forked from wu4f/codelabs
-
Notifications
You must be signed in to change notification settings - Fork 0
/
cs492.html
167 lines (166 loc) · 9.52 KB
/
cs492.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
<!doctype html>
<html lang="en">
<head>
<meta charset="utf-8">
<meta name="description" content="The labs below walk through setting up and running the AFL lab and angr symbolic exeuction CTF. Read more about these codelabs at https://edu.google.com/why-google/case-studies/portland-state-cybersecurity-cloud">
<meta name="viewport" content="width=device-width,initial-scale=1">
<meta name="generator" content="Malware Reverse Engineering">
<meta name="application-name" content="Malware Reverse Engineering">
<link rel="canonical" href="https://example.com/cs492/">
<link rel="preconnect" href="https://www.google-analytics.com">
<script>
window.ga=window.ga||function(){(ga.q=ga.q||[]).push(arguments)};ga.l=+new Date;
ga('create', 'UA-49880327-14', 'auto');
ga('send', 'pageview');
</script>
<script async src="https://www.google-analytics.com/analytics.js"></script>
<title>Malware Reverse Engineering</title>
<link rel="stylesheet" href="/styles/main.css">
<link rel="import" href="/elements/elements.html">
<style is="custom-style">
:root{--paper-tabs-selection-bar-color:currentcolor;--paper-input-container-underline:{display:none};--paper-input-container-underline-focus:{display:none};}.dropdown-filter{--paper-input-container:{padding:8px}} </style>
<meta name="apple-mobile-web-app-capable" content="yes">
<meta name="apple-mobile-web-app-status-bar-style" content="#455a64">
<meta name="apple-mobile-web-app-title" content="Malware Reverse Engineering">
<link rel="apple-touch-icon" sizes="180x180" href="/images/favicons/apple-touch-icon.png">
<link rel="icon" type="image/png" sizes="32x32" href="/images/favicons/favicon-32x32.png">
<link rel="icon" type="image/png" sizes="194x194" href="/images/favicons/favicon-194x194.png">
<link rel="icon" type="image/png" sizes="192x192" href="/images/favicons/android-chrome-192x192.png">
<link rel="icon" type="image/png" sizes="16x16" href="/images/favicons/favicon-16x16.png">
<link rel="mask-icon" href="/images/favicons/safari-pinned-tab.svg" color="#455a64">
<meta name="msapplication-TileColor" content="#455a64">
<meta name="msapplication-TileImage" content="/images/favicons/mstile-144x144.png">
<meta name="theme-color" content="#455a64">
<meta name="og:type" property="og:type" content="website">
<meta name="og:title" property="og:title" content="Malware Reverse Engineering">
<meta name="og:description" property="og:description" content="The labs below walk through setting up and running the AFL lab and angr symbolic exeuction CTF. Read more about these codelabs at https://edu.google.com/why-google/case-studies/portland-state-cybersecurity-cloud">
<meta name="og:url" property="og:url" content="https://example.com/cs492/">
<meta name="og:site_name" property="og:site_name" content="Codelabs">
<meta name="og:determiner" property="og:determiner" content="the">
<meta name="og:locale" property="og:locale" content="en_US">
<meta name="og:image" property="og:image" content="/images/og-image.png">
<meta name="og:image:url" property="og:image:url" content="/images/og-image.png">
<meta name="og:image:type" property="og:image:type" content="image/png">
<meta name="og:image:width" property="og:image:width" content="1200">
<meta name="og:image:height" property="og:image:height" content="1200">
<meta name="og:image:alt" property="og:image:alt" content="Codelabs">
<meta name="twitter:card" property="twitter:card" content="summary_large_image">
<meta name="twitter:title" property="twitter:title" content="Malware Reverse Engineering">
<meta name="twitter:description" property="twitter:description" content="The labs below walk through setting up and running the AFL lab and angr symbolic exeuction CTF. Read more about these codelabs at https://edu.google.com/why-google/case-studies/portland-state-cybersecurity-cloud">
<meta name="twitter:image" property="twitter:image" content="/images/og-image.png">
<meta name="twitter:url" property="twitter:url" content="https://example.com/cs492/">
</head>
<body id="app" is="body-bind" class="loading fullbleed view">
<paper-header-panel id="main" mode="standard" main>
<header id="banner" down>
<div class="site-width">
<p><img id="logo" src="/images/pdx-cs-logo.png" width="30" height="40" alt="Portland State University"></p>
<div class="banner-description">
<div class="banner-meta">
<h2>Malware Reverse Engineering</h2>
<p>The labs below walk through setting up and running the AFL lab and angr symbolic exeuction CTF. Read more about these codelabs at https://edu.google.com/why-google/case-studies/portland-state-cybersecurity-cloud</p>
</div>
</div>
</div>
</header>
<main>
<div id="filters" class="site-width layout horizontal center justified">
<div id="sortby">
<paper-tabs selected="0" noink on-iron-activate="sortBy">
