Offensive Technologies ('OT')

Course: Offensive Technologies (5384OFTE6Y)
Teacher: Jeroen van Beek
Dates: 5 April - 31 May 2018, on Mondays and Thursdays
Time: starting at 10.15 Amsterdam time
Books: none
Contact: j.c.vanbeek{at}uva{dot}nl


Date Subject Sheets Lab assignment Videos
Thu 05 April Introduction + Intrusion Detection Systems introids lab1 DEFCON - The Full Documentary
Mon 09 April Physical security physical N/A: guest lecture Brightsight Elevator hacking
Thu 12 April Network security network lab3 DNS May Be Hazardous to Your Health
Mon 16 April Database security db lab4 Hacking and Forensicating an Oracle Database Server
Thu 19 April Application security app lab5 Funky file formats
Mon 23 April Webapp security N/A
Thu 26 April Project N/A N/A N/A
Mon 30 April May Holiday N/A N/A N/A
Thu 03 May May Holiday N/A N/A N/A
Mon 07 May Project N/A N/A N/A
Thu 10 May Ascension Day N/A N/A N/A
Mon 14 May Project N/A N/A N/A
Thu 17 May Project N/A N/A N/A
Mon 21 May Pentecost Monday N/A N/A N/A
Thu 24 May Project N/A N/A N/A
Mon 28 May Security in Times of Surveillance @TUE N/A N/A N/A
Thu 31 May Project presentations please be in at 10.00, last in = first presentation N/A N/A N/A



Room B1.23.


Start at 10.15, until lunch.

Lab assignments

After most lectures you'll receive an assignment that contains one or more questions. Work on the assignment in groups of two persons. Document the answers on your personal webpage. Please don't forget to mention your team mate's name.


Room B1.23 or C3.154.


Starting after lunch, until 16.00.


  • Obtaining insight and skills in the subject of 'practical security'


  • For your project you need to:
    • Find a teammate (2 persons / group)
      • No team mates of previous projects

Deliverables and deadlines

  • Logs of lab assignments finished and online: deadline 25 April 23:59 Amsterdam time

OT project


Room B1.23 or C3.154.


Starting at 10.15, until 16.00.


  • Obtaining insight and skills in the subject of 'practical security'
  • Further improving your reporting and presentation skills


  • For your project you need to:
    • Find a teammate (2 persons / group)
      • No team mates of previous projects
    • Pick / define a subject
    • Write a project proposal and email it to Jeroen
    • Get approval for your project
  • Projects starts on Thu 26 April, every Monday and Thursday except holidays
  • Presentation of your results on 31 May

Deliverables and deadlines

  • Project proposal: deadline 19 April 23:59 Amsterdam time too late = no project = no grade
  • Project report: deadline 30 May 23.59 Amsterdam time
  • Project presentation: 31 May, starting at 10.00 sharp in the OS3 lab

Requirements for the project proposal

Please answer the following questions in your proposal:

  • What's the subject?
  • What's new / special about your subject?
  • Why M.Sc worthy?
  • Which activities are you planning to do (approach)?
  • Who is doing what in your team?
  • What's your time planning?
  • What resources do you need (connectivity, hardware, …)?
  • Ethical and privacy considerations. If personal information of third parties can (accidentally) be accessed during your project: add a procedures like deletion of project data and responsible disclosure. Also ALWAYS notify Jeroen in case of unforeseen circumstances that are not described in your project proposal.

Have you already got some great ideas before the dealine? Please contact Jeroen, the sooner the better!

Requirements for the presentation

  • Duration is 15 minutes in total, without possible questions
  • Presentation by both team members


  • Individual appraisal for each team member
  • Proper documentation of the lab assignments must be available on your personal webpage in folder ot, if not no grade!
  • Result is based on the project report (2/3) and the project presentation (1/3)
  • Appraisal of the project report and project presentation are based on:
    • Correctness
    • Completeness
    • Technical level
    • Applicability
    • Structure and orthography


A list of previous years' reports that were rated as good or very good:

Other previous subjects:

