Google launches ‘how to hack’ course

Want to learn how hackers work? Try out Google’s new course.

Hacker

Google has launched a new course to teach students how hackers find security vulnerabilities and exploit web applications.

Participants in Google's Web Application Exploits and Defenses codelab get to play the part of a malicious hacker, finding and exploiting security bugs.

"The codelab is built around Jarlsberg, a small yet full-featured microblogging application with lots of security bugs," explained Bruce Leban, a software engineer at Google, in an introduction to the course.

The Jarlsberg application, which lets users publish bits of text and store files, is riddled with bugs including denial of service (DoS), information disclosure and remote code execution.

Students will get to try out two forms of attacking, the first being black-box hacking'. With this, they will try and locate security bugs by experimenting with the application, manipulating input fields and URL parameters. Participants will also try to cause application errors, while monitoring HTTP requests and responses to guess server behaviour.

White-box hacking', meanwhile, allows the user to look through the Jarlsberg source code to find bugs, which can also be located using automated or manual analysis.

While Google is elucidating on how cyber criminals work, its aim is to show how software developers can protect applications and stop hackers in their tracks.

The search giant warned that participants should use what they learn to make their own applications more secure and not use their new-found knowledge to attack any applications other than their own. Even the latter should be done with proper permission from the right authorities, Google added, such as the company's security team.

Graham Cluley, senior technology consultant at IT security firm Sophos, said that education on finding security vulnerabilities in software and how to write code more securely is "very important for firms".

He told IT PRO that this can help stop the problems at the source and prevent hackers from exploiting vulnerabilities later on.

Featured Resources

Seven steps to connect and empower your frontline workers

How business leaders can improve communication with a secure platform

Free download

Create what’s next

The future of collaboration and productivity

Free Download

Leveraging the cloud without relinquishing control

Your data. Their cloud.

Free download

Re-architecting for nonstop innovation

Unlocking productivity, scalability, and lower costs for cloud natives

Free Download

Recommended

Gmail vs Outlook.com: Which one is better?
email providers

Gmail vs Outlook.com: Which one is better?

26 Nov 2021
Hacked Google Cloud Platform instances are riddled with cryptominers
cloud computing

Hacked Google Cloud Platform instances are riddled with cryptominers

26 Nov 2021
Podcast transcript: Can the US take on big tech?
Policy & legislation

Podcast transcript: Can the US take on big tech?

19 Nov 2021
The IT Pro Podcast: Can the US take on big tech?
Policy & legislation

The IT Pro Podcast: Can the US take on big tech?

19 Nov 2021

Most Popular

How to speed up Microsoft's Windows 11
Microsoft Windows

How to speed up Microsoft's Windows 11

9 Nov 2021
Nike to take customers into the metaverse with 'NIKELAND'
virtualisation

Nike to take customers into the metaverse with 'NIKELAND'

19 Nov 2021
Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

12 Nov 2021