<paper-tab>A-Z</paper-tab>
<paper-tab>Recent</paper-tab>
<paper-tab>Duration</paper-tab>
</paper-tabs>
</div>
<paper-dropdown-menu label="Choose a class" class="dropdown-filter" no-label-float noink no-animations>
<paper-listbox id="eventList" slot="dropdown-content" class="dropdown-content"><a href="/cs410b/" tabindex="-1">
<paper-item>Blockchain Development and Security</paper-item>
</a>
<a href="/cs430/" tabindex="-1">
<paper-item>Internet, Web, and Cloud Systems</paper-item>
</a>
<a href="/cs488/" tabindex="-1">
<paper-item>Cloud and Cluster Data Management</paper-item>
</a>
<a href="/cs491/" tabindex="-1">
<paper-item>Introduction to Computer Security</paper-item>
</a>
<a href="/cs492/" tabindex="-1">
<paper-item>Malware Reverse Engineering</paper-item>
</a>
<a href="/cs495/" tabindex="-1">
<paper-item>Web and Cloud Security</paper-item>
</a>
</paper-listbox>
</paper-dropdown-menu>
</div>
<card-sorter id="cards" class="site-width">
<a href="/labs/M1_setup/index.html?index=..%2F..cs492" on-tap="navigate" class="codelab-card category-security" data-category="security,windows" data-title="1. Setup" data-duration="86" data-summary="Setup the VM that will be used to run the textbook's lab assignments." data-updated="2023-09-27T23:18:01Z" data-tags="cs492" data-pin="">
<div class="description"><h4>1. Setup</h4></div>
<div class="description">Setup the VM that will be used to run the textbook's lab assignments.</div>
<div class="card-duration">
<span>86 min </span>
<span>Updated Sep 27, 2023</span>
</div>
<div class="card-footer">
<div class="category-icon security-icon"></div>
<paper-button class="security-bg">Start</paper-button>
</div>
</a>
<a href="/labs/M2_pma/index.html?index=..%2F..cs492" on-tap="navigate" class="codelab-card category-security" data-category="security,windows" data-title="2. Practical Malware Analysis Labs" data-duration="5" data-summary="Setup the VM that will be used to run the textbook's lab assignments." data-updated="2023-04-05T16:33:07Z" data-tags="cs492" data-pin="">
<div class="description"><h4>2. Practical Malware Analysis Labs</h4></div>
<div class="description">Setup the VM that will be used to run the textbook's lab assignments.</div>
<div class="card-duration">
<span>5 min </span>
<span>Updated Apr 5, 2023</span>
</div>
<div class="card-footer">
<div class="category-icon security-icon"></div>
<paper-button class="security-bg">Start</paper-button>
</div>
</a>
<a href="/labs/M3_afl/index.html?index=..%2F..cs492" on-tap="navigate" class="codelab-card category-security" data-category="security,afl" data-title="3. AFL" data-duration="77" data-summary="Run a Docker container with the American Fuzzy Lop smart fuzzer on Google Cloud to find the Heartbleed OpenSSL vulnerability." data-updated="2023-09-27T23:44:46Z" data-tags="cs492" data-pin="">
<div class="description"><h4>3. AFL</h4></div>
<div class="description">Run a Docker container with the American Fuzzy Lop smart fuzzer on Google Cloud to find the Heartbleed OpenSSL vulnerability.</div>
<div class="card-duration">
<span>77 min </span>
<span>Updated Sep 27, 2023</span>
</div>
<div class="card-footer">
<div class="category-icon security-icon"></div>
<paper-button class="security-bg">Start</paper-button>
</div>
</a>
<a href="/labs/M4_angr/index.html?index=..%2F..cs492" on-tap="navigate" class="codelab-card category-security" data-category="security,angr" data-title="4. angr" data-duration="15" data-summary="Run a VM on Google Cloud to use the angr symbolic execution engine to automatically solve CTF levels." data-updated="2023-09-27T23:45:27Z" data-tags="cs492" data-pin="">
<div class="description"><h4>4. angr</h4></div>
<div class="description">Run a VM on Google Cloud to use the angr symbolic execution engine to automatically solve CTF levels.</div>
<div class="card-duration">
<span>15 min </span>
<span>Updated Sep 27, 2023</span>
</div>
<div class="card-footer">
<div class="category-icon security-icon"></div>
<paper-button class="security-bg">Start</paper-button>
</div>
</a>
<a href="/labs/M5_final/index.html?index=..%2F..cs492" on-tap="navigate" class="codelab-card category-security" data-category="security,windows" data-title="5: Final project" data-duration="381" data-summary="Demonstrate the knowledge and skills you have gained via a final project." data-updated="2022-04-14T17:12:55Z" data-tags="cs492" data-pin="">
<div class="description"><h4>5: Final project</h4></div>
<div class="description">Demonstrate the knowledge and skills you have gained via a final project.</div>
<div class="card-duration">
<span>381 min </span>
<span>Updated Apr 14, 2022</span>
</div>
<div class="card-footer">
<div class="category-icon security-icon"></div>
<paper-button class="security-bg">Start</paper-button>
</div>
</a>
</card-sorter>
<div id="loading-placeholder" class="site-width">
Loading Codelabs, please wait...
</div>
</main>
</paper-header-panel>
<script src="/scripts/main.js"></script>
</body>
</html>