Skip to content

Latest commit

 

History

History
255 lines (171 loc) · 4.93 KB

slides.md

File metadata and controls

255 lines (171 loc) · 4.93 KB
title revealOptions
Cybersecurity Workshop
background-color transition slideNumber autoAnimateDuration
aquamarine
none
true
0.0

CyberSecurity Workshop

LSAC Career Talks

March 3, 2024

Faculty of Automatic Control and Computers, UPB, room EC101


Resources


Cybersecurity Buzz


Issues

  • 50% of people use the same password for all their logins
  • Over 80% of data breaches are due to poor password security
  • The password "123456" is now used by more than 23 million people.
  • 24% of Americans have used passwords like "password," "Qwerty," and "123456"

Jobs

https://fortune.com/education/business/articles/2022/06/30/companies-are-desperate-for-cybersecurity-workers-more-than-700k-positions-need-to-be-filled/

  • The number of unfilled cybersecurity jobs worldwide grew 350% between 2013 and 2021, from 1 million to 3.5 million, according to Cybersecurity Ventures.
  • The industry researcher also predicts that in five years, the same number of jobs will still be open.

Education


Events

  • Defcon
  • BlackHat
  • Hack In The Box (HITB)
  • "Big 4" (research conferences): ACM CCS, IEEE S&P (Oakland), NDSS, USENIX Security Symposium
  • Ro: DefCamp, Bucharest Cybersecurity Conference, CyberCon Romania

CTF


CTFs


Wargames


CTF Topics

  • Exploitation
  • Web (Exploitation)
  • Forensics / Misc
  • Crypto

Exploitation


Overview

  • Exploit software vulnerabilities
  • Exploit hardware vulnerabilities
  • Exploit misconfigurations
  • RCE (Remote Code Execution)
  • PrivEsc (Privilege Escalation)

Tools of the Trade


Demo

  • Hit me Hard challenge
  • Connect remotely to SSH
  • Privilege escalation

Web


Overview

  • Web is ubiquitous
  • Large attack surface
  • Can get access to system
    • Then you can move on to PrivEsc
  • Access to database

Tools of the Trade


Demo

  • Ping Me challenge
  • Command injection

Forensics / Misc


Overview

  • Post-attack analysis
  • Digital forensics
  • Look for tracks in filesystem, disk, memory, processes, network traffic
  • Figure out attack vector
  • Report for future protection and for legal actions

Tools of the Trade


Demo

  • It's Right There challenge
  • Look for configuration information, think sudo
  • Use the discovered information
  • Hashed information may be revealed with CrackStation

Crypto


Overview

  • Cryptographic primitives for digital data / transfer protection
  • confidentiality, integrity, identity / authentication
  • encryption, hash functions, key exchange, random number generator
  • symmetric encryption
  • public key cryptography
  • keys, algorithms
  • plaintext, ciphertext

Tools of the Trade


Demo

  • Peas in a Pod challenge
  • RSA public key
  • Find components of RSA algorithm
  • Recreate private key
  • Connect using SSH and get flag

Challenges


What Now?

  • Stay in school!
  • CTFs & wargames
  • Attend events
  • Internships, projects, jobs