SlideShare uma empresa Scribd logo
1 de 61
So You Want to be 
a Hacker? 
THEN LET’S GET STARTED 
October 16, 2014
A BRIEF 
INTRODUCTION 
GOTTA START SOMEWHERE
3 
The Talk’s Agenda 
1. Introduction 
2. The necessary 
prerequisites 
3. Immersing 
yourself 
4. Educating yourself 
5. Places to practice 
responsibly 
6. Common tools 
7. Making it count 
THE ROAD TO BRIGHTER PASTURES?
4 
Who Am I? 
DOWN IN FRONT 
Christopher Grayson 
• cgrayson@bishopfox.com 
• @_lavalamp 
Senior Security Analyst at 
Bishop Fox (Pen-Testing 
FTW) 
MSCS, BSCM from GT 
Former Research 
Scientist from GT 
Former president, GT 
hacking club
5 
I currently have my 
dream job 
I’ve never had to choose 
between education and 
safety 
I had the good fortune of 
attending SkyDogCon in 
2012 
But the story 
continues… 
Why am I Here Today? 
LITTLE BIT OF LUCK, LITTLE BIT OF SKILL
6 
Many Reasons 
THE PLOT THICKENS… 
3 teams at SkyDogCon Duplicity 
CTF, got 2nd, 3rd and 4th place 
• …out of 4 teams 
Received tickets to Shmoocon 
2013, Offensive Security 
training 
Competed in TOOOL Master 
Keying competition 
Received ticket to Shmoocon 
2014
7 
We work in the coolest 
industry. Period. 
We need more talented 
individuals. 
We need safe places to 
hone our skills. 
Why are YOU Here? 
HOPEFULLY NOT BY ACCIDENT
8 
The Term “Hacker” 
NOT TO START A DEBATE… 
Lots of debate around the term 
Commonly used by the media to refer to 
malicious people with technical skills 
Used in the community to show reverence 
towards another’s capabilities
9 
What a Hacker Certainly Isn’t 
THREE CHEERS FOR THE MEDIA
THE APPROACH 
COMFORT ZONES TO THE WIND
11 
What Does it Take to Break? 
KEEPING IT ZEN 
Patience 
Enthusiasm 
Perseverance 
Interest
12 
You will get frustrated. 
You will not learn 
everything overnight. 
You will get ridiculed. 
Be Wary… 
NOTHING WORTH DOING WAS EVER EASY
13 
Takeaways 
STILL INTERESTED? 
Becoming a “hacker” is not so much a 
profession as it is a way of life. 
It requires mental fortitude and patience above 
all else. 
Expertise comes slowly. 
It’s entirely worth the journey.
THE 
ENVIRONMENT 
IN OVER Y(OUR) HEAD
15 
The Word of the Day is Immersion 
Expertise requires a 
lot of technical 
knowledge. 
This can’t be gained 
overnight. 
The first step is to 
listen to the lingo. 
CARE TO GO FOR A SWIM?
16 
Reddit 
EVER HEARD OF IT BEFORE? 
Powerful message 
board 
Lots of infosec boards 
• /r/hacking 
• /r/netsec 
• /r/howtohack 
• /r/websec 
• /r/sysadmin 
• /r/blackhat
17 
Hang out on Freenode 
to talk through 
challenges and 
difficulties you have 
trouble with. 
• #metasploit – Metasploit 
developers 
• #corelan – Folks from 
Corelan team 
• #vulnhub – Folks from 
Vulnhub team 
• #offsec – Folks from 
Offensive Security 
Freenode 
NOT ALL THAT DISSIMILAR TO PIRATE SHIPS
18 
Mailing Lists 
#SPAMSPAMSPAM 
Good way to keep 
track of the industry’s 
pulse 
Lots of mailing lists 
for all skill levels and 
areas of interest 
http://seclists.org/
19 
Ghost in the Wires 
The Art of Intrusion 
The Art of Deception 
Kingpin 
The Cuckoo’s Egg 
Code 
Hacking – The Art of 
Exploitation 
Books 
WHAT ARE THOSE AGAIN?
20 
Movies 
THE GOOD, THE BAD, AND THE UGLY 
Sneakers 
• http://www.imdb.com/title/tt 
0105435/ 
Hackers 
• http://www.imdb.com/title/tt 
0113243/ 
War Games 
• http://www.imdb.com/title/tt 
0086567/
21 
DEF CON 
• https://www.defcon.org/ 
Black Hat 
• https://www.blackhat.com/ 
Shmoocon 
• http://www.shmoocon.org/ 
Conferences 
MEET YOUR FELLOW NERDS
22 
Disclaimer 
ARMOR OF THICK SKIN+3 
Some of the venues listed previously are less 
friendly towards new-comers than others. 
General rule of thumb is to research any 
questions that you have prior to asking them. 
Showing that you’ve done your own work 
before asking for the help of others goes a long 
way in this community.
LESSONS TO BE 
LEARNED 
STRAIGHT EDUMACATED
24 
So Now we Get Into the Difficult Stuff? 
PERHAPS, PERHAPS, PERHAPS 
The hardest part is 
having the gumption to 
stick with it. 
Technical skills can be 
learned (even if learned 
slowly). 
Technical skills are 
required, and typically 
the more the better.
25 
Harvard Introduction to CS 
Incredibly-thorough 
course on Computer 
Science 
https://www.edx.org/c 
ourse/harvardx/harvar 
dx-cs50x-introduction-computer- 
1022 
LEARN FROM THE BEST OF THEM
26 
Computer Networks on Coursera 
ONE BYTES TWO BYTES THREE BYTES FOUR 
Fundamental 
understanding of 
networking is 
important 
https://www.coursera. 
org/course/comnetwor 
ks
27 
Programming for Everybody on Coursera 
The ability to write 
code greatly helps in 
this field. 
https://www.coursera. 
org/course/pythonlear 
n 
FROM SCRIPT KIDDIE TO SCRIPT MASTER
28 
OpenSecurityTraining.info 
HARDLY KNOWN BUT HUGELY HELPFUL 
OpenSecurityTraining can 
be found online 
• http://opensecuritytraining.info/ 
“Is dedicated to sharing 
training material for 
computer security classes, 
on any topic, that are at 
least one day long.” 
Has free, professional 
courses on all matters 
hacking 
Even has course outlines 
and pre-requisites!
29 
SecurityTube can be 
found online 
• http://www.securitytube.net/ 
Large amounts of free 
videos created by the 
site’s founder 
Aggregation of 
conference videos and 
lectures 
Full primers on lots of 
different hacking areas 
SecurityTube.net 
AGGREGATE THOSE VIDEOS!
30 
Corelan.be 
WRITE YOURSELF SOME EXPLOITS 
Corelan can be found 
online 
• https://www.corelan.be/ 
In-depth tutorials 
detailing exploit-writing 
and binary exploitation 
Tons of other 
educational resources, 
primarily focused on 
binary and RE topics
31 
Offensive Security can be 
found online 
• http://www.offensive-security. 
com/ 
The group that created 
Backtrack and Kali Linux 
distributions 
Training is not free, but the 
training you get from their 
courses is top-notch and 
well-managed. 
Has an IRC channel that 
you can hang out in! 
Offensive Security 
THE AUTHORS OF KALI, BACKTRACK
32 
SANS Institute 
GETTING CERTIFIED 
Has a number of 
certifications for 
security training 
Not free, must pay to 
maintain certifications 
http://www.sans.org/
33 
Cisco has a number of 
certifications in the 
security space. 
Not free, must pay to 
maintain certifications 
https://learningnetwork. 
cisco.com/community/c 
ertifications/security 
Cisco Certifications 
MOAR CERTIFICATIONS?!
GO TO WORK 
GETTING YOUR HANDS NOT-SO-DIRTY
35 
VulnHub can be found 
online: 
• http://vulnhub.com/ 
A large repository of 
software images that are 
created solely to be 
vulnerable 
Great place to get 
software packages to 
hack on 
Has an IRC channel you 
can hang out in! 
Vulnerable Images 
STAND UP YOUR OWN LAB
36 
DVWA 
EMPHASIS ON THE D 
Web application that is 
built specifically to have 
lots of vulnerabilities 
Great starting place for 
beginning to hack Web 
applications 
http://www.dvwa.co.uk/
37 
Ongoing Competitions 
CTF365 can be found 
online: 
• http://ctf365.com/ 
Touts a massive online, 
persistent CTF 
CTFTime can be found 
online: 
• https://ctftime.org/ 
Keeps track of CTF 
competitions worldwide, 
maintains scores for 
teams across different 
CTFs 
BRUTAL TRAINING GROUNDS
38 
Stand-Alone Challenges 
SHORT, SWEET, AND TO THE POINT 
We Chall can be found 
online: 
• https://www.wechall.net/ 
Is an aggregation site 
for individual 
challenges 
Advertises a total of 
133 challenges 
available
39 
Managed service 
provider that 
consolidates bug 
bounty programs 
Go and hack things in 
real life and get $$$ 
https://bugcrowd.com/ 
Bugcrowd 
INDUSTRY EXPERIENCE
TOOLS OF THE 
TRADE 
AN AWFULLY FULL BAG OF TRICKS
41 
Wireshark 
NETWORKS ARE CHATTIER THAN YOU MAY THINK 
Used for monitoring 
local network traffic 
Great way to learn 
more about network 
protocols 
https://www.wireshark 
.org/
42 
An HTTP proxy with lots 
of hacky bells and 
whistles 
Used universally across 
the professional 
security industry 
http://portswigger.net/bu 
rp/ 
Burp Suite 
WEB APP HACKER’S SWISS ARMY KNIFE
43 
Browser Developer Tools 
REPURPOSING TOOLS FOR FUN AND PROFIT! 
Packaged in with all 
modern browsers 
Used mostly by 
developers for testing 
functionality during 
the development 
process
44 
LavaPasswordFactory 
Good tool for 
generating password 
lists 
Made by yours truly  
https://github.com/lav 
alamp- 
/LavaPasswordFactor 
y 
A GOOD PASSWORD LIST IS NICE TO HAVE
45 
John the Ripper 
CRACK GOES THE PASSWORD 
Where 
LavaPasswordFactory 
generates password 
lists, John the Ripper 
cracks them! 
http://www.openwall.c 
om/john/
46 
The de facto standard 
penetration testing 
Linux distribution 
Comes with all of the 
bells and whistles at 
installation 
http://www.kali.org/ 
Kali Linux 
BELLS AND WHISTLES GALORE
47 
VMWare Fusion / Workstation 
VIRTUALIZATION IS YOUR FRIEND 
Great platform for 
virtualization 
If you don’t know what 
virtualization, check it 
out! 
http://www.vmware.co 
m/
MAKING IT COUNT 
WHAT NEXT?
49 
Penetration testing 
Security analyst 
Security engineer 
All the technical 
things! 
Positions in the Field 
HACKING FOR GOOD
50 
Don’t Let it go to Waste 
WE’VE ALREADY GOT ENOUGH BAD GUYS 
Doing this stuff 
maliciously is a bad 
idea 
Far too many 
opportunities to help 
others and the 
community 
Don’t let it go to waste
REFERENCES 
A CENTRALIZED STORY
52 
References 
TAKE ONE 
The Electronic Frontier Foundation on the Computer 
Fraud and Abuse Act 
• https://ilt.eff.org/index.php/Computer_Fraud_and_Abuse_Act_(CFAA) 
Wikipedia on Aaron Swartz 
• http://en.wikipedia.org/wiki/Aaron_Swartz 
H3 at Georgia Tech Research Institute 
• http://h3.gatech.edu/ 
The UCSB iCTF 
• http://ictf.cs.ucsb.edu/ 
SECCDC 
• http://www.seccdc.org/
53 
References 
TAKE TWO 
VulnHub – Vulnerable by Design 
• http://vulnhub.com/ 
CTF365 
• http://ctf365.com/ 
CTF Time! 
• https://ctftime.org/ 
WeChall – A Challenge Aggregation Site 
• http://www.wechall.net/
54 
References 
TAKE THREE 
Atlanta OWASP 
• https://www.owasp.org/index.php/Atlanta_Georgia 
Security Mailing Lists 
• http://seclists.org/ 
Sneakers movie on IMDB 
• http://www.imdb.com/title/tt0105435/ 
Hackers movie on IMDB 
• http://www.imdb.com/title/tt0113243/
55 
References 
TAKE FOUR 
War Games movie on IMDB 
• http://www.imdb.com/title/tt0086567/ 
Hacking movies list on IMDB 
• http://www.imdb.com/list/ls055167700/ 
DEF CON 
• https://www.defcon.org/ 
Black Hat 
• https://www.blackhat.com/
56 
References 
TAKE FIVE 
Shmoocon 
• http://www.shmoocon.org/ 
Harvard Introduction to Computer Science 
• https://www.edx.org/course/harvardx/harvardx-cs50x-introduction- 
computer-1022 
Computer Networks on Coursera 
• https://www.coursera.org/course/comnetworks 
Programming for Everybody on Coursera 
• https://www.coursera.org/course/pythonlearn
57 
References 
TAKE SIX 
OpenSecurityTraining 
• http://opensecuritytraining.info/ 
Security Tube 
• http://www.securitytube.net/ 
Corelan.be 
• http://corelan.be/ 
Offensive Security 
• http://www.offensive-security.com/
58 
References 
TAKE SEVEN 
SANS Security Training 
• http://www.sans.org/ 
Cisco Security Training 
• https://learningnetwork.cisco.com/community/certifications/ 
security 
DVWA 
• http://www.dvwa.co.uk/ 
BugCrowd 
• https://bugcrowd.com/
59 
References 
TAKE EIGHT 
Wireshark 
• https://www.wireshark.org/ 
Burp Suite 
• http://portswigger.net/burp/ 
Reddit 
• http://www.reddit.com/ 
Freenode IRC 
• http://freenode.net/
QUESTIONS? 
HOPEFULLY YOU’VE GOT A FEW
THANK YOU 
@_LAVALAMP

