Slide 1

Slide 1 text

GETTING STARTED IN CYBERSECURITY APPLICATIONS, ATTACKS, TOOLS 1 RAKESHELAMARAN ©Rakesh Elamaran

Slide 2

Slide 2 text

WHO AM I ✧ Security Engineer 2 @COMCAST ✧ Security Researcher | Licensed Penetration Tester Master | Bug Hunter ✧ SIH - 2019 Finalist | CSI - Student Icon ✧ FOUNDER - Rootecstak and SVCE CyberHub ✧ OWASP Cuddalore Chapter - Leader ✧ Mentor | Speaker | Blogger 2 ©Rakesh Elamaran

Slide 3

Slide 3 text

CYBERSECURITY Cybersecurity Consists of technologies, processes and controls designed to protect systems, networks, programs, devices and data from cyber attacks. 3 ©Rakesh Elamaran

Slide 4

Slide 4 text

MAIN PURPOSE ✧ To prevent data breaches, identity theft and cyber-attacks as well as risk management in some cases. ✧ It encompasses everything that pertains to protecting our PII Data. ✧ Software changes when its updated and modified that leads to welcome new bugs,issues, and vulnerabilities and allows for cyber attacks. 4 ©Rakesh Elamaran

Slide 5

Slide 5 text

CIA TRIAD ✧ Confidentiality - Data is Kept Secret ✧ Integrity - Data is trustworthy and free from tampering ✧ Availability - Data should be available to authorized users 5 ©Rakesh Elamaran

Slide 6

Slide 6 text

DATA BREACH ✧ The business world is not new to data breaches and cyber threats.Digital transformation has accelerated the growth of online platforms, showing us just how crucial security in the digital age is. ✧ But it’s not just the big companies and organizations that get hit.Everyday consumers experience phishing schemes, ransomware attacks, identity theft, data breaches, and financial losses. ✧ It is very easy to hack a device connected to the internet the more we rely on, the more we are prone to attacks. 6 ©Rakesh Elamaran

Slide 7

Slide 7 text

PROTECTION  Cyber attacks occurring every 14 seconds, firewalls, antivirus softwares and tools must be in place.  Strong security infrastructure includes multiple layers of protection.  Organizations must remain up-to-date with the emerging technologies, threat and security intelligence trends in order to design the ideal cyber- security measures.  Encryption,secure passwords, constant software upgradation helps. 7 ©Rakesh Elamaran

Slide 8

Slide 8 text

ETHICAL HACKING  Ethical Hacking is an authorized practice of bypassing system security to identify potential data breaches and threats in a network.  The company that owns the system or network allows Cybersecurity Engineers to perform such activities in order to test the system’s defenses. 8 ©Rakesh Elamaran

Slide 9

Slide 9 text

TYPES OF HACKERS ✧ WHITE HAT - Ethical hackers or Security Researchers do not intend to harm the system or organization. ✧ BLACK HAT - Contrary to an ethical hacker,they perform hacking to fulfill their selfish intentions to collect monetary benefits. ✧ GREY HAT - They hack without any malicious intention for fun. They perform the hacking without any approval from the targeted organization. 9 ©Rakesh Elamaran

Slide 10

Slide 10 text

PENETRATION TESTING ✧ Penetration testing is a part of ethical hacking, where it focuses explicitly on penetrating only the information systems. ✧ The ultimate goal is to identify and prioritize Security Risks. 10 ©Rakesh Elamaran

Slide 11

Slide 11 text

VULNERABILITY ANALYSIS/ASSESSMENT ✧ The process of identifying risks and vulnerabilities in computer networks, systems, hardware, applications. ✧ Do Evaluation, assigns severity levels to those vulnerabilities, and recommends remediation or mitigation. ✧ Vulnerability scanners tools are used to identify threats and flaws within an organization's. 11 ©Rakesh Elamaran

Slide 12

Slide 12 text

ETHICAL HACKING VS PEN TESTING ✧ Ethical hacking is a practice.The skills employed by an ethical hacker allow them to practice a continuous assessment cycle of an organization’s security posture by employing the same tools, methods, and techniques of a malicious hacker. ✧ Ethical Hacking is NOT Penetration Testing! ✧ Penetration Testing is Ethical Hacking! 12 ©Rakesh Elamaran

Slide 13

Slide 13 text

DEMO STEGANOGRAPHY: ✧ It is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination. ✧ Data can be audio, video, image or text file. 13 ©Rakesh Elamaran

