week01

COMP6443

Thanks Lachlan+Andrew for some of the slides

Good faith policy

We expect a high standard of professionalism from you at all times while you are taking any of our courses. We expect all students to act in good faith at all times

TLDR: Don’t be a dick

sec.edu.au/good-faith-policy

> whoami

  • George Muscat
  • 4th Year CS (Security)

how to contact me

  • Email: g.muscat@unsw.edu.au <– Official Stuff
  • Teams: George Muscat <– Quicker Official Stuff
  • @woop.xyz on the SecSoc Discord <– Unofficial Stuff

useful info

  • Everything is on WebCMS3
  • Lectures are very important

places for course discussion

> whoareu

  • Your name, degree, year?
  • What time did you sleep last night?
  • Networks, frontend?

Questions

Course content

  • Wargames (10%)
  • 2 x PenTesting reports (40%)
  • Mid-term (0%) (Ask if not sure)
  • Final (50%)

Wargames

  • don’t leave them to the last minute, you’ll be sad :(

  • you should do the majority of the hacking individually, however you can help each other when really stuck

  • within the same week, the number will (mostly) correspond with difficulty

  • most won’t solve all the challenges. That is ok.

Report

  • pentesting / vulnerability report
    • groups of 3 in this tutorial
    • TAKE NOTES AS YOU GO
    • really important

Recon

passive & active

Passive

Finding information about the target without interacting with the infra/site

A.K.A OSINT

  • Google dorking
  • Certificate records
  • LinkedIn
  • Shodan

Active

Anything where you are interacting with the infra/site

  • DNS (incl. bruteforcing)
  • Certificates
  • Endpoints
  • Source code
  • Headers

Bruteforcing at Uni

if you use automated tools, pls dont use uni DNS servers, use these :)

  • NO BRUTEFORCING USING UNI DNS SERVERS
  • Use these DNS servers:
    • Google - 8.8.8.8
    • Cloudflare - 1.1.1.1

DNS

Things to know (or google):

  • DNS
  • A, AAAA, MX, PTR, TXT
  • DoH

Tools

Passive

  • nslookup
  • dig
  • Google dorking
  • crt.sh
  • DNS Dumpster
  • Wayback Machine
  • Wolfram Alpha

Active

NOTE: When using these tools, ensure you rate limit yourself to avoid getting your IP restricted (Your family will hate this)

  • nmap
  • subbrute
  • sublist3r
  • dns recon

These tools need wordlists, Seclists is a good place to start

HTTP

Hyper Text Transfer Protocol

  • First lecture!
  • Format is important
  • Headers are interesting and important
    • Method (GET/POST/PUT etc)
    • Host
    • Path
    • User-agent
    • Content-[length/type]
    • Origin

Activities

  • Finish installing burp suite & setting up certs
  • Signing up/logging into ctfd.quoccabank.com
  • Try out some of the challenges!
    • Recon stuffs

Demo

BurpSuite and ProxySwitchy oh my