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

What is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | EdurekaWhat is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | Edureka
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
 
Deep web and Dark web
Deep web and Dark webDeep web and Dark web
Deep web and Dark web
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Hacking
HackingHacking
Hacking
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Social engineering
Social engineering Social engineering
Social engineering
 
Phishing
PhishingPhishing
Phishing
 
Cyber security
Cyber securityCyber security
Cyber security
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Computer and internet fraud
Computer and internet fraudComputer and internet fraud
Computer and internet fraud
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
System hacking
System hackingSystem hacking
System hacking
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 

Destaque

Destaque (9)

Introduction to LavaPasswordFactory
Introduction to LavaPasswordFactoryIntroduction to LavaPasswordFactory
Introduction to LavaPasswordFactory
 
Cloudstone - Sharpening Your Weapons Through Big Data
Cloudstone - Sharpening Your Weapons Through Big DataCloudstone - Sharpening Your Weapons Through Big Data
Cloudstone - Sharpening Your Weapons Through Big Data
 
Grey H@t - DNS Cache Poisoning
Grey H@t - DNS Cache PoisoningGrey H@t - DNS Cache Poisoning
Grey H@t - DNS Cache Poisoning
 
Grey H@t - Academic Year 2012-2013 Recap
Grey H@t - Academic Year 2012-2013 RecapGrey H@t - Academic Year 2012-2013 Recap
Grey H@t - Academic Year 2012-2013 Recap
 
Root the Box - An Open Source Platform for CTF Administration
Root the Box - An Open Source Platform for CTF AdministrationRoot the Box - An Open Source Platform for CTF Administration
Root the Box - An Open Source Platform for CTF Administration
 
Started In Security Now I'm Here
Started In Security Now I'm HereStarted In Security Now I'm Here
Started In Security Now I'm Here
 
You, and Me, and Docker Makes Three
You, and Me, and Docker Makes ThreeYou, and Me, and Docker Makes Three
You, and Me, and Docker Makes Three
 
Grey H@t - Cross-site Request Forgery
Grey H@t - Cross-site Request ForgeryGrey H@t - Cross-site Request Forgery
Grey H@t - Cross-site Request Forgery
 
CableTap - Wirelessly Tapping Your Home Network
CableTap - Wirelessly Tapping Your Home NetworkCableTap - Wirelessly Tapping Your Home Network
CableTap - Wirelessly Tapping Your Home Network
 

Semelhante a So You Want to be a Hacker?

