week01
COMP6443
Thanks Lachlan+Andrew for some of the slides
Good faith policy
We expect a high standard of professionalism from you at all times while you are taking any of our courses. We expect all students to act in good faith at all times
TLDR: Don’t be a dick
sec.edu.au/good-faith-policy
> whoami
- George Muscat
- 4th Year CS (Security)
useful info
- Everything is on WebCMS3
- Lectures are very important
places for course discussion
> whoareu
- Your name, degree, year?
- What time did you sleep last night?
- Networks, frontend?
Course content
- Wargames (10%)
- 2 x PenTesting reports (40%)
- Mid-term (0%) (Ask if not sure)
- Final (50%)
Wargames
don’t leave them to the last minute, you’ll be sad :(
you should do the majority of the hacking individually, however you can help each other when really stuck
within the same week, the number will (mostly) correspond with difficulty
most won’t solve all the challenges. That is ok.
Report
- pentesting / vulnerability report
- groups of 3 in this tutorial
- TAKE NOTES AS YOU GO
- really important
Passive
Finding information about the target without interacting with the infra/site
A.K.A OSINT
- Google dorking
- Certificate records
- LinkedIn
- Shodan
Active
Anything where you are interacting with the infra/site
- DNS (incl. bruteforcing)
- Certificates
- Endpoints
- Source code
- Headers
Bruteforcing at Uni
if you use automated tools, pls dont use uni DNS servers, use these :)
- NO BRUTEFORCING USING UNI DNS SERVERS
- Use these DNS servers:
- Google - 8.8.8.8
- Cloudflare - 1.1.1.1
DNS
Things to know (or google):
- DNS
- A, AAAA, MX, PTR, TXT
- DoH
Passive
- nslookup
- dig
- Google dorking
- crt.sh
- DNS Dumpster
- Wayback Machine
- Wolfram Alpha
Active
NOTE: When using these tools, ensure you rate limit yourself to avoid getting your IP restricted (Your family will hate this)
- nmap
- subbrute
- sublist3r
- dns recon
These tools need wordlists, Seclists is a good place to start
HTTP
Hyper Text Transfer Protocol
- First lecture!
- Format is important
- Headers are interesting and important
- Method (GET/POST/PUT etc)
- Host
- Path
- User-agent
- Content-[length/type]
- Origin
Activities
- Finish installing burp suite & setting up certs
- Signing up/logging into ctfd.quoccabank.com
- Try out some of the challenges!
Demo
BurpSuite and ProxySwitchy oh my