diff --git a/modules/generators/structured_content/hackerbot_config/hb_access_controls/templates/resources.md.erb b/modules/generators/structured_content/hackerbot_config/hb_access_controls/templates/resources.md.erb index e69de29bb..f1ea36a1a 100644 --- a/modules/generators/structured_content/hackerbot_config/hb_access_controls/templates/resources.md.erb +++ b/modules/generators/structured_content/hackerbot_config/hb_access_controls/templates/resources.md.erb @@ -0,0 +1,2 @@ +# Reading +[Chapter 1 "Foundations of Security and Access Control in Computing": Benantar, M. (2006), Access Control Systems: Security, Identity Management and Trust Models, Springer. (ISBN-10: 0387004459)](https://www-dawsonera-com.ezproxy.leedsbeckett.ac.uk/readonline/9780387277165) diff --git a/modules/generators/structured_content/hackerbot_config/hb_containers/templates/resources.md.erb b/modules/generators/structured_content/hackerbot_config/hb_containers/templates/resources.md.erb index e69de29bb..d23f5c367 100644 --- a/modules/generators/structured_content/hackerbot_config/hb_containers/templates/resources.md.erb +++ b/modules/generators/structured_content/hackerbot_config/hb_containers/templates/resources.md.erb @@ -0,0 +1,2 @@ +# Reading +[Z. C. Schreuders, T. McGill, and C. Payne, "The State of the Art of Application Restrictions and Sandboxes: A Survey of Application-oriented Access Controls and their Shortfalls," Computers and Security, Volume 32, Elsevier B.V., 2013. DOI: 10.1016/j.cose.2012.09.007](http://z.cliffe.schreuders.org/publications/Computers&Security%20-%20The%20State%20of%20the%20Art%20of%20Application%20Restrictions%20and%20Sandboxes%20-%20Author%20Version.pdf) diff --git a/modules/generators/structured_content/hackerbot_config/hb_facls/templates/resources.md.erb b/modules/generators/structured_content/hackerbot_config/hb_facls/templates/resources.md.erb index ca49f818d..40047722c 100644 --- a/modules/generators/structured_content/hackerbot_config/hb_facls/templates/resources.md.erb +++ b/modules/generators/structured_content/hackerbot_config/hb_facls/templates/resources.md.erb @@ -1,5 +1,4 @@ # Resources This excellent paper describes Linux ACL in detail: -[^1]: Grünbacher, Andreas. "POSIX Access Control Lists on Linux." *USENIX Annual Technical Conference*, FREENIX Track. 2003. - +[^1]: [Grunbacher, Andreas. "POSIX Access Control Lists on Linux." *USENIX Annual Technical Conference*, FREENIX Track. 2003.](https://www.usenix.org/legacy/events/usenix03/tech/freenix03/full_papers/gruenbacher/gruenbacher.pdf) diff --git a/modules/generators/structured_content/hackerbot_config/hb_suid_acls/templates/resources.md.erb b/modules/generators/structured_content/hackerbot_config/hb_suid_acls/templates/resources.md.erb index e69de29bb..0fb1cef2b 100644 --- a/modules/generators/structured_content/hackerbot_config/hb_suid_acls/templates/resources.md.erb +++ b/modules/generators/structured_content/hackerbot_config/hb_suid_acls/templates/resources.md.erb @@ -0,0 +1,2 @@ +# Reading +[Chapter 6 "Filesystems and Security": Garfinkel, S. Spafford, G. and Schwartz, A. (2003), Practical Unix and Internet Security, O'Reilly. (ISBN-10: 0596003234)](https://www-dawsonera-com.ezproxy.leedsbeckett.ac.uk/abstract/9781449310325) diff --git a/modules/generators/structured_content/hackerbot_config/hbauthentication/templates/resources.md.erb b/modules/generators/structured_content/hackerbot_config/hbauthentication/templates/resources.md.erb index e69de29bb..211d6e01e 100644 --- a/modules/generators/structured_content/hackerbot_config/hbauthentication/templates/resources.md.erb +++ b/modules/generators/structured_content/hackerbot_config/hbauthentication/templates/resources.md.erb @@ -0,0 +1,2 @@ +# Reading +[Chapter 11 "Authentication": Bishop, M. (2004), Introduction to Computer Security, Addison-Wesley. (ISBN-10: 0321247442)](https://my.leedsbeckett.ac.uk/bbcswebdav/pid-2221598-dt-content-rid-4451698_1/institution/Online%20Learning/AET/CT/MSc%20Computer%20Security/Principles%20of%20Digital%20Security/Readings/Week%205/DCS-85139%20%281%29.pdf) diff --git a/modules/generators/structured_content/hackerbot_config/hbpam/templates/resources.md.erb b/modules/generators/structured_content/hackerbot_config/hbpam/templates/resources.md.erb index e69de29bb..070bd8eb2 100644 --- a/modules/generators/structured_content/hackerbot_config/hbpam/templates/resources.md.erb +++ b/modules/generators/structured_content/hackerbot_config/hbpam/templates/resources.md.erb @@ -0,0 +1,2 @@ +# Reading +[Chapter 4 "Users, Passwords, and Authentication": Garfinkel, S. Spafford, G. and Schwartz, A. (2003), Practical Unix and Internet Security, O'Reilly. (ISBN-10: 0596003234)](https://www-dawsonera-com.ezproxy.leedsbeckett.ac.uk/abstract/9781449310325) diff --git a/scenarios/labs/ads_1_authentication.xml b/scenarios/labs/ads_1_authentication.xml index a6b76afa2..58ef39818 100644 --- a/scenarios/labs/ads_1_authentication.xml +++ b/scenarios/labs/ads_1_authentication.xml @@ -8,7 +8,6 @@ Z. Cliffe Schreuders # Lecture - [Click here to watch the lecture authentication part 1](https://leedsbeckettreplay.cloud.panopto.eu/Panopto/Pages/Viewer.aspx?id=c5ea9ea3-b8c2-4949-a251-a9e500ad23f4) [Click here to watch authentication part 2](https://leedsbeckettreplay.cloud.panopto.eu/Panopto/Pages/Viewer.aspx?id=c49f1c3a-1688-4013-b1a8-a9ec00a5a30f) @@ -16,13 +15,10 @@ [Slides here](http://z.cliffe.schreuders.org/presentations/slides/1718/ADS_slides_out_week_6/WNS_ADS_Lectures_5_Authentication.html) # Reading - [Chapter 11 "Authentication": Bishop, M. (2004), Introduction to Computer Security, Addison-Wesley. (ISBN-10: 0321247442)](https://my.leedsbeckett.ac.uk/bbcswebdav/pid-2221598-dt-content-rid-4451698_1/institution/Online%20Learning/AET/CT/MSc%20Computer%20Security/Principles%20of%20Digital%20Security/Readings/Week%205/DCS-85139%20%281%29.pdf) # Lab - A Hackerbot lab. Work through the lab instructions, then when prompted interact with Hackerbot. - ctf-lab diff --git a/scenarios/labs/ads_2_pam.xml b/scenarios/labs/ads_2_pam.xml index bdac25a3d..5a5e12cc3 100644 --- a/scenarios/labs/ads_2_pam.xml +++ b/scenarios/labs/ads_2_pam.xml @@ -13,7 +13,7 @@ [Slides continued here](http://z.cliffe.schreuders.org/presentations/slides/1718/ADS_slides_out_week_6/WNS_ADS_Lectures_5_Authentication.html) # Reading -[Chapters 3 "Policies and Guidelines" and 4 "Users, Passwords, and Authentication": Garfinkel, S. Spafford, G. and Schwartz, A. (2003), Practical Unix and Internet Security, O'Reilly. (ISBN-10: 0596003234)](https://www-dawsonera-com.ezproxy.leedsbeckett.ac.uk/abstract/9781449310325) +[Chapter 4 "Users, Passwords, and Authentication": Garfinkel, S. Spafford, G. and Schwartz, A. (2003), Practical Unix and Internet Security, O'Reilly. (ISBN-10: 0596003234)](https://www-dawsonera-com.ezproxy.leedsbeckett.ac.uk/abstract/9781449310325) # Lab A short lab this week, exploring PAM. Work through the labsheet, then when prompted interact with Hackerbot. diff --git a/scenarios/labs/ads_3_access_controls.xml b/scenarios/labs/ads_3_access_controls.xml index 343095427..c9f9bb645 100644 --- a/scenarios/labs/ads_3_access_controls.xml +++ b/scenarios/labs/ads_3_access_controls.xml @@ -13,7 +13,7 @@ [Slides here](http://z.cliffe.schreuders.org/presentations/slides/1718/ADS_slides_out_week_7/ADS_PDS_Lectures_7_Access_Control.html) # Reading -[Chapters 3 "Policies and Guidelines" and 4 "Users, Passwords, and Authentication": Garfinkel, S. Spafford, G. and Schwartz, A. (2003), Practical Unix and Internet Security, O'Reilly. (ISBN-10: 0596003234)](https://www-dawsonera-com.ezproxy.leedsbeckett.ac.uk/abstract/9781449310325) +[Chapter 1 "Foundations of Security and Access Control in Computing": Benantar, M. (2006), Access Control Systems: Security, Identity Management and Trust Models, Springer. (ISBN-10: 0387004459)](https://www-dawsonera-com.ezproxy.leedsbeckett.ac.uk/readonline/9780387277165) # Lab A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. diff --git a/scenarios/labs/ads_4_suid.xml b/scenarios/labs/ads_4_suid.xml index 7d8e0d626..4d95e387e 100644 --- a/scenarios/labs/ads_4_suid.xml +++ b/scenarios/labs/ads_4_suid.xml @@ -13,7 +13,7 @@ [Slides continued here](http://z.cliffe.schreuders.org/presentations/slides/1718/ADS_slides_out_week_7/ADS_PDS_Lectures_7_Access_Control.html) # Reading -[Chapters 3 "Policies and Guidelines" and 4 "Users, Passwords, and Authentication": Garfinkel, S. Spafford, G. and Schwartz, A. (2003), Practical Unix and Internet Security, O'Reilly. (ISBN-10: 0596003234)](https://www-dawsonera-com.ezproxy.leedsbeckett.ac.uk/abstract/9781449310325) +[Chapter 6 "Filesystems and Security": Garfinkel, S. Spafford, G. and Schwartz, A. (2003), Practical Unix and Internet Security, O'Reilly. (ISBN-10: 0596003234)](https://www-dawsonera-com.ezproxy.leedsbeckett.ac.uk/abstract/9781449310325) # Lab A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. diff --git a/scenarios/labs/ads_5_facls.xml b/scenarios/labs/ads_5_facls.xml index 68f8ddb6f..11a11e4bc 100644 --- a/scenarios/labs/ads_5_facls.xml +++ b/scenarios/labs/ads_5_facls.xml @@ -13,7 +13,7 @@ [Slides continued here](http://z.cliffe.schreuders.org/presentations/slides/1718/ADS_slides_out_week_7/ADS_PDS_Lectures_7_Access_Control.html) # Reading -[Chapters 3 "Policies and Guidelines" and 4 "Users, Passwords, and Authentication": Garfinkel, S. Spafford, G. and Schwartz, A. (2003), Practical Unix and Internet Security, O'Reilly. (ISBN-10: 0596003234)](https://www-dawsonera-com.ezproxy.leedsbeckett.ac.uk/abstract/9781449310325) +[Grunbacher, Andreas. "POSIX Access Control Lists on Linux." *USENIX Annual Technical Conference*, FREENIX Track. 2003.](https://www.usenix.org/legacy/events/usenix03/tech/freenix03/full_papers/gruenbacher/gruenbacher.pdf) # Lab A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. diff --git a/scenarios/labs/ads_6_containers.xml b/scenarios/labs/ads_6_containers.xml index 442c58ed0..fdc4bab87 100644 --- a/scenarios/labs/ads_6_containers.xml +++ b/scenarios/labs/ads_6_containers.xml @@ -13,7 +13,7 @@ [Slides here](http://z.cliffe.schreuders.org/presentations/slides/slides_out_sandboxing/ADS_PDS_Lectures_8_Sandboxes_and_Virtualisation.html) # Reading -[Chapters 3 "Policies and Guidelines" and 4 "Users, Passwords, and Authentication": Garfinkel, S. Spafford, G. and Schwartz, A. (2003), Practical Unix and Internet Security, O'Reilly. (ISBN-10: 0596003234)](https://www-dawsonera-com.ezproxy.leedsbeckett.ac.uk/abstract/9781449310325) +[Z. C. Schreuders, T. McGill, and C. Payne, "The State of the Art of Application Restrictions and Sandboxes: A Survey of Application-oriented Access Controls and their Shortfalls," Computers and Security, Volume 32, Elsevier B.V., 2013. DOI: 10.1016/j.cose.2012.09.007](http://z.cliffe.schreuders.org/publications/Computers&Security%20-%20The%20State%20of%20the%20Art%20of%20Application%20Restrictions%20and%20Sandboxes%20-%20Author%20Version.pdf) # Lab A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. diff --git a/scenarios/labs/ads_7_apparmor.xml b/scenarios/labs/ads_7_apparmor.xml index b432d9dac..88bed811e 100644 --- a/scenarios/labs/ads_7_apparmor.xml +++ b/scenarios/labs/ads_7_apparmor.xml @@ -15,16 +15,12 @@ [Slides continued here](http://z.cliffe.schreuders.org/presentations/slides/slides_out_sandboxing/ADS_PDS_Lectures_8_Sandboxes_and_Virtualisation.html) # Lectures for the next two weeks - [Secure software development](https://leedsbeckettreplay.cloud.panopto.eu/Panopto/Pages/Viewer.aspx?id=31ee4531-1834-4028-8829-aa1d00a73a7e) [Secure design principles](https://leedsbeckettreplay.cloud.panopto.eu/Panopto/Pages/Viewer.aspx?id=6f409b1c-2daa-4798-8bc7-aa2400952d29) [Slides](http://z.cliffe.schreuders.org/presentations/slides/slides_secure_design/ADS_PDS_Lectures_3_Secure_Software_Development_and_Bug_Hunting.html) -# Reading -[Chapters 3 "Policies and Guidelines" and 4 "Users, Passwords, and Authentication": Garfinkel, S. Spafford, G. and Schwartz, A. (2003), Practical Unix and Internet Security, O'Reilly. (ISBN-10: 0596003234)](https://www-dawsonera-com.ezproxy.leedsbeckett.ac.uk/abstract/9781449310325) - # Lab A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot.