NTU CSIE CSCAMP-2019
Confidentiality
Things don't get exposed
Integrity
Things don't get modified
Availability
Things / Service are accessible
Server
Client
The website you see
Things going behind
request
response
<scheme>://<netloc>/<path>?<query>
URL
https://M30W.tw/search?q=ctf
<scheme>://<netloc>/<path>?<query>
URL
https://M30W.tw/search?q=ctf
https : Hypertext Transfer Protocol Secure
<scheme>://<netloc>/<path>?<query>
URL
https://M30W.tw/search?q=ctf
M30W.tw : domain name
<scheme>://<netloc>/<path>?<query>
URL
https://M30W.tw/search?q=ctf
search : path of the document
<scheme>://<netloc>/<path>?<query>
URL
https://M30W.tw/search?q=ctf
q=ctf : purpose of request
the two most common methods are
HTTP methods
GET :
POST :
Other stuff worth knowing
HTTP request header
GET /query?q=ctf HTTP/1.1
Host: M30W.tw
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:56.0)
Gecko/20100101 Firefox/56.0
Accept: text/html,application/xhtml+xml,application/xml;
Connection: keep-alive
HTTP response header
HTTP/1.1 200 OK
Date: Sat, 23 March 2019 20:00:00 GMT
Server: Apache/2.4.18 (Ubuntu)
Last-Modified: Sat, 23 March 2019 21:00:00 GMT
ETag: "69fe-56ce289380252"
Accept-Ranges: bytes
Content-Length: 27134
Vary: Accept-Encoding
Connection: close
Content-Type: text/plain
status codes
Other stuff worth knowing
HTTP vs HTTPS
Other stuff worth knowing
What is a cookie
Where to find cookie
HTTP request headers
All problems can be found at 139.162.125.106:4000
What is javascript
XSS
XSS types
Reflected XSS
Stored XSS
DOM Based XSS
XSS prevention
Prelude : Basic bash
bash is a widely used shell
Common Vulnerabilities
Running code that comes from user
Common Vulnerabilities
How to deal with it
What is SQL
SQL Commands
ref :
https://www.codecademy.com/articles/sql-commands
SQL Injections
SQL Injections Types
How to deal with it
Rule of least privilege
Information leakage
Robots.txt
git/svn
.DS_Store
.swp / ~
github
Finding and leveraging Vulnerabilities in executables
Interpreting executable and gaining useful information
Website Vulnerabilities
Cryptography
** modern cryptography relies heavily on math
The art of hiding message
Recovering digital trail