School / Prep
ENSEIRB-MATMECA
Internal code
EIN9-RESA3
Description
This course introduces the concepts needed to understand system security. It is completed by an introduction to physical security (opening doors, padlocks and locks).
Teaching hours
- CIIntegrated Courses48h
Syllabus
Introduction to reverse engineering
Introduction
Static analysis: First steps, Information retrieval, Code representation
Result: Function analysis, Data flow tracking, Bonus
Principles of vulnerability exploitation
Introduction: Rules of the game, Cryptographic vulnerabilities, Logical vulnerabilities, String manipulation
Attacks: Injections, Memory corruption, Secure programming
OS hardening: The administrator's part, Protections
Linux system security
Introduction to system security: General, Legal aspects, Basic concepts, Hardware security
System security: Authentication, Authorization, Auditing
Containers and virtualization under Linux
Context: What do we want to protect against? Protection mechanisms
Containers vs. Virtualization: Definitions, Virtualization:
full emulation
software-level emulation (type 2)
host-level emulation (type 1)
Virtual hard disks
Vulnerability example
Containers
First step: chroot()
Advanced Linux kernel mechanisms
Sandbox
LXC, LibContainer and Docker
Vulnerability example
Applications: Malware, Provisioning, Containers, Development support, Cloud, Virtualization API: LibVirt, Compartmentalization,
Enhanced access control: MAC, Security policy models, Most common : SELinux and AppArmor, The rebel: grsecurity
Windows system security
General security principles: The 3 "A "s, Internal structure, Accounts and groups, Control and access
System security mechanisms: System architecture, Authentication, Security strategies, File system, Registry, Tools
Network security mechanisms: Active Directory, File sharing, IPSec under Windows, Firewall
Application security: Prevention of overflow attacks
Execution prevention (DEP/NX)
Exception control
PatchGuard
Other mechanisms
Software restriction strategies
Boot security
Principle of sandboxing (browsers)
Malware extraction and analysis: from forensics to reverse
Malware "ecosystem": Who are the attackers? Definitions, Exploitation As A Service: Exploit Kits, Defenders, Monetization
Forensics: Malware extraction, Objectives, Network forensics, System forensics, Application forensics
Malware analysis: Analysis basics, Automation tools, Handheld analysis, Packers, Obfuscation
Physical security.
Assessment of knowledge
Initial assessment / Main session - Tests
Type of assessment | Type of test | Duration (in minutes) | Number of tests | Test coefficient | Eliminatory mark in the test | Remarks |
---|---|---|---|---|---|---|
Final inspection | Written | 80 | 1 | |||
Project | Defense | 0.5 | ||||
Project | Report | 0.5 |
Second chance / Catch-up session - Tests
Type of assessment | Type of test | Duration (in minutes) | Number of tests | Test coefficient | Eliminatory mark in the test | Remarks |
---|---|---|---|---|---|---|
Project | Report | 1 |