🔐Security and Networks Notes
Contents
- 01 Hashing
- 02 Kerckhoff’s Principle
- 03 One Time Pads
- 04 Symmetric Cryptography
- 05 Padding
- 06 Block Cipher Modes
- 07 Probabilistic Encryption
- 08 Counter Mode (CTR)
- 09 Known Plain Text Attacks
- 10 Secure Key Exchange
- 11 Encryption using RSA
- 12 IP, TCP, DNS
- 13 Internet Protocol Stack
- 14 MAC, IP address, DHCP and ARP
- 15 ARP Spoofing Attach - Traffic Interception
- 16 Assumption of Modern Internet
- 17 Attacks
- 18 Key Establishment Protocol
- 19 Needham-Schroeder Public Key Protocol
- 20 Needham-Schroeder-Lowe Public Key Protocol
- 21 Forward Secrecy
- 22 Certificates - Verifying Public Keys
- 23 Full Station-to-Station Protocol
- 24 Needham-Schroeder Key Establishment Protocol
- 25 Some Key Establishment Goals
- 26 The SSL TLS Protocol
- 27 X.509 Standard for Certificates
- 28 Internet Protocol Stack with TLS
- 29 Self-Signed Certificates
- 30 Diffie-Hellman in TLS
- 31 VPNs
- 32 Onion Routing
- 33 Network vs Local Injection
- 34 Fixes - In-band vs Out-band
- 35 Classifying SQL Injections
- 36 HTTP & HTTP Communication
- 37 GET vs POST
- 38 Cookies - State in a Stateless World
- 39 Session Hijacking
- 40 Cross-Site Scripting (XSS)
- 41 XSS Protections
- 42 Broken Access Control
- 43 Cross-site Request Forgery (CSRF)
- 44 Same-Origin Policy
- 45 Reverse Engineering
- 46 Binaries
- 47 x86-64 Architecture Overview
- 48 Buffer Overflow