{"id":527,"date":"2013-08-08T07:41:19","date_gmt":"2013-08-08T06:41:19","guid":{"rendered":"http:\/\/its.informatik.htw-aalen.de\/wp\/?p=527"},"modified":"2016-12-11T20:59:50","modified_gmt":"2016-12-11T19:59:50","slug":"analyse-von-schwachstellen-in-informationssystemen","status":"publish","type":"post","link":"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=527","title":{"rendered":"Analyse von Schwachstellen in Informationssystemen"},"content":{"rendered":"<p><!--more--><\/p>\n<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-overflow:visible;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-1 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:17;--minFontSize:17;line-height:1.5;\">Allgemeine Informationen<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep-double sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div>\n<ul>\n<li><span style=\"line-height: 13px;\">Vorlesungsnummer: 57595<\/span><\/li>\n<li>Umfang: 2 SWS<\/li>\n<li>Aufwand: 3 CP<\/li>\n<\/ul>\n<div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-2 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:17;--minFontSize:17;line-height:1.5;\">Termine<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep-double sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div>\n<p>Die Vorlesung findet im Rahmen einer Summer School als Blockveranstaltung statt:<\/p>\n<ul>\n<li><span style=\"line-height: 13px;\">Montag, \u00a05.8.2013 bis Donnerstag, 8.8.2013, 9:30 Uhr bis 16:30 Uhr<\/span><\/li>\n<li>Freitag, 9.8.2013, 9:30 Uhr bis 12:00 Uhr<\/li>\n<\/ul>\n<p>Die Summer School findet im Labor G2 1.31 statt.<\/p>\n<div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-3 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:17;--minFontSize:17;line-height:1.5;\">Unterlagen<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep-double sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div>\n<div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:16px;--awb-icon-alignment:left;--awb-hover-color:#f9f9f9;--awb-border-color:#cccccc;--awb-background-color:#ffffff;--awb-divider-color:#e0dede;--awb-divider-hover-color:#e0dede;--awb-icon-color:#ffffff;--awb-title-color:#333333;--awb-content-color:#747474;--awb-icon-box-color:#333333;--awb-toggle-hover-accent-color:#67b7e1;--awb-title-font-family:&quot;PT Sans Caption&quot;;--awb-title-font-weight:400;--awb-title-font-style:normal;--awb-title-font-size:14px;--awb-title-letter-spacing:0px;--awb-title-line-height:1.54;--awb-content-font-family:&quot;PT Sans&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-boxed\" id=\"accordion-527-1\">\n<div class=\"fusion-panel panel-default panel-2d08c5677cfadbd37 fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_2d08c5677cfadbd37\"><a aria-expanded=\"false\" aria-controls=\"2d08c5677cfadbd37\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-527-1\" data-target=\"#2d08c5677cfadbd37\" href=\"#2d08c5677cfadbd37\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Beschreibung der Lehrveranstaltung<\/span><\/a><\/h4><\/div><div id=\"2d08c5677cfadbd37\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_2d08c5677cfadbd37\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-1 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"http:\/\/its.informatik.htw-aalen.de\/docs\/MH\/lv-57595-schwachstellen-analyse.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Download<\/span><\/a><\/div>\n<p>Stand: 7.5.2013<\/div><\/div><\/div>\n<div class=\"fusion-panel panel-default panel-7e556c3b98917641a fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_7e556c3b98917641a\"><a aria-expanded=\"false\" aria-controls=\"7e556c3b98917641a\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-527-1\" data-target=\"#7e556c3b98917641a\" href=\"#7e556c3b98917641a\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Think Python EBook<\/span><\/a><\/h4><\/div><div id=\"7e556c3b98917641a\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_7e556c3b98917641a\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-2 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"http:\/\/its.informatik.htw-aalen.de\/docs\/ASIS\/think-python.