalls
19 outubro 2015, 10:30 • Naercio David Pedro Magaia
Configure a firewall using the iptables and fwbuilder applications.
Cryptography (continued)
15 outubro 2015, 11:00 • Miguel Filipe Leitão Pardal
Block cipher modes: ciphertext stealing.
Meet-in-the-middle attack on multiple encryption.
Hash functions.
Birthday attack on hash functions.
Message authentication code (MAC) and digital signatures.
RSA computations overview and example.
Traffic analysis and TCP/IP Vulnerabilities
12 outubro 2015, 15:00 • Naercio David Pedro Magaia
- Gather information about the machines in the network.
- Explore some of the vulnerabilities of TCP / IP.
- Learn about tcpdump, Ethereal (Wireshark), nmap, nemesis and nessus tools.
Cryptography
12 outubro 2015, 12:00 • Miguel Filipe Leitão Pardal
Cryptography terminology
Modern cipher types
Symmetrical ciphers: block and stream
Asymmetrical ciphers
Block cipher modes
Traffic analysis and TCP/IP Vulnerabilities
12 outubro 2015, 10:30 • Naercio David Pedro Magaia
- Gather information about the machines in the network.
- Explore some of the vulnerabilities of TCP / IP.
- Learn about tcpdump, Ethereal (Wireshark), nmap, nemesis and nessus tools.