What’s New and Exciting in Library Makerspaces
What’s New and Exciting in Library MakerspacesWhat’s New and Exciting in Library Makerspaces
What’s New and Exciting in Library Makerspaces
St. Petersburg College
 
Paul Asadoorian - Bringing Sexy Back
Paul Asadoorian - Bringing Sexy BackPaul Asadoorian - Bringing Sexy Back
Paul Asadoorian - Bringing Sexy Back
Source Conference
 

Semelhante a So You Want to be a Hacker? (20)

Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
 
Path of Cyber Security
Path of Cyber SecurityPath of Cyber Security
Path of Cyber Security
 
Path of Cyber Security
Path of Cyber SecurityPath of Cyber Security
Path of Cyber Security
 
Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
 
44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?
 
Play,Learn and Hack- CTF Training
Play,Learn and Hack- CTF TrainingPlay,Learn and Hack- CTF Training
Play,Learn and Hack- CTF Training
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021
 
Open Hack Taiwan 2012 - Hacking 101
Open Hack Taiwan 2012 - Hacking 101Open Hack Taiwan 2012 - Hacking 101
Open Hack Taiwan 2012 - Hacking 101
 
Cyber Security Workshop Presentation.pptx
Cyber Security Workshop Presentation.pptxCyber Security Workshop Presentation.pptx
Cyber Security Workshop Presentation.pptx
 
Blue team reboot - HackFest
Blue team reboot - HackFest Blue team reboot - HackFest
Blue team reboot - HackFest
 
What’s New and Exciting in Library Makerspaces
What’s New and Exciting in Library MakerspacesWhat’s New and Exciting in Library Makerspaces
What’s New and Exciting in Library Makerspaces
 
44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley
44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley
44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley
 
how_to_get_into_infosec
how_to_get_into_infosechow_to_get_into_infosec
how_to_get_into_infosec
 
Bsides CT 2020 - Lambos and Tigers in Russia or a Legit Career Without the Pr...
Bsides CT 2020 - Lambos and Tigers in Russia or a Legit Career Without the Pr...Bsides CT 2020 - Lambos and Tigers in Russia or a Legit Career Without the Pr...
Bsides CT 2020 - Lambos and Tigers in Russia or a Legit Career Without the Pr...
 
Paul Asadoorian - Bringing Sexy Back
Paul Asadoorian - Bringing Sexy BackPaul Asadoorian - Bringing Sexy Back
Paul Asadoorian - Bringing Sexy Back
 
Bug Bounty - Play For Money
Bug Bounty - Play For MoneyBug Bounty - Play For Money
Bug Bounty - Play For Money
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 
Maker Boot Camp
Maker Boot CampMaker Boot Camp
Maker Boot Camp
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 

Último

DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Último (20)

Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 

So You Want to be a Hacker?

