RPISEC - 08/30/2013Intro Meeting1. Introductions What we do Tools Hands-on hacking Wargames CTFs RPISEC - 08/30/2013Intro Meeting2.

Slides:



Advertisements
Similar presentations
USB Multi Drive Card Reader/Writer Controller & Turn-Key Solution Reads : SD / MMC / SM / CF / MD.
Advertisements

Unit 1: Module 1 Objective 10 identify tools used in the entry, retrieval, processing, storage, presentation, transmission and dissemination of information;
Graduate Student Seminar Introduction to surviving in Computer Science at the U of S.
Introduction to Screen and Irssi Or, the good way to use IRC.
Security & Exploitation
Elluminate as a virtual classroom Fang Lou 1. Outline of the session What is Elluminate? How do we use it? Overview of the Elluminate Different levels.
Setting up your System Contents Required Software Flip and flop servers at OSU Using WinSCP Using Putty Using ssh, scp from Linux terminal.
04/07/06 DePaul University - Teaching and Technology Conference Remote Networking Labs for Hands-on Exercises James Yu, Ph.D. Scholl of CTI DePaul University.
1 SEEM3460 Tutorial Access to Unix Workstations in SE.
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 6 Enumeration.
Chinese Information Processing (I): Basic Concepts and Practice Unit 6: Synchronous Communication.
Elluminate - moderator Fang Lou (David Lee & Andrew Marunchak) The Learning and Teaching Institute 1.
“Final?” Day Unix/Linux April 8, 2014 Dr. Bob Mathis.
Engineering H192 - Computer Programming The Ohio State University Gateway Engineering Education Coalition Lect 4P. 1Winter Quarter Introduction to UNIX.
Tutorial on Hadoop Environment for ECE Login to the Hadoop Server Host name: , Port: If you are using Linux, you could simply.
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 Module Summary  Cisco routers operate at Layer 3, and their function is path determination.
COMP1070/2002/lec3/H.Melikian COMP1070 Lecture #3 v Operating Systems v Describe briefly operating systems service v To describe character and graphical.
EECS 354 Network Security Introduction. Why Learn To Hack Understanding how to break into computer systems allows you to better defend them Learn how.
Ayman Abdel-Hamid Department of Computer Science Lamar University P.O. Box 10056, Beaumont, TX 77710, USA Kurt Maly, C.M. Overstreet,
TRD 1: NMRbox Development
Network Tools TCP/IP interface configuration query - MAC (HW) address and IP address – Linux - /sbin/ifconfig – MS Windows – ipconfig/all 1.
Logging into the linux machines This series of view charts show how to log into the linux machines from the Windows environment. Machine name IP address.
PROGRAMMING PROJECT POLICIES AND UNIX INTRO Sal LaMarca CSCI 1302, Fall 2009.
Bitlbee + Irssi The ideal combination for chat addicts ?
Rpisec.org/2013/ /exploitation.zip For the lazy – rpisec.org/2013/ Windows & Linux Binaries! … macs? RPISEC - 09/13/2013Intro to Memory Corruption1.
I-Hack’08 International Hacking Competition “Details”
Welcome!. Announcements Add new members to organization’s ListServ Talk to Nate Lynch Seeking approval from the Dean of IST to be add to the website E-board.
REMOTE LOGIN. TEAM MEMBERS AMULYA GURURAJ 1MS07IS006 AMULYA GURURAJ 1MS07IS006 BHARGAVI C.S 1MS07IS013 BHARGAVI C.S 1MS07IS013 MEGHANA N. 1MS07IS050 MEGHANA.
Information Systems and Internet Security Laboratory Kevin Chung.
Memory & Storage Architecture Seoul National University PuTTY Usage Hyeon-gyu School of Computer Science and Engineering.
SQL School is strongly committed to provide COMPLETE PRACTICAL REALTIME Trainings on SQL Server Technologies – Dev, SQL DBA, MSBI (SSIS, SSAS, SSRS) and.
Engineering H192 - Computer Programming Gateway Engineering Education Coalition Lect 20AP. 1Winter Quarter File Transfer Lecture 20A.
Logging into the linux machines This series of view charts show how to log into the linux machines from the Windows environment. Machine name IP address.
ISCTF 2015 Capture The Flag Competition
Moving from Reactive to Proactive – DeepNines and ESU 3 Nate Jackson, Territory Manager Greg Jackson, Vice President of Technical Services Martin Rosas,
BA370: What It Takes To Provide IT Services To COB August 1 st 2005 Presented By Alan Sprague Senior Systems Engineer College of Business Oregon State.
MIRC in Windows by Byung Lee. mIRC in Windows  What is mIRC?  Requirements for mIRC  Installing mIRC  Setting Up mIRC  Connection  Join a Channel.
Speaker:Chiang Hong-Ren An Investigation and Implementation of Botnet Detection Schemes.
Implementing Secure IRC App with Elgamal By Hyungki Choi ID : Date :
Cryogenics Group Jonathan Creel December 1, 2010 Remote Access Review.
Trinity University Student Branch Proposal August 16th, 2008.
Build Technology Into Tutoring Importance of Computer Literacy Help students get a better job Parents will be able to teach their children Learning Tool.
Interacting with a UNIX computer in the MathCS Lab.
PuTTY Introduction to Web Programming Kirkwood Continuing Education by Fred McClurg © Copyright 2016, All Rights Reserved ssh client.
The Challenges of Teaching an Interdisciplinary IA Course Rose Shumba Indiana University of Pennsylvania EPASEC 2006.
Introduction Name Company affiliation Title/function Job responsibility Windows experience Your expectations for the course.
When you cannot be there Remote access and collaboration Raul Suarez Dec 2009.
10/6/2011 Sophia Danesino
Huntsville City School Board
SoCal Cybersecurity Community College Consortium
Rick Graziani Cabrillo College
Techniques, Tools, and Research Issues
Vendor Agnostic Infrastructure Tools:
Course Introduction Yuzhe Tang.
Redmond Protocol Plugfest 2016
Logging into the linux machines
Dário Tavares Antunes Intro to Netsoc Dário Tavares Antunes
Windows Live Mail Password Reset |
Crawling with Heritrix
د.سالم بني عطا استراتيجيات التدريس Teaching Strategies
HOW TO RUN FOR A POSITION
C C Conversation.
Logging into the linux machines
Корпоратив тармоқни бошқариш ва техник таъминот бўлими
For the MVHS Cyber Defense CLub
Division of Engineering Computing Services
Bethesda Cybersecurity Club
Getting Started: Accessing Our Amazon AWS Server
Presentation transcript:

