School / Prep
ENSEIRB-MATMECA
Internal code
EI9RE351
Description
This course introduces the concepts needed to understand system security. It is completed by an introduction to physical security (opening doors, padlocks and locks).
Teaching hours
- CIIntegrated Courses15h
- PRACTICAL WORKPractical work25h
Syllabus
Introduction to reverse engineering
Introduction
Static analysis: First steps, Information retrieval, Code representation
Result: Function analysis, Data flow tracking, Bonus
Principles of vulnerability exploitation
Introduction: Rules of the game, Cryptographic vulnerabilities, Logical vulnerabilities, String manipulation
Attacks: Injections, Memory corruption, Secure programming
OS hardening: The administrator's part, Protections
Linux system security
Introduction to system security: General, Legal aspects, Basic concepts, Hardware security
System security: Authentication, Authorization, Auditing
Containers and virtualization under Linux
Context: What do we want to protect against? Protection mechanisms
Containers vs. Virtualization: Definitions, Virtualization:
full emulation
software-level emulation (type 2)
host-level emulation (type 1)
Virtual hard disks
Vulnerability example
Containers
First step: chroot()
Advanced Linux kernel mechanisms
Sandbox
LXC, LibContainer and Docker
Vulnerability example
Applications: Malware, Provisioning, Containers, Development support, Cloud, Virtualization API: LibVirt, Compartmentalization,
Enhanced access control: MAC, Security policy models, Most common : SELinux and AppArmor, The rebel: grsecurity
Windows system security
General security principles: The 3 "A "s, Internal structure, Accounts and groups, Control and access
System security mechanisms: System architecture, Authentication, Security strategies, File system, Registry, Tools
Network security mechanisms: Active Directory, File sharing, IPSec under Windows, Firewall
Application security: Prevention of overflow attacks
Execution prevention (DEP/NX)
Exception control
PatchGuard
Other mechanisms
Software restriction strategies
Boot security
Principle of sandboxing (browsers)
Malware extraction and analysis: from forensics to reverse
Malware "ecosystem": Who are the attackers? Definitions, Exploitation As A Service: Exploit Kits, Defenders, Monetization
Forensics: Malware extraction, Objectives, Network forensics, System forensics, Application forensics
Malware analysis: Analysis basics, Automation tools, Handheld analysis, Packers, Obfuscation
Physical security.
Assessment of knowledge
Initial assessment / Main session - Tests
Type of assessment | Type of test | Duration (in minutes) | Number of tests | Test coefficient | Eliminatory mark in the test | Remarks |
---|---|---|---|---|---|---|
Final inspection | Written | 80 | 1 | |||
Project | Defense | 0.5 | ||||
Project | Report | 0.5 |
Second chance / Catch-up session - Tests
Type of assessment | Type of test | Duration (in minutes) | Number of tests | Test coefficient | Eliminatory mark in the test | Remarks |
---|---|---|---|---|---|---|
Project | Report | 1 |