  • 1. So You Want to be a Hacker? THEN LET’S GET STARTED October 16, 2014
  • 2. A BRIEF INTRODUCTION GOTTA START SOMEWHERE
  • 3. 3 The Talk’s Agenda 1. Introduction 2. The necessary prerequisites 3. Immersing yourself 4. Educating yourself 5. Places to practice responsibly 6. Common tools 7. Making it count THE ROAD TO BRIGHTER PASTURES?
  • 4. 4 Who Am I? DOWN IN FRONT Christopher Grayson • cgrayson@bishopfox.com • @_lavalamp Senior Security Analyst at Bishop Fox (Pen-Testing FTW) MSCS, BSCM from GT Former Research Scientist from GT Former president, GT hacking club
  • 5. 5 I currently have my dream job I’ve never had to choose between education and safety I had the good fortune of attending SkyDogCon in 2012 But the story continues… Why am I Here Today? LITTLE BIT OF LUCK, LITTLE BIT OF SKILL
  • 6. 6 Many Reasons THE PLOT THICKENS… 3 teams at SkyDogCon Duplicity CTF, got 2nd, 3rd and 4th place • …out of 4 teams Received tickets to Shmoocon 2013, Offensive Security training Competed in TOOOL Master Keying competition Received ticket to Shmoocon 2014
  • 7. 7 We work in the coolest industry. Period. We need more talented individuals. We need safe places to hone our skills. Why are YOU Here? HOPEFULLY NOT BY ACCIDENT
  • 8. 8 The Term “Hacker” NOT TO START A DEBATE… Lots of debate around the term Commonly used by the media to refer to malicious people with technical skills Used in the community to show reverence towards another’s capabilities
  • 9. 9 What a Hacker Certainly Isn’t THREE CHEERS FOR THE MEDIA
  • 10. THE APPROACH COMFORT ZONES TO THE WIND
  • 11. 11 What Does it Take to Break? KEEPING IT ZEN Patience Enthusiasm Perseverance Interest
  • 12. 12 You will get frustrated. You will not learn everything overnight. You will get ridiculed. Be Wary… NOTHING WORTH DOING WAS EVER EASY
  • 13. 13 Takeaways STILL INTERESTED? Becoming a “hacker” is not so much a profession as it is a way of life. It requires mental fortitude and patience above all else. Expertise comes slowly. It’s entirely worth the journey.
  • 14. THE ENVIRONMENT IN OVER Y(OUR) HEAD
  • 15. 15 The Word of the Day is Immersion Expertise requires a lot of technical knowledge. This can’t be gained overnight. The first step is to listen to the lingo. CARE TO GO FOR A SWIM?
  • 16. 16 Reddit EVER HEARD OF IT BEFORE? Powerful message board Lots of infosec boards • /r/hacking • /r/netsec • /r/howtohack • /r/websec • /r/sysadmin • /r/blackhat
  • 17. 17 Hang out on Freenode to talk through challenges and difficulties you have trouble with. • #metasploit – Metasploit developers • #corelan – Folks from Corelan team • #vulnhub – Folks from Vulnhub team • #offsec – Folks from Offensive Security Freenode NOT ALL THAT DISSIMILAR TO PIRATE SHIPS
  • 18. 18 Mailing Lists #SPAMSPAMSPAM Good way to keep track of the industry’s pulse Lots of mailing lists for all skill levels and areas of interest http://seclists.org/
  • 19. 19 Ghost in the Wires The Art of Intrusion The Art of Deception Kingpin The Cuckoo’s Egg Code Hacking – The Art of Exploitation Books WHAT ARE THOSE AGAIN?
  • 20. 20 Movies THE GOOD, THE BAD, AND THE UGLY Sneakers • http://www.imdb.com/title/tt 0105435/ Hackers • http://www.imdb.com/title/tt 0113243/ War Games • http://www.imdb.com/title/tt 0086567/
  • 21. 21 DEF CON • https://www.defcon.org/ Black Hat • https://www.blackhat.com/ Shmoocon • http://www.shmoocon.org/ Conferences MEET YOUR FELLOW NERDS
  • 22. 22 Disclaimer ARMOR OF THICK SKIN+3 Some of the venues listed previously are less friendly towards new-comers than others. General rule of thumb is to research any questions that you have prior to asking them. Showing that you’ve done your own work before asking for the help of others goes a long way in this community.
  • 23. LESSONS TO BE LEARNED STRAIGHT EDUMACATED