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Download<\/span><\/a><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<p>&nbsp;<\/p>\n<div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-4 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:17;--minFontSize:17;line-height:1.5;\">Projekte<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep-double sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div>\n<p>Vor und w\u00e4hrend der Summer School sind folgende Projekte zu bearbeiten.<div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:16px;--awb-icon-alignment:left;--awb-hover-color:#f9f9f9;--awb-border-color:#cccccc;--awb-background-color:#ffffff;--awb-divider-color:#e0dede;--awb-divider-hover-color:#e0dede;--awb-icon-color:#ffffff;--awb-title-color:#333333;--awb-content-color:#747474;--awb-icon-box-color:#333333;--awb-toggle-hover-accent-color:#67b7e1;--awb-title-font-family:&quot;PT Sans Caption&quot;;--awb-title-font-weight:400;--awb-title-font-style:normal;--awb-title-font-size:14px;--awb-title-letter-spacing:0px;--awb-title-line-height:1.54;--awb-content-font-family:&quot;PT Sans&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-boxed\" id=\"accordion-527-2\">\n<div class=\"fusion-panel panel-default panel-2e7ab70a01e8be952 fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_2e7ab70a01e8be952\"><a aria-expanded=\"false\" aria-controls=\"2e7ab70a01e8be952\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-527-2\" data-target=\"#2e7ab70a01e8be952\" href=\"#2e7ab70a01e8be952\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Der Eingangstest (oder: Kommst Du hier rein?)<\/span><\/a><\/h4><\/div><div id=\"2e7ab70a01e8be952\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_2e7ab70a01e8be952\"><div class=\"panel-body toggle-content fusion-clearfix\">Ziel dieses Tests ist die \u00dcberpr\u00fcfung der Eignung der Teilnehmer dieses Kurses. Hierzu erh\u00e4lt jeder der Teilnehmer eine verschl\u00fcsselte Datei, die ein Archiv mit den Unterlagen zur Vorbereitung enth\u00e4lt. \u00dcber das Zustandekommen der Datei sind folgende Informationen bekannt:<\/p>\n<ul>\n<li>Die Verschl\u00fcsselung erfolgte mit einem Programm, dass man insbesondere in der Linux Kommandozeile ausf\u00fchren kann.<\/li>\n<li>Das Passwort ist eines der &#8220;10000 Top Passwords&#8221;, die man im Internet finden kann.<\/li>\n<\/ul>\n<p>Die Aufgabe ist wie folgt:<\/p>\n<ul>\n<li>Recherchieren Sie im Internet und finden Sie die besagte Passwortliste.<\/li>\n<li>Ermitteln Sie das Programm, das zum Verschl\u00fcsseln eingesetzt wurde.<br \/>\n<em>Tipp: <\/em>Mit dem passenden Linux Befehl ist dies nicht wirklich schwierig.<\/li>\n<li>Erstellen Sie ein Python Programm, um unter Einsatz der Passwortliste einen Brute-Force Angriff auf die verschl\u00fcsselte Datei durchzuf\u00fchren.<br \/>\n<em>Tipp: <\/em>Das Python Modul pexcept ist an dieser Stelle hilfreich und sollte deshalb auch benutzt werden.<\/li>\n<li>Nachdem Sie das Passwort der Datei ermittelt haben, entschl\u00fcsseln Sie das Archiv und lesen die bereitgestellten Unterlagen.<\/li>\n<\/ul>\n<p>Zur Teilnahme an der Summer School sind Sie berechtigt, wenn Sie Ihr Python Programm vorstellen und das Passwort, mit dem Ihr Archiv verschl\u00fcsselt wurde, \u00a0nennen k\u00f6nnen. Ach ja: Gruppenarbeit ist \u00fcbrigens erlaubt, wenn die Gruppe eine Gr\u00f6\u00dfe von drei Studenten nicht \u00fcbersteigt.<\/p>\n<p><em>Viel Erfolg!!!<\/em><\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-d4fe750dc957b31a9 fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_d4fe750dc957b31a9\"><a aria-expanded=\"false\" aria-controls=\"d4fe750dc957b31a9\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-527-2\" data-target=\"#d4fe750dc957b31a9\" href=\"#d4fe750dc957b31a9\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Projekt 1: Penetration Testing<\/span><\/a><\/h4><\/div><div id=\"d4fe750dc957b31a9\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_d4fe750dc957b31a9\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Das erste Projekt besch\u00e4ftigt sich mit der Durchf\u00fchrung von Penetration Tests. Weitere Details finden Sie in der Projektbeschreibung.