Preparing for the Competition

Slides:



Advertisements
Similar presentations
Crack WEP Lab Last Update Copyright 2014 Kenneth M. Chipps Ph.D.
Advertisements

Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Penetration Testing Edmund Whitehead Rayce West. Introduction - Definition of Penetration Testing - Who needs Penetration Testing? - Penetration Testing.
Introduction to Application Penetration Testing
Security Imperatives in a New Workplace Partnering to Protect Digital Information in the 21st Century Presented by Michael Ferris, Alaska Enterprise Solutions.
© 2015 MONASH SOUTH AFRICA CONFIDENTIAL & PROPRIETARY.
Prepared By, Mahadir Ahmad. StopBadware makes the Web safer through the prevention, mitigation, and remediation of badware websites. partners include.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Staying Safe Online Keep your Information Secure.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
I-Hack’08 International Hacking Competition “Details”
CANVAS REPORT/rvispute 16/4/2016 CANVAS Report for CTF Event at USAFA on 4/25/2007 Subject :Penetration Tools for Front Range Pen Test Exercise By Rajshri.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
ISCTF 2015 Capture The Flag Competition
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
MIDN Zac Dannelly. May 2009: President's 60-day Cyberspace Policy Review – "expand and train the workforce” May 2010: The Ad Hoc Committee on Cyber Security.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Cyber Security – The Changing Landscape Erick Weber Department of Public Works Khaled Tawfik Cyber Security.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
By Collin Donaldson Man in the Middle Attack: Password Sniffing and Cracking.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Top 10 Hacking Tool Welcome TO hackaholic Kumar shubham.
Season I – Wrestling, Boys Basketball and Girls Soccer Season Dates – August 16- October 1.
Geeks Need Basements. Who am I? Started in computer industry in 1982 Specializing in security for the past 15 years ASS (Application Security Specialist)
Season II –Boys Volleyball, Girls Badminton, Girls Softball, and Boys Baseball Season Dates – Oct 19 to December 10.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Intro to Ethical Hacking
Penetration Testing Social Engineering Attack and Web-based Exploitation CIS 6395, Incident Response Technologies Fall.
What they are and how to protect against them
ETHICAL HACKING WHAT EXACTLY IS ETHICAL HACKING ? By : Bijay Acharya
Taylor Jr High Athletics – Mar 21
A Comprehensive Security Assessment of the Westminster College Unix Lab Jacob Shodd.
Common Methods Used to Commit Computer Crimes
Secure Software Confidentiality Integrity Data Security Authentication
Wireless Network Security
Daniel Kouril, Ivo Nutar Masaryk University
Daniel Kouril Sven Gabriel
How to build a good reputation online
Teaching Internet Safety
Taylor Jr High Athletics – Jan 5
Year 10 ICT ECDL/ICDL IT Security.
Staying Austin College
CANVAS Report for CTF Event at USAFA on 4/25/2007
HOW TO MAKE YOUR GMAIL ACCOUNT SECURE…. At Google, we take account security very seriously. To protect your account, we strongly recommend following the.
Call AVG Antivirus Support | Fix Your PC
PT0-001 Dumps PDF CompTIA PenTest+ Exam Exam Code Exam Name.
Topic 5: Communication and the Internet
Intro to Ethical Hacking
RECONNAISSANCE & ENUMERATION
Malware March 26, 2018.
Intro to Ethical Hacking
Welcome to the Computer Lab.
September 2017 Example instruction slide for using web voting.
Taylor Jr High Athletics – dec 12
Introduction to Computer Security II
Cyber Operation and Penetration Testing Social Engineering Attack and Web-based Exploitation Cliff Zou University of Central Florida.
Bethesda Cybersecurity Club
Cyber security and Computer Misuse
WJEC GCSE Computer Science
6. Application Software Security
Bethesda Cybersecurity Club
Presentation transcript:

Preparing for the Competition Dates Scoring Tools Setting up your Computers

Disclaimer Nothing learned here should be used outside this room or on networks you do not have explicit permission to conduct tests on. Misuse of these skills will lead to immediate removal from further meetings. If I find you are acting in a way which is not in accordance with moral or ethical standards, I will make it my mission to specifically use you to test every attack I know. Enjoy.

