Slide 1

Slide 1 text

Hey. 1

Slide 2

Slide 2 text

2 Hacking is not black and white by Kumar Ashwin

Slide 3

Slide 3 text

Look out for something interesting. 3

Slide 4

Slide 4 text

Why are we here? 4

Slide 5

Slide 5 text

5

Slide 6

Slide 6 text

C A I Confidentiality Integrity Availability 6

Slide 7

Slide 7 text

hacking the gaining of unauthorized access to data in a system or computer. /ˈhakɪŋ/ 7

Slide 8

Slide 8 text

Web Security Mobile Security Cloud Security IoT Security Network Security Social Engineering Reverse Engineering Malware Analysis Cryptography Etc. 8

Slide 9

Slide 9 text

Good engineering involves thinking about how things can be made to work; the security mindset involves thinking about how things can be made to fail. It involves thinking like an attacker, an adversary or a criminal. https://www.schneier.com/blog/archives/2008/03/the_security_mi_1.html 9

Slide 10

Slide 10 text

Reconnaissance (OSINT) Scanning or Enumeration Exploration Maintaining Access Clearing Access Post Exploitation Reporting 10

Slide 11

Slide 11 text

11 Red Team Blue Team Detect and prevent security controls Exploit, compromise, and circumvent https://blog.eccouncil.org/red-team-vs-blue-team/

Slide 12

Slide 12 text

Learn the CTF? way 12

Slide 13

Slide 13 text

13 Jeopardy Attack & Defence Linear King of the Hill Life 100 Decimal 200 EasyOne 300 BINARY SCRIPTING WEB Joe’s 100 Love 200 Round 300 Code 100 Cash 200 Again 300

Slide 14

Slide 14 text

14 Jeopardy Attack & Defence Linear King of the Hill Team 1 Team 2 Team 3 Team 4 Team 1’s Server Team 2’s Server Team 3’s Server Team 4’s Server Defend Attack

Slide 15

Slide 15 text

15 Jeopardy Attack & Defence Linear King of the Hill Team 1 Team 2 Team 3 Team 4 Central Server

Slide 16

Slide 16 text

16 Jeopardy Attack & Defence Linear King of the Hill Lvl 1 Lvl 2 Lvl 3 Lvl 4

Slide 17

Slide 17 text

CTFs are awesome 17 ZGV2Y3t5b3VfYXJlX2F3ZXNvbWV9

Slide 18

Slide 18 text

CTFs are a great way to learn. Not necessarily the only way. 18

Slide 19

Slide 19 text

horrible passwords 19

Slide 20

Slide 20 text

Resources 20

Slide 21

Slide 21 text

21 ___ / /\ /__/\ / /::\ \__\:\ / /:/\:\ / /::\ / /:/ \:\ __/ /:/\/ /__/:/ \__\:\ /__/\/:/~~ \ \:\ / /:/ \ \::/ \ \:\ /:/ \ \:\ \ \:\/:/ \__\/ \ \::/ \__\/ Hacker101 www.hackingarticles.in InfoSec WriteUps POCs B O O K S Web Application Hackers Handbook Red Team Field Manual The Hacker’s Playbook

Slide 22

Slide 22 text

22

Slide 23

Slide 23 text

Did you find something interesting in the slide deck?

Slide 24

Slide 24 text

ZGV2Y3t5b3VfYXJlX2F3ZXNvbWV9

Slide 25

Slide 25 text

25 $ whoami

Slide 26

Slide 26 text

26 Hack for good! 0xCardinal