- Shellshock BashBug Presentation
- Bashbug Excercise:The task is to exploit a vulnerable server through the bash bug vulnerability using Burpsuite.
- Bashbug Uber Excercise:The goal is to redirect the target’s website to your machine.
- Buffer Overflow Presentation
- Buffer Overflow Excercise:In this exercise, you will use a buffer overflow to exploit a vulnerable ftp program on a remote machine.
- Symmetric Cryptography Presentation
- Symmetric Cryptography Excercise:The task is task is to provide evidence (keys and decrypted messages) to your boss.
- Uber Challenge Symmetric Cryptography
- Static Binary Analysis Presentation
- Static Binary Analysis Excercise:The goal is to identify the network parameters used to connect to the server.
- Dynamic Binary Analysis Presentation
- Dynamic Binary Analysis Excercise:The goal is to obtain the passwords needed to decrypt the archive.
- Computer Forensic Analysis Presentation
- Forensic Analysis Excercise:In this workshop, the task is to aid in an analysis of a mock-up incident as a computer forensic examiner.
- Intrusion Detection System with Snort Presentation
- Intrusion Detection System Excercise:In this exercise, you will learn about the tools and methodologies that you can use to add an extra defensive layer to your network. The goal is to protect your system using Snort.
- Phishing Workshop Presentation
- Phishing Excercise:In this exercise, you will be replicating the attack that was investigated in the Forensics Analysis Workshop.
- Exploitation and Pivoting Presentation
- Exploitation and Pivoting Excercise:In this exercise, you will learn about the tools and methodologies that attackers use to pivot through networks. The goal is to access an internal webserver.
- UBER Challenge Exploitation and Pivoting:In this exercise, you will learn about the tools and methodologies that attackers use to pivot through networks. The goal is to obtain a password hash file and crack 4 passwords.
- Attacks on Routing Presentation
- Attacks on Routing Excercise:In this exercise, you will learn how an attacker may hijack traffic from a remote (out-of-subnet) posture.
- UBER Challenge Attacks on Routing:In this Uber challenge you will leverage what you found in the first exercise. The goal is to portray a real threat by describing how an adversary may gain acces and to also show the impact of exploitation.
- Steganography Presentation
- Steganography Excercise:The goal is to detect and crack the images with hidden information such as location and time in order to uncover criminal plans.
- Pivoting Attack and Traffic Annotation Presentation
- Pivoting Attack and Traffic Annotation Excercise:In this exercise, you will learn about the tools and methodologies that attackers use to pivot through networks and you will learn how to identify some of these malicious activities by collecting, observing, and annotating Hypertext Transfer Protocol (HTTP) network traffic.
- Malware Analysis: Ransomware Presentation
- WannaCry Excercise:In this exercise, you will execute a series of steps to investigate the WannaCry malware. The main objective is to uncover the kill switch that will stop this malware from spreading and infecting others.
- UBER Challenge WannaCry:The goal is to find the service that WannaCry uses to spread and observe the behavior of the malware when the process is stopped.
- Ransomware Key Recovery Workshop Presentation
- Ransomware Key Recovery Excercise: In this exercise, you will learn the severity of ransomware and the importance of backing up your data, RSA encryption, and tools like IDA Pro to search for information in memory.
Home | Related Research | Non-CS courses with Information Assurance Components | Related links | Student Resources | Related News | Outreach Resources | Institutional Security Resources and Awareness | UTEP Cybersecurity Community of Practice |
Recent Outreach Activities
CS Department Seeking Student Coaches for the CyberPatriot Competition
Cybersecurity and Data Science Research Experiences for Teachers
Airforce CyberPatriot Summer Camp for Middle and High School Students
UTEP CS to Sponsor and Train Airforce CyberPatriot Competition Teams
Other Students' Opportunities
Outreach Resources
Airforce CyberPatriot Summer Camp for Middle and High School Students
UTEP CS to Sponsor and Train Airforce CyberPatriot Competition Teams
Other Students' Opportunities
Outreach Resources
Other Students' Opportunities
Outreach Resources
The following resources are provided for public use for the purpose of training in cybersecurity. For more information and assistance please contact Center Directors.
Hands-On Series
Bash Bug (Shellshock) Exploitation
Developed by Adriana Escobar De La Torre
Remote Exploitation
Developed by Dr. Jaime C. Acosta
Symmetric Cryptography
Developed by Nadia Karichev
Static Binary Analysis
Developed by Pedro Estrada Jr, Daniel Cervantes
Dynamic Binary Analysis
Developed by Pedro Estrada Jr, Daniel Cervantes
Forensic Analysis
Developed by Christian Murga, Alberto Morales, and Adriana Escobar
Intrusion Detection System
Developed by Albert Morales
Social Engineering
Developed by Christian Aaron Murga
Exploitation and Pivoting
Developed by Dr. Jaime C. Acosta
Attacks on Routing
Developed by Dr. Jaime C. Acosta
Steganography
Developed by Nadia Karichev
Cybersecurity Awareness Workshop Series
Pivoting Attack and Traffic Annotation
Developed by Dr. Jaime C. Acosta, Jason Ellis, Stephen Raio, Daniel Krych, Allison Newcomb and Tracy Braun
WannaCry
Developed by Adriana Escobar Del La Torre & Ana Garcia Ramirez
Ransomware Key Recovery
Developed by Dr. Jaime C. Acosta, Mr. Adrian Belmontes