RPISEC - 08/30/2013Intro Meeting1

Introductions What we do Tools Hands-on hacking Wargames CTFs RPISEC - 08/30/2013Intro Meeting2

President – Markus Gaasedelen Vice President – Jeremy White Secretary – Patrick Biernat Treasurer – Sophia D'Antoine RPISEC - 08/30/2013Intro Meeting3

Teach cyber security Participate in hacking competitions Attend security conferences Get people jobs RPISEC - 08/30/2013Intro Meeting4

IRC – chatting – Windows: mIRC – Linux: irssi RPISEC - 08/30/2013Intro Meeting5

We have a locally hosted IRC server! Chill, chat, ask questions, talk sec, keep in touch, etc eZ mode instructions: Stick with us, and we’ll set you up with a ZNC account down the road (: RPISEC - 08/30/2013Intro Meeting6

IRC – chatting – Windows: mIRC – Linux: irssi ssh – remote login – Windows: putty.exe – Linux: ssh command RPISEC - 08/30/2013Intro Meeting7

Microsoft Bluehat, Reversing – Windows.EXE Reverse Engineering Matasano Crypto Challenges – Cryptography challenges RPISEC - 08/30/2013Intro Meeting8

RPISEC - 08/30/2013Intro Meeting9

CSAW ISTS 64 of them every year RPISEC - 08/30/2013Intro Meeting10

RPISEC - 08/30/2013Intro Meeting11

RPISEC - 08/30/2013Intro Meeting12