Challenge

Hands-On Assignments

During the course, we will announce a "challenge" here every couple of weeks that you can solve. These challenges aim to allow you to gain some basic practical experience in the penetration testing and the security analysis of software and applications.

We have planned 8 challenges that deal with topics such as common security tools, web vulnerabilities, memory overflows, and reverse engineering. The challenges are directly related to the concepts discussed in the lecture part of the course.

The challenges in the course are not necessarily difficult (for people who can program and who have basic Web, networking and software knowledge), but may require you to do some research on the Internet and read some documentation. Of course, you also need some patience.

By the way, we are aware that the lab environment is not highly secure. So we trust you that you will not try to break or hack the system. That is not a challenge. Remember that you are the good guy/gal. If we notice that you are trying to crack the system, there will be consequences.

Good luck and happy debugging ;-)

Challenge 8
Challenge 7
Challenge 6
Challenge 5
Challenge 4
Challenge 3
Challenge 2
Challenge 1

Last Modified: Tue Nov 21 18:21:19 2023 EST