Slide 14

Slide 14 text

APPLICATIONS ✧ To use the Built in Applications Virtual Box and Kali Linux / Parrot OS is Mandatory. ✧ Applications are Easy to Use. ✧ For Everything there is a tool. ( A-Z) 14 ©Rakesh Elamaran

Slide 15

Slide 15 text

DEMO Information Gathering Social Engineering SYSTEM HACKING 15 ©Rakesh Elamaran

Slide 16

Slide 16 text

INFORMATION GATHERING ✧ Process of collecting information about something you are interested in. ✧ In the digital world, a lot of information can be gathered in different ways, not with your senses, but with several methods, tools and techniques. 16 ©Rakesh Elamaran

Slide 17

Slide 17 text

SOCIAL ENGINEERING  Social engineering is the art of manipulating people so they give up confidential information. Attacks can happen online, in-person, and via other interactions. 17 ©Rakesh Elamaran

Slide 18

Slide 18 text

FOR WHO?  Young Professionals Starting their careers  Experienced professionals moving from one career into Cybersecurity  Professionals at all levels wanting to learn more about it to better protect their personal and business lives 18 ©Rakesh Elamaran

Slide 19

Slide 19 text

GRC VS TECHNICAL ✧ Strategic includes Governance, Risk, and Compliance (GRC), Policy, IT Audit, security frameworks and management. ✧ Tactical includes everything technical security systems administration, networking, application security, security operations, incident response, vulnerability management, and penetration testing. ✧ Pick the one where you have most strength. ✧ Caution: Don't try to do both but Be aware of the other Side . 19 ©Rakesh Elamaran

Slide 20

Slide 20 text

WHAT SHOULD I CHOOSE?  DEGREE  MASTERS  CERTIFICATION  JOB - HOP IN 20 ©Rakesh Elamaran

Slide 21

Slide 21 text

ROLES 21 ©Rakesh Elamaran

Slide 22

Slide 22 text

CERTIFICATIONS 22 ©Rakesh Elamaran

Slide 23

Slide 23 text

HOW TO START ↴ knowledge of computer and how Internet works ↴ Computer Networks - Protocols,ports,servers,etc | Basics to Advanced ↴ Linux Concepts - Learn Linux strongly and practice in Kali ↴ Cryptography and Network Security - Encryption,Decryption,Algorithms,etc ↴ CYBERSECURITY - Practice Strongly and learn new concepts ↴ Tryhackme, Hack the Box, Portswigger labs,Capture the flag challenges - To Sharpen your skills ↴ Bug Bounty - Lots of practice,patience and efforts. 23 ©Rakesh Elamaran

Slide 24

Slide 24 text

WHAT TO LEARN  Malware and Reverse Engineering: C,C++,C#,Embedded C,Assembly  Scripting: Python, Ruby, Perl.  Security Testing : Html,css,java script,php,java,SQL  Shell Scripting: Bash,Shell Scripting 24 ©Rakesh Elamaran

Slide 25

Slide 25 text

DOMAINS ✧ Web Application Security ✧ Android Security ✧ Cloud Security ✧ Cyber Forensics ✧ Malware Analysis ✧ Red Teaming ✧ Vulnerability Assessment & Exploit Development ✧ IOT and RFID Pentesting ✧ API Pentesting ✧ Blockchain & Decentralised Systems ✧ Cryptography and Network Security ✧ Hardware Security 25 ©Rakesh Elamaran

Slide 26

Slide 26 text

GOOD CHOICE? ✧ Unlimited Growth ✧ Set your style ✧ Easy to explore different paths ✧ Learn and EARN ✧ Engineers with cybersecurity chops and more than three years of experience can make up to Rs30 lakhs a year, HR experts said. ✧ On the other hand, a software developer with five years at a multinational firm would earn only around Rs15 lakhs a year. 26 ©Rakesh Elamaran

Slide 27

Slide 27 text

INTERVIEW PREPARATION ✧ Follow the Roadmap ✧ Be Strong in Basics ✧ Choose domain and prepare accordingly ✧ Stay updated in the cybersecurity industry ✧ Explain In terms of Real time and its impact ✧ Attain Value added Certifications ✧ Descent Resume - Projects,Research Works,Achievements ✧ Achievements - Hall of fame, CVES , Bounty , Recognition ✧ Be passionate and confident 27 ©Rakesh Elamaran

Slide 28

Slide 28 text

ATTACKS 28 ©Rakesh Elamaran

Slide 29

Slide 29 text

BUG ✧ Bug Bounties aka responsible disclosure programmes are setup by companies to encourage researchers to report potential issues on their sites ✧ Some companies chose to reward a researcher with money,swag, or hall of fame ✧ Values your Resume and Skills | Glory and Fame | Practical Knowledge | Money 29 ©Rakesh Elamaran