  • NTP as a covert channel
  • Security Audit of the Android Steam Authenticator App
  • Retest Digidentity
  • Security analysis ECU Aprillia RSV4-1000
  • Security analysis of the Airconsole mini
  • Device driver security
  • SkyBell HD smart doorbell security analysis
  • Behavior of APT-Groups
  • Password managers and their vulnerabilities
  • A security analysis of decommissioned Ziggo modems
  • Endomondo Application Security
  • Defeating ransomware by instruction monitoring
  • Exploiting Broadcom’s Wi-Fi Stack
  • Eavesdropping with an optical microphone (laser).
  • Testing current good practices for wiping Android devices and improve weak points.
  • Extracting valuable data from dead Android devices.
  • Eavesdropping on and decrypting of GSM communication using readily available low-cost hardware and free open-source software in practice.
  • Implementing Mimikatz compatible output options (MS crash dump) in DMA physical memory dump tools (e.g. Inception).
  • Identity how wide-spread clickjacking is (by checking missing counter measures) and implement an advanced example to show the impact of such an attack.
  • Development BadUSB-alike attacks for the USB Armory.
  • Shedding a light on publicly known TEMPEST attacks.
  • Modern Honeypot Network assessment.
  • EvilSSD Project.
  • SNMPv3 Covert channels.
  • Canon EOS 6D security evaluation.
  • Reviewing the procedures of Port Knocking.
  • Exploiting Wi-Fi SD cards
  • Heartbleed: how widespread is it?
  • OS3 Network Security Assessment
  • Looking back at Grsecurity
  • Weak key cracking of Android applications
  • GPS-based user tracking using mobile
  • TLS assessment SMTP
  • Keyboard acoustics
  • Firmware access control
  • Web Application Firewalls Evaluation and Analysis
  • Test the Effectiveness of the EMET
  • Comparing the detection rates of freely available attacks using free IDSs
  • Automated Deployment of Secure Services
  • Beyond the puppet
  • PGP good practice
  • Testing the effectiveness of GCC security flags in Debian 6.0
  • IPv6 host discovery
  • ASLR in modern operating systems
  • A Survey on Return-Oriented Programming
  • Security evaluation of out-of-band management devices
  • Attacking Android's pattern & PIN lock
  • Secretly retrieving mobile device clipboard content
  • Testing the effectiveness of the Enhanced Mitigation Experience Toolkit
  • Analysis and replication of 433 MHz device communication
  • Outdated Web Applications: Weakness Detection & Protection
  • ACARS and ADS-B: sniffing sensitive data and spoofing messages
  • Comparing real-life IPv4 and IPv6 network security policies
  • A penetration test of the Pogoplug in-home storage appliance
  • OS3 Network Segmentation
  • Bypassing a network proxy with authentication using covert channels
  • Analysis of the Ziggo TV application
  • Grindr Application Security
  • Security Analysis of GoPro Cameras
  • Security analysis of a wirelessly controlled gate
  • Database SQL Injections Detection & Protection: database firewalling
  • Detecting known IPv4 exploits over IPv6
  • Assessing the security of the ‘E-Thermostaat’ system
  • Metasploit Over Firewire Ownage
  • Analysis of Google’s 2-step Verification
  • Eavesdropping on and decrypting of GSM communication using readily available low-cost hardware and free open-source software in practice
  • Monitoring smartphone malware infections in the wild
  • Personal Data Collection of Android Applications
  • The network security of client-server iPhone applications
  • TCP Established Flooding
  • A comparison of real-life IPv4 and IPv6 network (IPv4 versus IPV6 filtering on the same system)
  • Beating Metasploit with Snort (automatically generate Snort rules from Metasploit Framework payloads)
  • Database Hardening
  • Sniffing and hijacking printer jobs
  • FireWire Attacks Revisited
  • Multiplexing Covert Channels
  • Analysis of TCP/IP backend of RFID access system
  • Penetration testing of open wireless access points
  • Post exploit activity detection (how to detect that a system is hacked?)
  • Hardened keyboard driver (how to detect a hardware PS/2 key logger?)
  • Detecting gateways in a simple way (how to detect unauthorized internet gateways in your corporate network?)
  • iPhoneBankingApps (checking the footprint of iPhone banking apps)
  • RFID (content analysis of RFID cards)
  • Covert channels (testing covert channels in the field)
  • Network traffic analysis for Windows binaries (reconstructing Windows EXEs using an IDS and checking for malware and certificates)
  • CoverDroid (implementing covert channels on an Android smart phone)
  • Passive application version monitoring (passively check for outdated / unknown software versions using network and IDS logs)

Suggestions for this year

  • Metasploit evasion versus IDSs already claimed
  • A comparison of real-life IPv4 and IPv6 network security policies + IPv6 host discovery
  • Security evaluation of out of band devices (drac/ilo/…)
  • Covert channels using e.g. Twitter, Facebook, Office365/GDrive shares
  • Weak key cracking of Android applications already claimed
  • Practical password advice based on the current state of password cracking

This topic does not exist yet

You've followed a link to a topic that doesn't exist yet. If permissions allow, you may create it by clicking on “Create this page”.