<\/div><\/div><\/div>\n<div class=\"fusion-panel panel-default panel-4fc98992a0627a186 fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_4fc98992a0627a186\"><a aria-expanded=\"false\" aria-controls=\"4fc98992a0627a186\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-527-2\" data-target=\"#4fc98992a0627a186\" href=\"#4fc98992a0627a186\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Projekt 2: Schwachstellenanalyse mit Python<\/span><\/a><\/h4><\/div><div id=\"4fc98992a0627a186\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_4fc98992a0627a186\"><div class=\"panel-body toggle-content fusion-clearfix\">\nDas erste Projekt zeigt anhand von ausgew\u00e4hlten Beispielen, wie man die Programmiersprache Python als Werkzeug zur Schwachstellenanalyse einsetzen kann. Die Projektbeschreibung liefert weitere Details finden.<\/div><\/div><\/div>\n<div class=\"fusion-panel panel-default panel-f0ce23061ef3915cb fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_f0ce23061ef3915cb\"><a aria-expanded=\"false\" aria-controls=\"f0ce23061ef3915cb\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-527-2\" data-target=\"#f0ce23061ef3915cb\" href=\"#f0ce23061ef3915cb\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Projekt 3: Buffer Overflows und Shellcodes<\/span><\/a><\/h4><\/div><div id=\"f0ce23061ef3915cb\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_f0ce23061ef3915cb\"><div class=\"panel-body toggle-content fusion-clearfix\">\nIm dritten und abschlie\u00dfenden Projekt werden Buffer Overflows und Shellcodes behandelt. Die Projektbeschreibung liefert weitere Informationen.<\/div><\/div><\/div>\n<\/div><\/div>\n<p>&nbsp;<\/p>\n<div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-5 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:17;--minFontSize:17;line-height:1.5;\">Vorlesungen im aktuellen Semester<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep-double sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div>\n<div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-recent-posts fusion-recent-posts-1 avada-container layout-default layout-columns-4\"><section class=\"fusion-columns columns fusion-columns-4 columns-4\"><article class=\"post fusion-column column col col-lg-3 col-md-3 col-sm-3\"><div class=\"fusion-flexslider fusion-flexslider-loading flexslider flexslider-hover-type-none\"><ul class=\"slides\"><li><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=336\" aria-label=\"Kryptographische Protokolle\" class=\"hover-type-none\"><img decoding=\"async\" width=\"660\" height=\"405\" src=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2013\/03\/kryptografie-660x405.jpg\" class=\"attachment-recent-posts size-recent-posts\" alt=\"\" srcset=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2013\/03\/kryptografie-660x405.jpg 660w, https:&#x2f;&#47;i&#x74;&#115;&#46;&#x69;&#x6e;&#102;o&#x72;&#109;a&#x74;&#x69;&#107;&#46;&#x68;&#116;w&#x2d;&#x61;&#97;l&#x65;&#110;&#46;&#x64;&#x65;&#47;w&#x70;&#47;w&#x70;&#x2d;&#99;&#x6f;&#x6e;&#116;e&#x6e;&#116;\/&#x75;&#x70;&#108;o&#x61;&#100;s&#x2f;&#x32;&#48;1&#x33;&#47;0&#x33;&#x2f;&#107;r&#x79;&#112;t&#x6f;&#x67;&#114;&#x61;&#x66;&#105;e&#x2d;&#54;&#54;&#x30;&#x78;&#52;0&#x35;&#64;2&#x78;&#x2e;&#106;p&#x67; 1320w\" sizes=\"(max-width: 660px) 100vw, 660px\" \/><\/a><\/li><\/ul><\/div><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-05-12T08:48:14+02:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=336\">Kryptographische Protokolle<\/a><\/h4><p class=\"meta\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-05-12T08:48:14+02:00<\/span><span>12. May  2026<\/span><span