  • 24. 24 So Now we Get Into the Difficult Stuff? PERHAPS, PERHAPS, PERHAPS The hardest part is having the gumption to stick with it. Technical skills can be learned (even if learned slowly). Technical skills are required, and typically the more the better.
  • 25. 25 Harvard Introduction to CS Incredibly-thorough course on Computer Science https://www.edx.org/c ourse/harvardx/harvar dx-cs50x-introduction-computer- 1022 LEARN FROM THE BEST OF THEM
  • 26. 26 Computer Networks on Coursera ONE BYTES TWO BYTES THREE BYTES FOUR Fundamental understanding of networking is important https://www.coursera. org/course/comnetwor ks
  • 27. 27 Programming for Everybody on Coursera The ability to write code greatly helps in this field. https://www.coursera. org/course/pythonlear n FROM SCRIPT KIDDIE TO SCRIPT MASTER
  • 28. 28 OpenSecurityTraining.info HARDLY KNOWN BUT HUGELY HELPFUL OpenSecurityTraining can be found online • http://opensecuritytraining.info/ “Is dedicated to sharing training material for computer security classes, on any topic, that are at least one day long.” Has free, professional courses on all matters hacking Even has course outlines and pre-requisites!
  • 29. 29 SecurityTube can be found online • http://www.securitytube.net/ Large amounts of free videos created by the site’s founder Aggregation of conference videos and lectures Full primers on lots of different hacking areas SecurityTube.net AGGREGATE THOSE VIDEOS!
  • 30. 30 Corelan.be WRITE YOURSELF SOME EXPLOITS Corelan can be found online • https://www.corelan.be/ In-depth tutorials detailing exploit-writing and binary exploitation Tons of other educational resources, primarily focused on binary and RE topics
  • 31. 31 Offensive Security can be found online • http://www.offensive-security. com/ The group that created Backtrack and Kali Linux distributions Training is not free, but the training you get from their courses is top-notch and well-managed. Has an IRC channel that you can hang out in! Offensive Security THE AUTHORS OF KALI, BACKTRACK
  • 32. 32 SANS Institute GETTING CERTIFIED Has a number of certifications for security training Not free, must pay to maintain certifications http://www.sans.org/
  • 33. 33 Cisco has a number of certifications in the security space. Not free, must pay to maintain certifications https://learningnetwork. cisco.com/community/c ertifications/security Cisco Certifications MOAR CERTIFICATIONS?!
  • 34. GO TO WORK GETTING YOUR HANDS NOT-SO-DIRTY
  • 35. 35 VulnHub can be found online: • http://vulnhub.com/ A large repository of software images that are created solely to be vulnerable Great place to get software packages to hack on Has an IRC channel you can hang out in! Vulnerable Images STAND UP YOUR OWN LAB
  • 36. 36 DVWA EMPHASIS ON THE D Web application that is built specifically to have lots of vulnerabilities Great starting place for beginning to hack Web applications http://www.dvwa.co.uk/
  • 37. 37 Ongoing Competitions CTF365 can be found online: • http://ctf365.com/ Touts a massive online, persistent CTF CTFTime can be found online: • https://ctftime.org/ Keeps track of CTF competitions worldwide, maintains scores for teams across different CTFs BRUTAL TRAINING GROUNDS
  • 38. 38 Stand-Alone Challenges SHORT, SWEET, AND TO THE POINT We Chall can be found online: • https://www.wechall.net/ Is an aggregation site for individual challenges Advertises a total of 133 challenges available
  • 39. 39 Managed service provider that consolidates bug bounty programs Go and hack things in real life and get $$$ https://bugcrowd.com/ Bugcrowd INDUSTRY EXPERIENCE
  • 40. TOOLS OF THE TRADE AN AWFULLY FULL BAG OF TRICKS
  • 41. 41 Wireshark NETWORKS ARE CHATTIER THAN YOU MAY THINK Used for monitoring local network traffic Great way to learn more about network protocols https://www.wireshark .org/
