Slide 1

Slide 1 text

HACKING 101 Slides 01 Anugrah SR

Slide 2

Slide 2 text

Slides 03 Agenda What is hacking Type of hacking Steps in hacking How to get started How to get better at it Findings your first job internship Importance of community

Slide 3

Slide 3 text

Slides 04 Security Consultant @The SecOps Group Synack Red Team member Passive bugbounty Hunter Twitter: @cyph3r_asr LinkedIn: anugrah-sr Web: anugrahsr.in Blog: p1boom.com initcrew Core team Member

Slide 4

Slide 4 text

Slides 05 This slides and talks are just overview of the large spectrum of cyber Secuity... swasha kosham sponge pole aan... Cautions

Slide 5

Slide 5 text

Slides 06 Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. nowadays most references to hacking, and hackers, characterize it/them as unlawful activity by cybercriminals What is hacking?

Slide 6

Slide 6 text

Many think that “hacker” refers to some self-taught whiz kid or rogue programmer skilled Who are hackers? Slides 10

Slide 7

Slide 7 text

Just for fun Show off Spy someone Cybercrimes Steal information Money Power Ego Breakup Glow? Why Hackers Hack? Slides 09

Slide 8

Slide 8 text

Bad! White Hat Grey Hat Black Hat The Good one! ( Nanmayulla lokame.mp3) Mix of Good and Bad! Type of Hacker Slides 11 Great power comes with great responsibility

Slide 9

Slide 9 text

Slides 17 Cybercrime up 600% Due to COVID-19 Pandemic It is estimated that, worldwide, cyber crimes will cost $10.5 trillion annually by 2025. Cybercrime cost makes up a value worth 1% of the Global GDP. 71.1 million people fall victim to cyber crimes yearly. It costs $180 per record with PII that was breached. So What?

Slide 10

Slide 10 text

Slides 08 Recent Hacks

Slide 11

Slide 11 text

Slides 07 Reconnaissance Scanning Gaining Access Maintaining Access Clearing Tracks How Hacker's Hack?

Slide 12

Slide 12 text

Slides 06 Network Host People Involved First step of Hacking, Information gathering phase Collect as much info as possible Active and Passive Recon Reconnaissance

Slide 13

Slide 13 text

Slides 06 Port Scanning: Open ports, Services running etc Vulnerability Scanning: Check target's vulnerability Network Mapping: Get of overview of connected systems Scanning

Slide 14

Slide 14 text

Slides 06 Password attacks Social engineering Malwares Gaining Access Phase where attacker breaks into system/Network

Slide 15

Slide 15 text

Slides 06 Trojan Rootkits Malicious files Maintaining Access Phase where attacker wants persistence connection without user's knowledge

Slide 16

Slide 16 text

Slides 06 Modifying/corrupting/deleting logs, registry Uninstall and delete applications and file Clearing Tracks Not getting trapped

Slide 17

Slide 17 text

Slides 12 How to get started How internet works What happens behind the browser SCRIPTING AND PROGRAMMING Bash, Python, GO (No need to be an expert) HOW APPS/Devices WORKS Try Everything and Select!

Slide 18

Slide 18 text

Offensive vs Defensive Slides 15 Security Operations Center (SOC) Threat Intelligence Digital Forensics and Incident Response (DFIR) Penetration Tester Red Teamer - Plays the role of an adversary Security Engineer

Slide 19

Slide 19 text

Slides 06 Googling most of the time Reading Reading Reading Videos [Talks, POCs] Vulnerable Labs Where should i learn? https://github.com/sbilly/awesome-security

Slide 20

Slide 20 text

Slides 06 Where should i learn? https://github.com/sbilly/awesome-security Infosec Twitter Bugbounty Tips Direct access to experts Giveaways Youtube Stok Nahamsec InsiderPhD ... Labs Tryhackme Hackthebox WebSec Acadamy Pentesterlab hacker101 ctf Blogs Medium! Special shoutout to Infosec Write-ups Pentesterland Hackerone disclosed Reports

Slide 21

Slide 21 text

How I Started? Slides 13

Slide 22

Slide 22 text

What I learnt after 100days? Slides 13 Learn to google Learn to ask the right question. Don't expect someone will spoon feed you, You have to do your work. Engage with the community, gather people around you having the same mindset. Network as much as you can. Give back to the community. Persistence is the key. There is no overnight success.

Slide 23

Slide 23 text

Slides 13 "To follow the path: Look to the master. Follow the master. Walk with the master. See through the master. Become the master." - Zen Proverb

Slide 24

Slide 24 text

Slides 13 Internship/Job Hunting? Skills Up skill yourself Portfolio Make a strong portfolio for yourself. Be a contributor, curator or a builder. Apply Raw Application or Referral Good Resume/CV The ultimate aim in this competitive field is that you need to stand out in the crowd https://www.p1boom.com/2022/01/how-to-find-your-first-cyber-security-internship.html.html

Slide 25

Slide 25 text

Slides 13 Make a strong portfolio for yourself. Be a contributor, curator or a builder. Blogs, Tools, Tweets, Repos, Newsletter, Talks etc.. You lose nothing by sending a “Hi” message, but can gain much more.

Slide 26

Slide 26 text

Slides 14 Importance of Community Likeminded peoples More Opportunity to grow and improve Chance to meet your future cofounder, hacking buddy, partner! Unimaginable support Infosec Twitter, LinkedIn, Discord.

Slide 27

Slide 27 text

Slides 15 https://initcrew.com

Slide 28

Slide 28 text

Slides 16 Learn More!

Slide 29

Slide 29 text

Thank You For Attention Slides 19 You lose nothing by sending a “Hi”, but can gain much more. YES NO Twitter: @cyph3r_asr LinkedIn: anugrah-sr Web: www.anugrahsr.in