Contact – Christopher Flatley Email chrisflatley@leadcybersolutions.com Phone (914) 393-9159 WhatsApp

Goal Prepare you for the NCL Competition as well as give you a strong working understanding of some of the tools used by security professionals in the cyber security field I will not be able to teach you everything but I can provide the groundwork for you to be able to go further and solve problems

Coaches can not help during the Preseason, Regular Season, or Post Season

Cost Pre / Regular Season Post Season $25 Per Player (Individual) $10 Per Player (2 to 5 People) Unlimited # of Teams per Institution

Brackets All Regular Season registrants will participate in a mandatory Preseason game. Based on the results of NCL’s mandatory Preseason Game, players will be placed in one of three brackets, to facilitate Regular Season play amongst individual players with similar knowledge and skill levels.  BRACKETS: The NCL Mandatory Preseason Game will identify individual players with similar knowledge and skill levels; players will be placed in one of 3 brackets as follows: Bronze: novice players. Players will have limited existing knowledge and skills and should be able to complete some or most of the preparatory lab exercises Silver: intermediate players. Players will have an intermediate level of knowledge and skills and should be able to complete all of the preparatory lab exercises Gold: experienced players. Players will have the highest level of knowledge and skills (e.g., have already completed relevant certifications and/or completed more advanced study)

At the end of the Preseason game, all players’ scores will be totaled and used to place players in the appropriate bracket in their Conference:

Ethical Behavior and Rules of Conduct 2017 Season (updated 02/25/17) Players are forbidden from accessing or attempting to access another player’s machine, or account Players are free to examine any target systems. Attacks or other offensive activity against any other player’s systems or the NCL systems is forbidden and will not be tolerated. Any player performing offensive activity against other players’, or the NCL’s systems, will be immediately disqualified and expelled from the game. You DO hereby have express permission to attack any asset designated as an NCL game "target," so long as you abide by the game rules and terms of this rules document.

Acquiring tools Be careful downloading from unknown places I have access to a repository of known safe downloads so if you are looking for something then I may have it That being said still be cautious, use Sandboxie and VirtualBox All Internet resources used during the game must be freely available to all players.

Recommended Tools & Equipment Game is cloud based but you do need to be able to download files and work on them on your computer External Hard Drive Dedicated Laptop

1 TB External HDD $55

Lenovo Thinkpad $34.62

Provided by me Laptop Hard drive loaded with Wordlists, programs, etc

Team Strategy Coaches can not help during the competition Working together as a team vs. picking individual strengths Write down your answers before submitting Accuracy counts Have someone check them over

Open Source intelligence Topics Malware Data Bitcoin Etc Programs Used Google Waybackmachine Example Question What is the CVE of the ransomware known as Bad Rabbit? How many seconds did the Bad Rabbit ransomware wait before launching an attack? What web framework is running on the website of www.leadcybersolutions.com? Who is the CTO for Lead Cyber Solutions?

Cryptography Topics Programs Used Example Question Cryptography Ciphers Steganagraphy Programs Used Cryptocrack Hashcat John the Ripper Digitial Invisible Ink Toolkit Example Question What is the flag in this picture? What is the plaintext of niosandionaiowdhuiduigqwiudgabduau?

Scanning Topics Programs Used Example Question Web Scanning Network Scanning Programs Used OWASP ZAP DirBuster Nmap Maltego Example Question Find hidden directory on webservers

Password Cracking Topics Programs Used Example Question OPH Crack John the Ripper Example Question QAsFnTG::18C3712B9296FE81AAD3B435B51404EE:F271C0A449D600DED85D615B3 6B92404:::

Log Analysis Topics Programs Used Example Question Splunk SQL Browser Lite Notepad ++ Example Question How many IP addresses logged into the system? When was there suspicious activity?

Network Traffic Analysis Topics Programs Used Wireshark Network Miner Fiddler Example Question Find credit card numbers from web traffic Find the device on the network that is performing nmap scans

Wireless Access Exploitation Topics Programs Used Aircrack-ng Kali Example Question Given the pcap file, find the WEP passcode Find WPA passcode

Web Application Exploitation Topics Programs Used Metasploit SQL Invader BURP MXToolBox Example Question Perform SQL injection Read the source code and find vulnerability Issue remote commands to the server

Enumeration and Exploitation Topics Programs Used Kali Uncompyle6 Binwalk foremost Example Question Find the flag in this exe file.

Tentative Schedule Week Date Topic 1 Thursday, February 1, 2018 Introduction 2 Thursday, February 8, 2018 Open Source Intelligence / Password Cracking 3 Thursday, February 15, 2018 Password Cracking / Network Traffic Analysis 4 Thursday, February 22, 2018 Network Traffic Analysis 5 Thursday, March 1, 2018 Log Analysis 6 Thursday, March 8, 2018 Cryptography 7 Thursday, March 15, 2018 Scanning 8 Thursday, March 22, 2018 Web Application Exploitation 9 Thursday, March 29, 2018 Wireless Access Exploitation 10 Thursday, April 5, 2018 GYM IS OPEN BEGIN ON TOPICS THERE