  • 42. 42 An HTTP proxy with lots of hacky bells and whistles Used universally across the professional security industry http://portswigger.net/bu rp/ Burp Suite WEB APP HACKER’S SWISS ARMY KNIFE
  • 43. 43 Browser Developer Tools REPURPOSING TOOLS FOR FUN AND PROFIT! Packaged in with all modern browsers Used mostly by developers for testing functionality during the development process
  • 44. 44 LavaPasswordFactory Good tool for generating password lists Made by yours truly  https://github.com/lav alamp- /LavaPasswordFactor y A GOOD PASSWORD LIST IS NICE TO HAVE
  • 45. 45 John the Ripper CRACK GOES THE PASSWORD Where LavaPasswordFactory generates password lists, John the Ripper cracks them! http://www.openwall.c om/john/
  • 46. 46 The de facto standard penetration testing Linux distribution Comes with all of the bells and whistles at installation http://www.kali.org/ Kali Linux BELLS AND WHISTLES GALORE
  • 47. 47 VMWare Fusion / Workstation VIRTUALIZATION IS YOUR FRIEND Great platform for virtualization If you don’t know what virtualization, check it out! http://www.vmware.co m/
  • 48. MAKING IT COUNT WHAT NEXT?
  • 49. 49 Penetration testing Security analyst Security engineer All the technical things! Positions in the Field HACKING FOR GOOD
  • 50. 50 Don’t Let it go to Waste WE’VE ALREADY GOT ENOUGH BAD GUYS Doing this stuff maliciously is a bad idea Far too many opportunities to help others and the community Don’t let it go to waste
  • 52. 52 References TAKE ONE The Electronic Frontier Foundation on the Computer Fraud and Abuse Act • https://ilt.eff.org/index.php/Computer_Fraud_and_Abuse_Act_(CFAA) Wikipedia on Aaron Swartz • http://en.wikipedia.org/wiki/Aaron_Swartz H3 at Georgia Tech Research Institute • http://h3.gatech.edu/ The UCSB iCTF • http://ictf.cs.ucsb.edu/ SECCDC • http://www.seccdc.org/
  • 53. 53 References TAKE TWO VulnHub – Vulnerable by Design • http://vulnhub.com/ CTF365 • http://ctf365.com/ CTF Time! • https://ctftime.org/ WeChall – A Challenge Aggregation Site • http://www.wechall.net/
  • 54. 54 References TAKE THREE Atlanta OWASP • https://www.owasp.org/index.php/Atlanta_Georgia Security Mailing Lists • http://seclists.org/ Sneakers movie on IMDB • http://www.imdb.com/title/tt0105435/ Hackers movie on IMDB • http://www.imdb.com/title/tt0113243/
  • 55. 55 References TAKE FOUR War Games movie on IMDB • http://www.imdb.com/title/tt0086567/ Hacking movies list on IMDB • http://www.imdb.com/list/ls055167700/ DEF CON • https://www.defcon.org/ Black Hat • https://www.blackhat.com/
  • 56. 56 References TAKE FIVE Shmoocon • http://www.shmoocon.org/ Harvard Introduction to Computer Science • https://www.edx.org/course/harvardx/harvardx-cs50x-introduction- computer-1022 Computer Networks on Coursera • https://www.coursera.org/course/comnetworks Programming for Everybody on Coursera • https://www.coursera.org/course/pythonlearn
  • 57. 57 References TAKE SIX OpenSecurityTraining • http://opensecuritytraining.info/ Security Tube • http://www.securitytube.net/ Corelan.be • http://corelan.be/ Offensive Security • http://www.offensive-security.com/
  • 58. 58 References TAKE SEVEN SANS Security Training • http://www.sans.org/ Cisco Security Training • https://learningnetwork.cisco.com/community/certifications/ security DVWA • http://www.dvwa.co.uk/ BugCrowd • https://bugcrowd.com/
  • 59. 59 References TAKE EIGHT Wireshark • https://www.wireshark.org/ Burp Suite • http://portswigger.net/burp/ Reddit • http://www.reddit.com/ Freenode IRC • http://freenode.net/

Notas do Editor

  1. TODO: We may need to look into how to get a version of the logo that not only looks good but also prints to PDF cleanly. This is an example of what a lead slide could look like. Design Guide Font throughout: Proximo Nova Main Body Text: 24 pt Bullet Point Text: 20 pt Sub bullet Point Text: 16 pt Make sure you turn on gridlines, so you can see how everything is lining up.