Content for CSCI 476
- Threat Modeling
- Confidentiality, Integrity, Availability
- Set UID Programs
- Basic Linux Access Control
- fork(), exec(), system()
- Shellshock Attack
- Buffer Overflow
- return to libc
- Cross Site Scripting Attack
- TCP Flooding
- TCP Reset
- TCP Hijacking
- SQL Injection
- Block Ciphers: DES, AES
- Crypto operations: ECB, CBC, CFB, OFB, CTR
- Hashes
- Hash collisions
- Birthday Attack
- RSA
- Diffie-Hellman
- Digital Signatures
- Format Strings (maybe)
- Dirty cow (maybe)