Home | Related Research | Non-CS courses with Information Assurance Components | Related links | Student Resources | Related News | Outreach Resources | Institutional Security Resources and Awareness | UTEP Cybersecurity Community of Practice |

    Recent Outreach Activities

    CS Department Seeking Student Coaches for the CyberPatriot Competition

    Cybersecurity and Data Science Research Experiences for Teachers

    Airforce CyberPatriot Summer Camp for Middle and High School Students

    UTEP CS to Sponsor and Train Airforce CyberPatriot Competition Teams

    Other Students' Opportunities


    Outreach Resources

    The following resources are provided for public use for the purpose of training in cybersecurity. For more information and assistance please contact Center Directors.

    Hands-On Series


    Bash Bug (Shellshock) Exploitation

    Developed by Adriana Escobar De La Torre

    • Shellshock BashBug Presentation
    • Bashbug Excercise:The task is to exploit a vulnerable server through the bash bug vulnerability using Burpsuite.
    • Bashbug Uber Excercise:The goal is to redirect the target’s website to your machine.


    Remote Exploitation

    Developed by Dr. Jaime C. Acosta

    • Buffer Overflow Presentation
    • Buffer Overflow Excercise:In this exercise, you will use a buffer overflow to exploit a vulnerable ftp program on a remote machine.


    Symmetric Cryptography

    Developed by Nadia Karichev

    • Symmetric Cryptography Presentation
    • Symmetric Cryptography Excercise:The task is task is to provide evidence (keys and decrypted messages) to your boss.
    • Uber Challenge Symmetric Cryptography


    Static Binary Analysis

    Developed by Pedro Estrada Jr, Daniel Cervantes

    • Static Binary Analysis Presentation
    • Static Binary Analysis Excercise:The goal is to identify the network parameters used to connect to the server.


    Dynamic Binary Analysis

    Developed by Pedro Estrada Jr, Daniel Cervantes

    • Dynamic Binary Analysis Presentation
    • Dynamic Binary Analysis Excercise:The goal is to obtain the passwords needed to decrypt the archive.


    Forensic Analysis

    Developed by Christian Murga, Alberto Morales, and Adriana Escobar

    • Computer Forensic Analysis Presentation
    • Forensic Analysis Excercise:In this workshop, the task is to aid in an analysis of a mock-up incident as a computer forensic examiner.


    Intrusion Detection System

    Developed by Albert Morales

    • Intrusion Detection System with Snort Presentation
    • Intrusion Detection System Excercise:In this exercise, you will learn about the tools and methodologies that you can use to add an extra defensive layer to your network. The goal is to protect your system using Snort.


    Social Engineering

    Developed by Christian Aaron Murga

    • Phishing Workshop Presentation
    • Phishing Excercise:In this exercise, you will be replicating the attack that was investigated in the Forensics Analysis Workshop.


    Exploitation and Pivoting

    Developed by Dr. Jaime C. Acosta

    • Exploitation and Pivoting Presentation
    • Exploitation and Pivoting Excercise:In this exercise, you will learn about the tools and methodologies that attackers use to pivot through networks. The goal is to access an internal webserver.
    • UBER Challenge Exploitation and Pivoting:In this exercise, you will learn about the tools and methodologies that attackers use to pivot through networks. The goal is to obtain a password hash file and crack 4 passwords.


    Attacks on Routing

    Developed by Dr. Jaime C. Acosta

    • Attacks on Routing Presentation
    • Attacks on Routing Excercise:In this exercise, you will learn how an attacker may hijack traffic from a remote (out-of-subnet) posture.
    • UBER Challenge Attacks on Routing:In this Uber challenge you will leverage what you found in the first exercise. The goal is to portray a real threat by describing how an adversary may gain acces and to also show the impact of exploitation.


    Steganography

    Developed by Nadia Karichev

    • Steganography Presentation
    • Steganography Excercise:The goal is to detect and crack the images with hidden information such as location and time in order to uncover criminal plans.


    Cybersecurity Awareness Workshop Series


    Pivoting Attack and Traffic Annotation

    Developed by Dr. Jaime C. Acosta, Jason Ellis, Stephen Raio, Daniel Krych, Allison Newcomb and Tracy Braun

    • Pivoting Attack and Traffic Annotation Presentation
    • Pivoting Attack and Traffic Annotation Excercise:In this exercise, you will learn about the tools and methodologies that attackers use to pivot through networks and you will learn how to identify some of these malicious activities by collecting, observing, and annotating Hypertext Transfer Protocol (HTTP) network traffic.


    WannaCry

    Developed by Adriana Escobar Del La Torre & Ana Garcia Ramirez

    • Malware Analysis: Ransomware Presentation
    • WannaCry Excercise:In this exercise, you will execute a series of steps to investigate the WannaCry malware. The main objective is to uncover the kill switch that will stop this malware from spreading and infecting others.
    • UBER Challenge WannaCry:The goal is to find the service that WannaCry uses to spread and observe the behavior of the malware when the process is stopped.


    Ransomware Key Recovery

    Developed by Dr. Jaime C. Acosta, Mr. Adrian Belmontes

    • Ransomware Key Recovery Workshop Presentation
    • Ransomware Key Recovery Excercise: In this exercise, you will learn the severity of ransomware and the importance of backing up your data, RSA encryption, and tools like IDA Pro to search for information in memory.
Terms of Use | Privacy Statement  | Required Links
  The University of Texas at El Paso | Department of Computer Science
500 West University Avenue, El Paso, Texas 79968,
(915) 747-5480 Copyright© 2010 All Rights Reserved