Google launches ‘how to hack’ course
Want to learn how hackers work? Try out Google’s new course.
Google has launched a new course to teach students how hackers find security vulnerabilities and exploit web applications.
Participants in Google's Web Application Exploits and Defenses codelab get to play the part of a malicious hacker, finding and exploiting security bugs.
"The codelab is built around Jarlsberg, a small yet full-featured microblogging application with lots of security bugs," explained Bruce Leban, a software engineer at Google, in an introduction to the course.
The Jarlsberg application, which lets users publish bits of text and store files, is riddled with bugs including denial of service (DoS), information disclosure and remote code execution.
Students will get to try out two forms of attacking, the first being black-box hacking'. With this, they will try and locate security bugs by experimenting with the application, manipulating input fields and URL parameters. Participants will also try to cause application errors, while monitoring HTTP requests and responses to guess server behaviour.
White-box hacking', meanwhile, allows the user to look through the Jarlsberg source code to find bugs, which can also be located using automated or manual analysis.
While Google is elucidating on how cyber criminals work, its aim is to show how software developers can protect applications and stop hackers in their tracks.
The search giant warned that participants should use what they learn to make their own applications more secure and not use their new-found knowledge to attack any applications other than their own. Even the latter should be done with proper permission from the right authorities, Google added, such as the company's security team.
Graham Cluley, senior technology consultant at IT security firm Sophos, said that education on finding security vulnerabilities in software and how to write code more securely is "very important for firms".
He told IT PRO that this can help stop the problems at the source and prevent hackers from exploiting vulnerabilities later on.
The IT Pro guide to Windows 10 migration
Everything you need to know for a successful transitionDownload now
Managing security risk and compliance in a challenging landscape
How key technology partners grow with your organisationDownload now
Software-defined storage for dummies
Control storage costs, eliminate storage bottlenecks and solve storage management challengesDownload now
6 best practices for escaping ransomware
A complete guide to tackling ransomware attacksDownload now