Students

COMP2320 – Offensive Security

2022 – Session 2, In person-scheduled-weekday, North Ryde

General Information

Download as PDF
Unit convenor and teaching staff Unit convenor and teaching staff
Damian Jurd
Natasha Fernandes
Credit points Credit points
10
Prerequisites Prerequisites
Corequisites Corequisites
(COMP2110 or COMP249) and (COMP2250 or COMP247) and (COMP2300 or COMP343)
Co-badged status Co-badged status
Unit description Unit description
This unit provides an introduction to ethical hacking and offensive security. Strong emphasis is given to ethics and ethical behaviour as students are exposed to penetration techniques and methods. In other words, students are taught how to systematically look for and exploit vulnerabilities in software, protocols and systems in order to report those vulnerabilities and improve the safety of those software, protocols and systems. Communication, in speaking and writing plays a critical role in this unit. The most proficient students in this unit may be selected to represent the University at various national pentesting competitions and challenges.

Important Academic Dates

Information about important academic dates including deadlines for withdrawing from units are available at https://www.mq.edu.au/study/calendar-of-dates

Learning Outcomes

On successful completion of this unit, you will be able to:

  • ULO1: Explain the importance of ethics and ethical behaviour in relation to offensive security and penetration testing.
  • ULO2: Perform scoping, vulnerability scanning and reconnaissance on a range of devices, platforms, protocols, systems and organisations.
  • ULO3: Exploit vulnerabilities for a range of purposes, including access control, payload delivery and privilege escalation.
  • ULO4: Effectively communicate results verbally and in-writing to technical and non-technical audiences.

General Assessment Information

Late assessments are not accepted in this unit unless a Special Consideration has been submitted and approved.

Assessment Tasks

Name Weighting Hurdle Due
In-class exercises 18% No Weekly
CTF #1 24% No Weeks 4 and 5
CTF #2 24% No Weeks 8 and 9
CTF #3 24% No Weeks 12 and 13
Research and Presentation 10% No Week 13

In-class exercises

Assessment Type 1: Quiz/Test
Indicative Time on Task 2: 9 hours
Due: Weekly
Weighting: 18%

 

During workshops, you will be set an in-class exercise related to that week's lecture topic to complete during the class. Your work will be checked and marked in the workshop class in which it is completed. No late submissions are accepted.

 


On successful completion you will be able to:
  • Explain the importance of ethics and ethical behaviour in relation to offensive security and penetration testing.
  • Perform scoping, vulnerability scanning and reconnaissance on a range of devices, platforms, protocols, systems and organisations.
  • Exploit vulnerabilities for a range of purposes, including access control, payload delivery and privilege escalation.

CTF #1

Assessment Type 1: Project
Indicative Time on Task 2: 12 hours
Due: Weeks 4 and 5
Weighting: 24%

 

This capture-the-flag exercise will be completed during scheduled class time. Teams will compete against each other and students will be assessed individually via a report to be submitted one week after the CTF.

 


On successful completion you will be able to:
  • Perform scoping, vulnerability scanning and reconnaissance on a range of devices, platforms, protocols, systems and organisations.
  • Exploit vulnerabilities for a range of purposes, including access control, payload delivery and privilege escalation.
  • Effectively communicate results verbally and in-writing to technical and non-technical audiences.

CTF #2

Assessment Type 1: Project
Indicative Time on Task 2: 12 hours
Due: Weeks 8 and 9
Weighting: 24%

 

This capture-the-flag exercise will be completed during scheduled class time. Teams will compete against each other and students will be assessed individually via a report to be submitted one week after the CTF.

 


On successful completion you will be able to:
  • Perform scoping, vulnerability scanning and reconnaissance on a range of devices, platforms, protocols, systems and organisations.
  • Exploit vulnerabilities for a range of purposes, including access control, payload delivery and privilege escalation.
  • Effectively communicate results verbally and in-writing to technical and non-technical audiences.

CTF #3

Assessment Type 1: Project
Indicative Time on Task 2: 12 hours
Due: Weeks 12 and 13
Weighting: 24%

 

This capture-the-flag exercise will be completed during scheduled class time. Teams will compete against each other and students will be assessed individually via a report to be submitted one week after the CTF.

 


On successful completion you will be able to:
  • Perform scoping, vulnerability scanning and reconnaissance on a range of devices, platforms, protocols, systems and organisations.
  • Exploit vulnerabilities for a range of purposes, including access control, payload delivery and privilege escalation.
  • Effectively communicate results verbally and in-writing to technical and non-technical audiences.

Research and Presentation

Assessment Type 1: Presentation
Indicative Time on Task 2: 5 hours
Due: Week 13
Weighting: 10%

 

Student groups will research a well known vulnerability (chosen by the teaching staff) and provide a presentation and demonstration of the vulnerability. Each presentation will be followed by a brief question-and-answer session. Group members will submit a report individually with a focus on the ethical implications of the use and misuse of the vulnerability.

 


On successful completion you will be able to:
  • Explain the importance of ethics and ethical behaviour in relation to offensive security and penetration testing.
  • Effectively communicate results verbally and in-writing to technical and non-technical audiences.

1 If you need help with your assignment, please contact:

  • the academic teaching staff in your unit for guidance in understanding or completing this type of assessment
  • the Writing Centre for academic skills support.