class=\"fusion-inline-sep\">|<\/span><span class=\"fusion-comments\"><span>Comments Off<span class=\"screen-reader-text\"> on Kryptographische Protokolle<\/span><\/span><\/span><\/p><\/div><\/article><article class=\"post fusion-column column col col-lg-3 col-md-3 col-sm-3\"><div class=\"fusion-flexslider fusion-flexslider-loading flexslider flexslider-hover-type-none\"><ul class=\"slides\"><li><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1833\" aria-label=\"Sicherheit von Webanwendungen\" class=\"hover-type-none\"><img decoding=\"async\" width=\"700\" height=\"441\" src=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2018\/10\/sichere-webanwendungen-700x441.jpg\" class=\"attachment-recent-posts size-recent-posts\" alt=\"\" srcset=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2018\/10\/sichere-webanwendungen-320x202.jpg 320w, https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2018\/10\/sichere-webanwendungen-700x441.jpg 700w, https:&#x2f;\/&#x69;&#116;s&#x2e;&#105;&#x6e;&#102;o&#x72;&#109;&#x61;&#116;i&#x6b;&#46;&#x68;&#x74;w&#x2d;&#97;a&#x6c;&#101;&#x6e;&#46;d&#x65;&#47;&#x77;&#112;\/&#x77;&#112;&#x2d;&#x63;o&#x6e;&#116;e&#x6e;t&#x2f;&#117;p&#x6c;&#111;&#x61;&#100;s&#x2f;&#50;&#x30;&#49;8&#x2f;&#49;&#x30;&#x2f;s&#x69;&#99;h&#x65;&#114;&#x65;&#45;w&#x65;&#98;&#x61;&#110;w&#x65;&#110;&#x64;&#x75;n&#x67;&#101;n&#x2d;3&#x32;&#48;x&#x32;&#48;&#x32;&#64;2&#x78;&#46;&#x6a;&#x70;g 640w, https:&#x2f;&#x2f;&#105;t&#x73;&#x2e;&#105;&#110;f&#x6f;&#x72;&#109;&#97;t&#x69;&#x6b;&#46;ht&#x77;&#x2d;&#97;a&#x6c;&#x65;&#110;&#46;d&#x65;&#x2f;&#119;&#112;\/&#x77;&#x70;&#45;co&#x6e;&#x74;&#101;n&#x74;&#x2f;&#117;&#112;l&#x6f;&#x61;&#100;&#115;\/&#x32;&#x30;&#49;8\/&#x31;&#x30;&#47;s&#x69;&#x63;&#x68;&#101;r&#x65;&#x2d;&#119;&#101;b&#x61;&#x6e;&#119;&#101;n&#x64;&#x75;&#110;g&#x65;&#x6e;&#x2d;&#55;0&#x30;&#x78;&#52;&#52;1&#x40;&#x32;&#120;&#46;j&#x70;&#x67; 1400w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/a><\/li><\/ul><\/div><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-30T08:26:01+02:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1833\">Sicherheit von Webanwendungen<\/a><\/h4><p class=\"meta\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-30T08:26:01+02:00<\/span><span>30. April  2026<\/span><span class=\"fusion-inline-sep\">|<\/span><span class=\"fusion-comments\"><span>Comments Off<span class=\"screen-reader-text\"> on Sicherheit von Webanwendungen<\/span><\/span><\/span><\/p><\/div><\/article><article class=\"post fusion-column column col col-lg-3 col-md-3 col-sm-3\"><div class=\"fusion-flexslider fusion-flexslider-loading flexslider flexslider-hover-type-none\"><ul class=\"slides\"><li><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1240\" aria-label=\"Wahrscheinlichkeitstheorie und Statistik\" class=\"hover-type-none\"><img decoding=\"async\" width=\"700\" height=\"441\" src=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/04\/wahrscheinlichkeit-700x441.jpg\" class=\"attachment-recent-posts size-recent-posts\" alt=\"\" srcset=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/04\/wahrscheinlichkeit-320x202.jpg 320w, https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/04\/wahrscheinlichkeit-700x441.jpg 700w, https:&#x2f;\/&#x69;&#116;s&#x2e;&#105;&#x6e;&#102;o&#x72;&#109;&#x61;&#116;i&#x6b;&#46;&#x68;&#x74;w&#x2d;&#97;a&#x6c;&#101;&#x6e;&#46;d&#x65;&#47;&#x77;&#112;\/&#x77;&#112;&#x2d;&#x63;o&#x6e;&#116;e&#x6e;t&#x2f;&#117;p&#x6c;&#111;&#x61;&#100;s&#x2f;&#50;&#x30;&#49;6&#x2f;&#48;&#x34;&#x2f;w&#x61;&#104;r&#x73;&#99;&#x68;&#101;i&#x6e;&#108;&#x69;&#99;h&#x6b;&#101;&#x69;&#x74;-&#x33;&#50;0&#x78;2&#x30;&#50;&#64;&#x32;&#120;&#x2e;&#106;p&#x67; 640w, https:&#x2f;&#x2f;&#x69;&#x74;&#x73;&#x2e;&#x69;&#x6e;&#x66;&#x6f;&#x72;&#x6d;&#x61;&#x74;&#x69;&#x6b;&#x2e;&#x68;&#x74;&#x77;&#x2d;&#x61;&#x61;&#x6c;&#x65;&#x6e;&#x2e;&#x64;&#x65;&#x2f;&#x77;&#x70;&#x2f;&#x77;&#x70;&#x2d;&#x63;&#x6f;&#x6e;&#x74;&#x65;&#x6e;&#x74;&#x2f;&#117;&#112;&#108;&#111;&#97;&#100;&#115;&#47;&#50;&#48;&#49;&#54;&#47;&#48;&#52;&#47;&#119;&#97;&#104;&#114;&#115;&#99;&#104;&#101;&#105;&#110;&#108;&#105;&#99;&#104;&#107;eit-700x441&#64;2x&#46;jpg 