
    

    <?xml version="1.0" encoding="utf-8"?>
<!-- generator="FeedCreator 1.7.2-ppt DokuWiki" -->
<?xml-stylesheet href="http://ocw.cs.pub.ro/courses/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="http://ocw.cs.pub.ro/courses/feed.php">
        <title>CS Open CourseWare cns:extra</title>
        <description></description>
        <link>http://ocw.cs.pub.ro/courses/</link>
        <image rdf:resource="http://ocw.cs.pub.ro/courses/lib/tpl/arctic/images/favicon.ico" />
       <dc:date>2026-05-17T00:59:21+03:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="http://ocw.cs.pub.ro/courses/cns/extra/assembly-language?rev=1570448562&amp;do=diff"/>
                <rdf:li rdf:resource="http://ocw.cs.pub.ro/courses/cns/extra/dynamic-analysis?rev=1570449081&amp;do=diff"/>
                <rdf:li rdf:resource="http://ocw.cs.pub.ro/courses/cns/extra/gdb?rev=1602418293&amp;do=diff"/>
                <rdf:li rdf:resource="http://ocw.cs.pub.ro/courses/cns/extra/ida?rev=1604326240&amp;do=diff"/>
                <rdf:li rdf:resource="http://ocw.cs.pub.ro/courses/cns/extra/start?rev=1485614625&amp;do=diff"/>
                <rdf:li rdf:resource="http://ocw.cs.pub.ro/courses/cns/extra/static-analysis?rev=1570449055&amp;do=diff"/>
                <rdf:li rdf:resource="http://ocw.cs.pub.ro/courses/cns/extra/web-app-security-01?rev=1485614545&amp;do=diff"/>
                <rdf:li rdf:resource="http://ocw.cs.pub.ro/courses/cns/extra/web-app-security-02?rev=1647254561&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="http://ocw.cs.pub.ro/courses/lib/tpl/arctic/images/favicon.ico">
        <title>CS Open CourseWare</title>
        <link>http://ocw.cs.pub.ro/courses/</link>
        <url>http://ocw.cs.pub.ro/courses/lib/tpl/arctic/images/favicon.ico</url>
    </image>
    <item rdf:about="http://ocw.cs.pub.ro/courses/cns/extra/assembly-language?rev=1570448562&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2019-10-07T14:42:42+03:00</dc:date>
        <title>Assembly Language</title>
        <link>http://ocw.cs.pub.ro/courses/cns/extra/assembly-language?rev=1570448562&amp;do=diff</link>
        <description>*   Slides
	*  Keywords: assembly, mnemonics, instructions, architecture, ISA, registers, addressing modes, CISC and RISC, memory-to-memory, load-store, assembling, linking, control flow, arithmetic/logical, data transfer, function calls, system calls, disassembling, objdump, NOP</description>
    </item>
    <item rdf:about="http://ocw.cs.pub.ro/courses/cns/extra/dynamic-analysis?rev=1570449081&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2019-10-07T14:51:21+03:00</dc:date>
        <title>Processes. Dynamic Analysis. GDB</title>
        <link>http://ocw.cs.pub.ro/courses/cns/extra/dynamic-analysis?rev=1570449081&amp;do=diff</link>
        <description>*  Slides
	*  Keywords: static analysis, dynamic analysis, process, blackbox, profiling, debugging, fuzzing, strace / ltrace, lsof / pmap, perf, GDB, LLDB, JTAG, breakpoint, info, examine, ni, si, backtrace, up, down, write, searchmem, dynamic linking, dynamic loading, lazy binding, trampoline, PLT, GOT</description>
    </item>
    <item rdf:about="http://ocw.cs.pub.ro/courses/cns/extra/gdb?rev=1602418293&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-10-11T15:11:33+03:00</dc:date>
        <title>The GNU Debugger (GDB)</title>
        <link>http://ocw.cs.pub.ro/courses/cns/extra/gdb?rev=1602418293&amp;do=diff</link>
        <description>Getting help with GDB

Whenever you want to find out more information about GDB commands feel free to search for it inside the documentation or by using the help command followed by your area of interest. For example searching for help for the disassemble command can be obtained by running the following command in GDB:</description>
    </item>
    <item rdf:about="http://ocw.cs.pub.ro/courses/cns/extra/ida?rev=1604326240&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-11-02T16:10:40+03:00</dc:date>
        <title>Debugging with IDA</title>
        <link>http://ocw.cs.pub.ro/courses/cns/extra/ida?rev=1604326240&amp;do=diff</link>
        <description>Debugging with IDA

 IDA is a:

	*  disassembler (As a disassembler, IDA explores binary programs, for which source code isn't always available, to create maps of their execution)
	*   debugger ( IDA can be used as a local and as a remote debugger on various platforms, including the ubiquitous 80×86, typically Windows/Linux and the ARM platform and other platforms)
	*  decompiler (IDA can transform binary applications into a high level readable text. Unlike disassemblers, which perform the same …</description>
    </item>
    <item rdf:about="http://ocw.cs.pub.ro/courses/cns/extra/start?rev=1485614625&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-01-28T16:43:45+03:00</dc:date>
        <title>Extra</title>
        <link>http://ocw.cs.pub.ro/courses/cns/extra/start?rev=1485614625&amp;do=diff</link>
        <description>Extra resources for the CNS class, such as old labs.
extra index</description>
    </item>
    <item rdf:about="http://ocw.cs.pub.ro/courses/cns/extra/static-analysis?rev=1570449055&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2019-10-07T14:50:55+03:00</dc:date>
        <title>Executables. Static Analysis</title>
        <link>http://ocw.cs.pub.ro/courses/cns/extra/static-analysis?rev=1570449055&amp;do=diff</link>
        <description>*  Slides
	*  Keywords: static analysis, dynamic analysis, executable, ELF, library, object file, readelf, section, segment, access rights, disassembling, objdump, nm, symbols, linker, ld, static linking, dynamic linking



Demos

For obtaining the demo archive, run the following commands:</description>
    </item>
    <item rdf:about="http://ocw.cs.pub.ro/courses/cns/extra/web-app-security-01?rev=1485614545&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-01-28T16:42:25+03:00</dc:date>
        <title>Web Application Security (part 1)</title>
        <link>http://ocw.cs.pub.ro/courses/cns/extra/web-app-security-01?rev=1485614545&amp;do=diff</link>
        <description>Resources

	*  Google search options
	*  Wapiti, Skipfish
	*  Burp
	*  HTTP methods: GET vs. POST
	*  RFC 6265: HTTP State Management Mechanism

Supporting files

For this lab, install the Burp suite. Download the free version, copy it in the home directory and run it later using:</description>
    </item>
    <item rdf:about="http://ocw.cs.pub.ro/courses/cns/extra/web-app-security-02?rev=1647254561&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-03-14T12:42:41+03:00</dc:date>
        <title>Web Application Security (part 2)</title>
        <link>http://ocw.cs.pub.ro/courses/cns/extra/web-app-security-02?rev=1647254561&amp;do=diff</link>
        <description>Resources

	*  OWASP Testing Guide v4, Section 4.8 Input validation testing
	*  Command injection
	*  SQL Cheat Sheet - Oracle SQL &amp; PostgreSQL
	*  SQL injection
	*  SQL Injection Cheat Sheet
	*  Reflected XSS versus Stored XSS
	*  DOM-based XSS
	*  Same-origin policy
	*  Burp Suite Cheat Sheet</description>
    </item>
</rdf:RDF>