Slide 30

Slide 30 text

BOUNTY ✧ Platforms ✧ BugCrowd,Hackerone Synack , Intigriti ✧ Go for rvdp programs ✧ Duplicates are Painful ✧ Quality >> Quantity ✧ Patience >> Bounty - Money 30 ©Rakesh Elamaran

Slide 31

Slide 31 text

PARAMETER TAMPERING ✧ Parameter tampering attack relies on the manipulation of parameters changed by the user so as to change application information like user credentials and permissions and amount of product, etc. ✧ Usually, this data is passed in post request or in hidden kind fields. ✧ This vulnerability is almost present in every online shopping carts and payment gateways these days. ✧ Ex: bewakoof.com, donacakes.com 31 ©Rakesh Elamaran

Slide 32

Slide 32 text

SQL INJECTION ✧ SQL injection is a code injection technique that might destroy your database. ✧ It is one of the most common web hacking techniques. ✧ It usually occurs when you ask a user for input, like their username/userid 32 ©Rakesh Elamaran

Slide 33

Slide 33 text

ONLINE CYBER SAFETY ✧ Refrain publishing sensitive information on any social media ✧ Keep Complex Passwords and never share to anyone ✧ Printers, wifi, webcams and computers, should be shut down when not in use ✧ Don't Meet online acquaintances alone ✧ Don't Share more than necessary ✧ Check for Https lock symbol ✧ Update Device Regularly, Keep 2FA, Use antivirus ✧ Visit banks website by typing the URL in the address bar ✧ Unlink Card details from E-commerce sites ✧ Don't share Personal Emails and phone number, have backup ✧ There is no such thing as freebies. Ex: Amazon,flipkart URL's ✧ Block people you don’t want to interact with 33 ©Rakesh Elamaran

Slide 34

Slide 34 text

WHAT WE DO ✧ Act as a Security Professional ✧ Tests the security and identifies loopholes ✧ Conduct Threat Modeling ✧ Create Reports and analysis ✧ Authorized with proper permissions ✧ Spread Awareness to students and professionals ✧ Earns money and respect too 34 ©Rakesh Elamaran

Slide 35

Slide 35 text

WHERE IT ENDS ✧ Start career as Security Researcher or Associate ✧ Cybersecurity Analyst / Consultant - Penetration Tester ✧ Cybersecurity Manager / Engineer / Architect ✧ Security Director ✧ Chief Information Security officer - CISO 35 ©Rakesh Elamaran

Slide 36

Slide 36 text

HOW CYBERSECURITY IS NOW? ↳ Organizations Understood the Importance of security ↳ Expanding Security Teams ↳ Conducting Threat Modeling ↳ IOT and Cloud Evolving ↳ Social Engineering attacks getting smarter ↳ Rise of Ransomware and security threats ↳ Data Privacy as a discipline ↳ Having Responsible Disclosure policy ↳ Appreciation | Recognition | Swags | Hall of Fame | BugBounty 36 ©Rakesh Elamaran

Slide 37

Slide 37 text

DISCLAIMER  Any time the word “Hacking/Hacker” that is used shall be regarded as Ethical Hacking/Hacker.  These materials are for educational and awareness purposes only.Do not attempt to violate the law with anything contained here.  If so,Speaker or College/Club is not responsible for the actions that individual violate. 37 ©Rakesh Elamaran

Slide 38

Slide 38 text

CONCLUSION ✧ "Choose a job you love" ✧ The number of cybersecurity jobs is increasing every single day.The key is identifying the skills and strengths. ✧ Hackers attack every 39 seconds, on an average of 2,244 times a day! When you give this a thought, you will realize how important Cybersecurity is? 38 ©Rakesh Elamaran

Slide 39

Slide 39 text

SOME TIPS ✧ Get Ready to deal with errors ✧ Learn how to use google and find resources like pro ✧ Stay updated and Make progress ✧ Consistency is the key to success ✧ Be Active in Linkedin,Security Forums,and communities ✧ Connect with like minded students and Infosec professionals ✧ ROOTECSTAK 39 ©Rakesh Elamaran

Slide 40

Slide 40 text

ANY QUERIES? 40 ©Rakesh Elamaran

Slide 41

Slide 41 text

REACH OUT  www.rakeshelamaran.tech  Linked In: Rakesh Elamaran  Instagram: rakesh_elamaran 41 ©Rakesh Elamaran