1400w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/a><\/li><\/ul><\/div><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-22T20:26:06+02:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1240\">Wahrscheinlichkeitstheorie und Statistik<\/a><\/h4><p class=\"meta\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-22T20:26:06+02:00<\/span><span>22. April  2026<\/span><span class=\"fusion-inline-sep\">|<\/span><span class=\"fusion-comments\"><span>Comments Off<span class=\"screen-reader-text\"> on Wahrscheinlichkeitstheorie und Statistik<\/span><\/span><\/span><\/p><\/div><\/article><article class=\"post fusion-column column col col-lg-3 col-md-3 col-sm-3\"><div class=\"fusion-flexslider fusion-flexslider-loading flexslider flexslider-hover-type-none\"><ul class=\"slides\"><li><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1336\" aria-label=\"Sichere Programmierung\" class=\"hover-type-none\"><img decoding=\"async\" width=\"700\" height=\"441\" src=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/10\/sichere-programmierung-700x441.jpg\" class=\"attachment-recent-posts size-recent-posts\" alt=\"\" srcset=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/10\/sichere-programmierung-320x202.jpg 320w, https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/10\/sichere-programmierung-700x441.jpg 700w, https:&#x2f;&#x2f;&#105;t&#x73;&#x2e;&#x69;&#110;f&#x6f;&#x72;&#x6d;&#97;t&#x69;&#x6b;&#x2e;&#104;t&#x77;&#x2d;&#x61;&#97;l&#x65;&#x6e;&#x2e;&#100;e&#x2f;&#x77;&#x70;&#47;w&#x70;&#x2d;&#x63;&#111;n&#x74;&#x65;&#x6e;&#116;\/&#x75;&#x70;&#x6c;&#111;a&#x64;&#x73;&#x2f;&#50;0&#x31;&#x36;&#x2f;&#49;0&#x2f;&#x73;&#x69;&#99;h&#x65;&#x72;&#x65;&#45;p&#x72;&#x6f;&#x67;&#114;a&#x6d;&#x6d;&#x69;&#101;r&#x75;&#x6e;&#x67;&#45;3&#x32;&#x30;&#x78;&#50;0&#x32;&#x40;&#x32;&#120;&#46;&#x6a;&#x70;&#x67; 640w, https:\/&#47;&#105;&#x74;&#x73;&#46;&#105;&#110;&#x66;&#x6f;&#x72;m&#97;&#116;&#x69;&#x6b;&#46;h&#116;&#x77;&#x2d;&#x61;a&#108;&#101;&#x6e;&#x2e;de&#47;&#x77;&#x70;&#x2f;w&#112;&#45;&#x63;&#x6f;nt&#101;&#x6e;&#x74;&#x2f;u&#112;&#108;&#x6f;&#x61;&#x64;s&#47;&#50;&#x30;&#x31;6&#47;&#49;&#x30;&#x2f;&#x73;i&#99;&#104;&#x65;&#x72;e-&#112;&#x72;&#x6f;&#x67;r&#97;&#109;&#x6d;&#x69;er&#117;&#x6e;&#x67;&#x2d;7&#48;&#48;&#x78;&#x34;41&#64;&#x32;&#x78;&#x2e;j&#112;&#103; 1400w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/a><\/li><\/ul><\/div><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-20T09:39:04+02:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1336\">Sichere Programmierung<\/a><\/h4><p class=\"meta\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-20T09:39:04+02:00<\/span><span>20. April  2026<\/span><span class=\"fusion-inline-sep\">|<\/span><span class=\"fusion-comments\"><span>Comments Off<span class=\"screen-reader-text\"> on Sichere Programmierung<\/span><\/span><\/span><\/p><\/div><\/article><\/section><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":562,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,4],"tags":[9,15],"class_list":["post-527","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-vorlesung_archiv","category-vorlesung","tag-it-sicherheit","tag-vorlesung"],"_links":{"self":[{"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/posts\/527","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=527"}],"version-history":[{"count":53,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/posts\/527\/revisions"}],"predecessor-version":[{"id":1417,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/posts\/527\/revisions\/1417"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/media\/562"}],"wp:attachment":[{"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=527"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=527"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=527"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}