secenv.seclab.tuwien.ac.at
Standings
https://secenv.seclab.tuwien.ac.at/secenv/standings/index
Blue Rusty - 10 Points. Nina Sick Drunken Azimikhah - 8 Points. Stefan Stream Cryptic Prinz - 3 Points. Bernhard Kansis Anonymous Taufner - 2 Points. Christoph Trace Fire Seidl - 1 Points. Blue Rusty - Challenge ch2 - 10 days, 21:46:41. Nina Sick Drunken Azimikhah - Challenge ch2 - 10 days, 21:58:12. Blue Rusty - Challenge ch1 - 13 days, 5:31:45. Dynamic Beef - Challenge ch1 - 0:57:31 left. Thomas Psycho Elite Schmiedecker - Challenge ch1 - 1:27:16 left.
wombat-project.eu
Related web sites - FP7-ICT-216026-WOMBAT
http://www.wombat-project.eu/related-web-sites.html
Worldwide Observatory of Malicious Behaviors and Attack Threats. Results of the WOMBAT project have led to the creation or the enrichment of a number of various web services that will remain maintained by partners in the future. We list them here and we welcome you to pay them a visit. They all have something unique to offer that could benefit from. FIRE is a service to identify rogue networks and Internet Service Providers. On a daily basis, reports are generated on this site that expose the dark si...
sharcs-project.eu
SHARCS: Related Projects
http://www.sharcs-project.eu/related-projects
Secure Hardware-Software Architectures for Robust Computing Systems. NECOMA: Nippon-European Cyberdefense-Oriented Multilayer threat Analysis. NECOMA addresses the aspect of data collection. Leveraging past and current work on the topic with the goal to expand these existing mechanisms and orient them towards threat data analysis. Second, it addresses threat data analysis. Third, it aims to develop and demonstrate new cyberdefense mechanisms. That leverage these metrics for deployment and evaluation.
necoma-project.eu
BADGERS 2014: Home
http://www.necoma-project.eu/badgers-2014
BADGERS 2014 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security. September 11th, 2014, Wroclaw, Poland. Welcome to BADGERS 2014. The 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS 2014) will be held in Wroclaw, Poland, on September 11th, 2014. The workshop is collocated with the European Symposium on Research in Computer Security ( ESORICS 2014. And the US PREDICT. 2013-2014 BADGERS14 Orga...
red-book.eu
SysSec Red Book: Meet the Task Force
http://www.red-book.eu/task-force
Roadmap for Systems Security Research. Meet the Task Force. Systems and Network Security, Internet Systems and Monitoring. Http:/ www.ics.forth.gr/ markatos. Web Security, Binary and Malware Analysis. Http:/ www.s3.eurecom.fr/ balzarot. Http:/ www.cs.columbia.edu/ elathan. Information Security Group, Royal Holloway University of London. Systems security and malware analysis and detection. Http:/ www.isg.rhul.ac.uk/sullivan. Http:/ www.cs.columbia.edu/ mikepo. Http:/ www.few.vu.nl/ asia.
secenv.seclab.tuwien.ac.at
Machine Environment
https://secenv.seclab.tuwien.ac.at/secenv/default/environment
In the InetSec lab, we run Linux on a student server that is "safely" coupled off the Internet so that you can experiment with your tools. One InetSec box is remotely accessible for you through. Secenv.seclab.tuwien.ac.at (128.130.60.30). Via ssh. WAIT! The server is NOT. Running on the default ssh port. It is running on port 10001. If you want to ssh per hand under Linux, you have to do ssh secenv.seclab.tuwien.ac.at -p 10001. If you are using a Windows ssh client such as Putty. As host name and 10001.
secenv.seclab.tuwien.ac.at
Some Fun
https://secenv.seclab.tuwien.ac.at/secenv/default/ctf/ctf05
The UCSB Capture The Flag. Is a distributed, wide-area security exercise, whose goal is to test the security skills of students from both the attack and defense viewpoints. This year, the UCSB CTF took place on Friday the 9th of December, 2005. Because of the time difference, most of the TU team was in the "CTF" lab from about 16:00 in the afternoon, until 02:00(! In the morning. During this time, we managed to consume about 24 liters of Coke, 20 liters of mineral water and about 24 pizzas ;-). The "oper...
secenv.seclab.tuwien.ac.at
Advanced Internet Security
https://secenv.seclab.tuwien.ac.at/secenv/default/inetsec2
Vorlesung mit Uebung (3.0 ECTS) - 183.222. This lecture is held as a cooperation between the Secure Systems Lab at the Automation Systems Group (183/1). And the Information and Software Engineering Group (188/1). For correspondence, send a mail to inetsec@seclab.tuwien.ac.at. Jan Vales (via TISS Forum. TISS registration is already open, please sign up for the course as soon as possible. Cross site request forgery (CSRF). Exploits against caching infrastructure. Viruses, worms, trojan horses. Breaking Win...
SOCIAL ENGAGEMENT