Slides 03
Agenda
What is hacking
Type of hacking
Steps in hacking
How to get started
How to get better at it
Findings your first job internship
Importance of community
Slide 3
Slide 3 text
Slides 04
Security Consultant @The SecOps Group
Synack Red Team member
Passive bugbounty Hunter
Twitter: @cyph3r_asr
LinkedIn: anugrah-sr
Web: anugrahsr.in
Blog: p1boom.com
initcrew Core team Member
Slide 4
Slide 4 text
Slides 05
This slides and talks are just overview of
the large spectrum of cyber Secuity...
swasha kosham sponge pole aan...
Cautions
Slide 5
Slide 5 text
Slides 06
Hacking refers to activities that seek to compromise
digital devices, such as computers, smartphones,
tablets, and even entire networks.
nowadays most references to hacking, and hackers,
characterize it/them as unlawful activity by
cybercriminals
What is hacking?
Slide 6
Slide 6 text
Many think that “hacker” refers to some self-taught whiz
kid or rogue programmer skilled
Who are
hackers?
Slides 10
Slide 7
Slide 7 text
Just for fun
Show off
Spy someone
Cybercrimes
Steal information
Money
Power
Ego
Breakup Glow?
Why
Hackers
Hack?
Slides 09
Slide 8
Slide 8 text
Bad!
White Hat Grey Hat Black Hat
The Good one!
( Nanmayulla lokame.mp3)
Mix of Good and Bad!
Type of Hacker
Slides 11
Great power comes with great responsibility
Slide 9
Slide 9 text
Slides 17
Cybercrime up 600% Due to COVID-19
Pandemic
It is estimated that, worldwide, cyber crimes will
cost $10.5 trillion annually by 2025.
Cybercrime cost makes up a value worth 1% of
the Global GDP.
71.1 million people fall victim to cyber crimes
yearly.
It costs $180 per record with PII that was
breached.
So What?
Slides 06
Network
Host
People Involved
First step of Hacking, Information gathering phase
Collect as much info as possible
Active and Passive Recon
Reconnaissance
Slide 13
Slide 13 text
Slides 06
Port Scanning: Open ports, Services running etc
Vulnerability Scanning: Check target's vulnerability
Network Mapping: Get of overview of connected
systems
Scanning
Slide 14
Slide 14 text
Slides 06
Password attacks
Social engineering
Malwares
Gaining Access
Phase where attacker breaks into system/Network
Slide 15
Slide 15 text
Slides 06
Trojan
Rootkits
Malicious files
Maintaining Access
Phase where attacker wants persistence connection
without user's knowledge
Slide 16
Slide 16 text
Slides 06
Modifying/corrupting/deleting logs, registry
Uninstall and delete applications and file
Clearing Tracks
Not getting trapped
Slide 17
Slide 17 text
Slides 12
How to get started
How internet works
What happens behind the browser
SCRIPTING AND PROGRAMMING
Bash, Python, GO (No need to be an
expert)
HOW APPS/Devices WORKS
Try Everything and Select!
Slide 18
Slide 18 text
Offensive vs Defensive
Slides 15
Security Operations Center (SOC)
Threat Intelligence
Digital Forensics and Incident Response (DFIR)
Penetration Tester
Red Teamer - Plays the role of an adversary
Security Engineer
Slide 19
Slide 19 text
Slides 06
Googling most of the time
Reading Reading Reading
Videos [Talks, POCs]
Vulnerable Labs
Where should i learn?
https://github.com/sbilly/awesome-security
Slide 20
Slide 20 text
Slides 06
Where should i learn?
https://github.com/sbilly/awesome-security
Infosec Twitter
Bugbounty Tips
Direct access to experts
Giveaways
Youtube
Stok
Nahamsec
InsiderPhD
...
Labs
Tryhackme
Hackthebox
WebSec Acadamy
Pentesterlab
hacker101 ctf
Blogs
Medium! Special shoutout to
Infosec Write-ups
Pentesterland
Hackerone disclosed Reports
Slide 21
Slide 21 text
How I Started?
Slides 13
Slide 22
Slide 22 text
What I learnt after 100days?
Slides 13
Learn to google
Learn to ask the right question.
Don't expect someone will spoon feed you, You have to do your work.
Engage with the community, gather people around you having the same mindset.
Network as much as you can.
Give back to the community.
Persistence is the key.
There is no overnight success.
Slide 23
Slide 23 text
Slides 13
"To follow the path:
Look to the master.
Follow the master.
Walk with the master.
See through the master.
Become the master."
- Zen Proverb
Slide 24
Slide 24 text
Slides 13
Internship/Job Hunting?
Skills
Up skill yourself
Portfolio
Make a strong portfolio for
yourself. Be a contributor,
curator or a builder.
Apply
Raw Application or
Referral
Good Resume/CV
The ultimate aim in this
competitive field is that you
need to stand out in the crowd
https://www.p1boom.com/2022/01/how-to-find-your-first-cyber-security-internship.html.html
Slide 25
Slide 25 text
Slides 13
Make a strong portfolio for yourself.
Be a contributor, curator or a builder.
Blogs, Tools, Tweets, Repos, Newsletter,
Talks etc..
You lose nothing by sending a “Hi”
message, but can gain much more.
Slide 26
Slide 26 text
Slides 14
Importance of Community
Likeminded peoples
More Opportunity to grow and
improve
Chance to meet your future
cofounder, hacking buddy,
partner!
Unimaginable support
Infosec Twitter, LinkedIn, Discord.
Slide 27
Slide 27 text
Slides 15
https://initcrew.com
Slide 28
Slide 28 text
Slides 16
Learn More!
Slide 29
Slide 29 text
Thank You For
Attention
Slides 19
You lose nothing by
sending a “Hi”, but can
gain much more.
YES NO
Twitter: @cyph3r_asr
LinkedIn: anugrah-sr
Web: www.anugrahsr.in