-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy pathindex.html
More file actions
58 lines (58 loc) · 4.33 KB
/
index.html
File metadata and controls
58 lines (58 loc) · 4.33 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
<html>
<head>
<title>How to Hack Class</title>
<link rel="stylesheet" type="text/css" href="css/bootstrap.min.css">
<link rel="stylesheet" type="text/css" href="css/style.css">
</head>
<body>
<div class="navbar navbar-expand-lg navbar-static-top navbar-dark bg-dark">
<div class="container">
<a href="/" class="navbar-brand">How to Hack @ GreyHat Spring 2020</a>
<ul class="nav navbar-nav navbar-right">
<li class="nav-item"><a class="nav-link" href="https://github.com/GTHowToHack">GitHub</a></li>
<li class="nav-item"><a class="nav-link" href="https://greyhatgt.github.io/about/">GreyHat</a></li>
</ul>
</div>
</div>
<div class="container pt-5">
<div class="row">
<h3>How to Hack: Stepping into Security</h3>
<p>This semester's Georgia Tech GreyHat Club Applied track will be a series of lectures and
hands-on labs covering ethical hacking and penetration testing.
The goal of this seminar is to create security-minded programmers and to encourage secure code.
We've composed a syllabus for the semester containing administrative details, learning objectives, and tips for obtaining maximum benefit from the class.
You can find the syllabus <a href="https://docs.google.com/document/d/1AxkJZaCB_jcv6rEze5M_T-kO7KOMuNnqmpsI-MwyGIA/edit?usp=sharing">on Google Drive</a>.
<br><br>
Slack: #applied on <a href="http://greyhatgt.slack.com">GreyHat Club Slack</a> (use your @gatech.edu email).<br>
Lab server: <code>34.73.149.138:1000</code> (connect with netcat)<br>
All materials are on <a href="https://github.com/GTHowToHack">GitHub</a>.
</p>
<h4>Schedule</h4>
</div>
<div class="row">
<p>Meetings will take place Mondays at 6:30 in <b><a href="https://goo.gl/maps/m1FsbUtFBFQERqN98">College of Computing Building, Room 017</a></b> (in the basement)</p>
<table class="table table-bordered">
<thead>
<tr><td>Topic</td><td>Date</td></tr>
</thead>
<tbody>
<tr><td><a href="https://docs.google.com/presentation/d/1NWmJDu2Qqw7jMJuDl3T4XJ7GkOM84S2yLEMZyxWCfrc/edit?usp=sharing">Intro & Kali Linux</a></td><td>13 January</td></tr>
<tr><td><i>Martin Luther King, Jr. Day</i></td><td><i>20 January</td></i></tr>
<tr><td><a href="https://docs.google.com/presentation/d/1dFQQSacIz1011pkitu23PKPhXxUthcHQUdtS4sofXjo/edit?usp=sharing">Reconnaissance: Information Gathering and Enumeration</a></td><td>27 January</td></tr>
<tr><td><a href="https://docs.google.com/presentation/d/19HJ3wKnd5JS98Oqrzt8fF6s5dVsspvojdnIwXLExwvk/edit?usp=sharing">Exploitation: Frontend web attacks</a></td><td>3 February</td></tr>
<tr><td><a href="https://docs.google.com/presentation/d/1eHrMj_JeTqVS9eniiJ5OoyhKpa2eCCyBdypcX9teSEg/edit?usp=sharing">Exploitation: Backend web attacks</a></td><td>10 February</td></tr>
<tr><td><a href="https://docs.google.com/presentation/d/10D_zq5MaF3StCMiaUCdHZjiy8xomMAfDNJ2mrxyKmw8/edit">Exploitation: Attacking WiFi</a></td><td>17 February</td></tr>
<tr><td>Lab Review Session for Weeks 1-5</td><td>24 February</td></tr>
<tr><td><a href="https://docs.google.com/presentation/d/1XQCtS7wbjngJ3UeutS9Nq35-wMUk8888gRoiE7h5X8w/edit">Exploitation: Attacking programs</a></td><td>2 March</td></tr>
<tr><td><a href="https://docs.google.com/presentation/d/1l52yPjK8Kix0IvsmCT2_0STJD_em0sF04qYyX4X93z8/edit?usp=sharing">Exploitation: Password attacks, malware, and social engineering</a></td><td>9 March</td></tr>
<tr><td><i>Spring Break</i></td><td><i>16 March</i></td></tr>
<tr><td><a href="https://docs.google.com/presentation/d/1FOcDiDkJd7SINkO52Ce9RKyGKLSWQMdNdEsepWa4Ha4/edit?usp=sharing">Exploitation: Attacking systems with Metasploit</a></td><td>30 March</td></tr>
<tr><td><a href="https://docs.google.com/presentation/d/11JlbY_rEsAbQVCu78HzoRW-3FjvY9Pu2LeKD88PV3fw/edit?usp=sharing">Post-Exploitation: Privilege Escalation & Lateral Movement</a></td><td>6 April</td></tr>
<tr><td>Pentesting Lab</td><td>6 April - whenver my Google Cloud Platform credit runs out</td></tr>
<tr><td>CTF Review</td><td>13 April</td></tr>
</tbody>
</table>
</div>
</div>
</body>
</html>