Free Software and Information Security
Class Outline and Teaching Materials
Linux Recap
- Run ubuntu-based OS in your browser
- Run linux bash terminal in your browser
- Creating your own UEFI bootable USB
- virtualbox
- linux beginner guides: copy/paste by mouse or
in terminal,
virtual terminals,
AltDrag,
file manager (zh_TW),
basic tools (zh_TW),
inputrc,
- I/O redirection and pipe, regular expressions
Security of Mobile Phones
- Why not iPhone? Juice Jacking, [graphic explanation], find my, always on
- Mobile privacy advices
- f-droid,
osmand
- adb +
scrcpy
- primitive ftpd
Theoretical Backgrounds
- Cryptographic Hash functions:
TutorialsPoint,
CoalFire,
synopsys,
Alexis Rodriguez,
salt in /etc/shadow,
Greg's Notes (zh_TW),
[most popular passwords,
rainbow table: CSO,
wikipedia ]
- asymmetric encryption:
Greg's Notes (zh_TW),
SavvySecurity,
Infosec Insights,
USNA,
- digital signature:
wizardforce1,
OpenLearn,
auth0,
- supplementary notes: RSA basics,
How RSA Works With Examples,
iMessage vulnerable to MitM attack
- privacy concepts
- cryptocurrency and blockchains:
Greg's Slides (zh_TW),
Jimi S.'s intro series incl.
terminology
Security of Desktop Computers and Laptops
- Giving up convenience in exchange for security:
live CD + slim browsers lynx/w3m/dillo
- browser fingerprinting
(canvas fingerprinting,
panopticlick) /
cross device tracking e.g. "audio beacon"
- Firefox security:
ublock origin and privacy badger,
facebook container,
NoScript, and other extensions
- firefox master password,
where do firefox and chromium store passwords?
- how does ssh work,
ssh keys
- vnc,
novnc,
SSL,
(zh_TW:
vnc,
ssh tunnel,
novnc
)
- reverse ssh tunnel,
Forward and reverse SSH tunnels in pictures (
zh_TW)
- GnuPG:
Searching,
devdungeon,
digitalocean (zh_TW:
GnuPG)
- mailvelope (zh_TW)
- Backdoor stories: Dual EC DRBG,
Finfisher,
Rootkit in Your Laptop,
Intel ME Secrets +
Libreboot FAQ
A Brief Introduction to Virtualization
-
virtualization terminologies
- kvm in 5 min, with UEFI
- virt-manager,
zh_TW
Security of Servers
-
securing ssh (zh_TW)
-
fail2ban
-
single packet authorization
-
Certtool generation
Digital Forensics
- backup vs wiping out data
- gimp for digital forensics
- steganography (zh_TW)
- Wireshark Labs, decrypting https w/ wireshark
- mitmproxy
Conclusions
- TED talk:
I love Cyber Security - Tom Hofmann
-
suggestions for personal security and privacy
- TED talk: The Security Mirage - Bruce Schneier
(back to course homepage)