Josh goes live on facebook to talk about the C2C!
Cyber attacks - We were at an ethical hacking competition involving simulated cyber attacks.
Students from 25 of the best universities in the UK and USA are competing in an ethical hacking competition.
Swipe presenter Gemma Morris answered your questions and comments
Congratulations to our new committee!
Thanks to those who came along to our agm, and we look forward to seeing you all at our meetings in the new year!
We'll be electing a committee for next year at this year's AGM.
We may also be discussing potential changes to our constitution.
If you intend on running for a position and would like more information, please message our page, or email us at email@example.com.
See you there!...
President: The President shall oversee the organisation and management of the Group and the Committee as a whole; ensure the officers’ accountability to Members, the Committee, and the Students’ Union; and represent the Group to all external interests.
Secretary: The Secretary shall oversee the administration of the Group, take minutes at General Meetings and Meetings of the Committee, and maintain the register.
Treasurer: The Treasurer shall oversee the financing of the Group, set the Group's budget, and maintain the accounts of the Group.
Events/Social Secretary: The Events/Social Secretary shall provide social and cultural pursuits for the Group’s Members on a large/small scale, such as Balls, sojourns, conferences and nights out.
Vice-President: The Vice-President shall assist the President with the day-to-day running of the society as well as assisting with establishment and development of industrial relationships.
Technical Officer: The Technical Officer is primarily responsible for the technical aspects of the Group such as hardware and development of other technical items. They may also be required to coordinate with the Webmaster from time to time.
Webmaster: The Webmaster shall be primarily responsible for the running and development of the website. They shall also coordinate with the Technical Officer where appropriate.
MWR InfoSecurity will be presenting a workshop on password cracking, and the techniques involved in cracking hashes. The workshop will cover the basics of password cracking and leveraging basic techniques to optimise attacks against large hashlists as well as targetted attacks. You will also learn what makes a strong password. Finally, there’ll be a competition as to who can crack the most hashes.
It would be beneficial for participants to set up OpenCL on their laptops befor...ehand to work with hashcat v3.30. This can be tested by running a benchmark with the command 'hashcat -b -m 0' as well as running the example scripts that come with hashcat. Typically, OpenCL comes with the drivers for your CPU / GPU, and having the latest version of these provide OpenCL. If this is not the case, there will be guides online for your OS and hardware. The SUCSS committee can help set this up in advance and there are links to assist below.
There will be pizza + beer/cider.
Hashcat - https://hashcat.net/hashcat/
Hashcat GitHub Repo - https://github.com/hashcat/hashcat
Ubuntu/Mint guide - https://blog.sciguy16.pw/…/installing-hashcat3-on-linux-mi…/
In this session, we'll be looking at reverse engineering and the dangers of modifying binaries for linux machines (and hopefully windows when we set up some examples to try!).
Please bring laptops! Sadly we don't have any decompiler software on the lab machines. Correction: I found some on uglogin.
Location: Zepler Computing Lab, Building 59 Level 3.
In this event, we'll be exploring SQL injection. After a short talk on what SQL is, and how it fits into client and server side web technologies, we'll move over to some practical challenges allowing you to explore the dangers of not parameterising your SQL queries!
MWR InfoSecurity will be presenting a talk on privilege escalation, the process of elevating your access rights to gain greater privileges on a system, or access information that wasn't available from your original access point. How do you go from a low privileged shell to root on unix? How to you get administrator on a windows system? We'll cover the methodologies, information gathering techniques and a number of system specific routes to escalating your privileges.
In addition to the above, there'll be a short discussion on how to get into the industry, the different roles available and the kind of things you can do to make yourself more attractive to employers.
Join us at 6:30PM this Friday 21st October in 53/4025, beer/cider and pizza will be provided.
We'll be holding our first event of the year on the 4th October, in the Level 3 computing lab in Zepler (Building 59).
Starting off, we'll introduce our society and committee, and then we'll be following our 30mins learning and 30-mins practice routine to learn about the linux terminal, use basic shell commands, and potentially connect to IRC.
You don't absolutely need to bring anything for this event, but it may be handy to bring a laptop if you would like to set up an environment and some tools to try in your spare time.