2 Indicative time-on-task is an estimate of the time required for completion of the assessment task and is subject to individual variation

Delivery and Resources

COMPUTING FACILITIES

COMP2320 is a BYOD (Bring Your Own Device) unit. You will be expected to bring your own laptop computer (Windows, Mac, or Linux) to the workshop, install and configure the required software, and incorporate secure practices into your daily work (and play!) routines.

CLASSES

Each week you should complete any assigned readings and review the lecture slides in order to prepare for the lecture. There are two hours of lectures and a two-hour workshop timetabled every week as a four hour block. Some weeks will utilise all four hours for hands-on activities. The hands-on exercises in workshops help to reinforce concepts introduced during the lectures. You will find it helpful to read the workshop instructions before attending - that way, you can get to work quickly! For details of days, times, and rooms consult the timetables webpage. Note that Workshops commence in week 1. Please note that you will be required to submit work every week.

RECOMMENDED TEXTS

The following two textbooks contain the bulk of the weekly readings.

  1. Penetration Testing: A Hands-On Introduction to Hacking, by Georgia Weidman (available online from the library).
  2. The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, by Dafydd Stuttard and Marcus Pinto (available online from the library).
  3. Hands-On Ethical Hacking and Network Defense, 3rd Edition, by Michael T. Simpson, Nicholas Antill (available online from the library).
  4. Business Data Communications and Networking, 13th Edition, by FitzGerald, Dennis, and Durcikova (available online from the library).

WEB RESOURCES

Unit Websites COMP2320 is administered via iLearn (http://ilearn.mq.edu.au/).

Lecture recordings Digital recordings of lectures may be available. When available they will be linked from iLearn.

DISCUSSION BOARDS

This unit makes use of discussion boards hosted within iLearn. Please post questions there; they are monitored by the staff on the unit.

GENERAL NOTES

In this unit, you should do the following:

  • Attend lectures, take notes, ask questions.
  • Attend your weekly practical session.
  • Ensure that you participate in the CTF exercises.
  • Read appropriate sections of the text, add to your notes, and prepare questions for your lecturer/tutor.
  • Work on any assignments that have been released.

Lecture notes will be made available each week but these notes are intended as an outline of the lecture only and are not a substitute for your own notes or the recommended reading list.

Unit Schedule

Tentative teaching schedule, subject to change:

Week

Module

Lecture Topics

Assessment

Weight

Submit

1

Systems

Introduction, ethics, group selection,Virtual machines, kali linux, windows, file systems, process models, vulnerabilities

In-class exercise

2%

Diagnostic test

2

In-class exercise

2%

 

3

In-class exercise

2%

 

4

CTF #1

24%

CTF #1 Journal

5

Web

Web infrastructure, injections, cross-site scripting, cookies, headers, fuzzing, vulnerabilities

In-class exercise

2%

CTF #1 Report

6

In-class exercise

2%

 

7

In-class exercise

2%

 

Mid-semester week 1

Class Recess

 

 

Mid-semester week 2

8

CTF #2

24%

CTF #2 Journal

9

Networking

Network stack, scanning, services, authentication protocols, services, vulnerabilities

In-class exercise

2%

CTF #2 Report

10

In-class exercise

2%

 

11

In-class exercise

2%

 

12

CTF #3

24%

CTF #3 Journal

13

Presentations

 

Group presentations

10%

CTF #3 Report

Policies and Procedures

Macquarie University policies and procedures are accessible from Policy Central (https://policies.mq.edu.au). Students should be aware of the following policies in particular with regard to Learning and Teaching:

Students seeking more policy resources can visit Student Policies (https://students.mq.edu.au/support/study/policies). It is your one-stop-shop for the key policies you need to know about throughout your undergraduate student journey.

To find other policies relating to Teaching and Learning, visit Policy Central (https://policies.mq.edu.au) and use the search tool.

Student Code of Conduct

Macquarie University students have a responsibility to be familiar with the Student Code of Conduct: https://students.mq.edu.au/admin/other-resources/student-conduct

Results

Results published on platform other than eStudent, (eg. iLearn, Coursera etc.) or released directly by your Unit Convenor, are not confirmed as they are subject to final approval by the University. Once approved, final results will be sent to your student email address and will be made available in eStudent. For more information visit ask.mq.edu.au or if you are a Global MBA student contact globalmba.support@mq.edu.au

Academic Integrity

At Macquarie, we believe academic integrity – honesty, respect, trust, responsibility, fairness and courage – is at the core of learning, teaching and research. We recognise that meeting the expectations required to complete your assessments can be challenging. So, we offer you a range of resources and services to help you reach your potential, including free online writing and maths support, academic skills development and wellbeing consultations.

Student Support

Macquarie University provides a range of support services for students. For details, visit http://students.mq.edu.au/support/

The Writing Centre

The Writing Centre provides resources to develop your English language proficiency, academic writing, and communication skills.

The Library provides online and face to face support to help you find and use relevant information resources. 

Student Services and Support

Macquarie University offers a range of Student Support Services including:

Student Enquiries

Got a question? Ask us via AskMQ, or contact Service Connect.

IT Help

For help with University computer systems and technology, visit http://www.mq.edu.au/about_us/offices_and_units/information_technology/help/

When using the University's IT, you must adhere to the Acceptable Use of IT Resources Policy. The policy applies to all who connect to the MQ network including students.


Unit information based on version 2022.05 of the Handbook