Intro to CTF
5 Days Hands On Bootcamp
Pentesting is a hard thing. It's even harder to figure out how to get started on this journey. This workshop is aimed toward absolute beginners and to give them an easy understanding learning path.
We are focused on cracking OSCP like Kioptrix. Kioptrix boot-to-root VMs are well known as a good starting vulnerable machines for hacking challenges. This is especially true for those who are looking to pursue the OSCP certification, as it is considered to be beginner-friendly
Starting On 1st January 2023
Getting Started
This workshop is divided into 2 parts. The learning section and the challenge section
ONLINE
Part One
Day 01
Day 02
Day 03
Day 04
Day 05
OFFLINE
Part Two
Challenge
Detailed Plan Structure
Shown below are the detailed plan structure for each day. Click above cards to view the plan for each day.
Workshop Plan
Day 01
Introduction & Fundamentals of Cyber Security
Cyber Security, a walk-through
Intro to Cyber World & Cyber Security
Different careers in Cyber Security
How to build cyber security career & its streams
Key terminology in cyber security
Importance of cyber security & how to differ from other field
Elements of information security
5 Key elements & critical elements of information security
Types of threat actors
Common threats & defense mechanism
Passive attacts in cyber security
Learn about what is passive attacking vector
Active attacks in cyber security
Explore active attacking vectors
Setting up a lab
Download and Setting of VMware, BlackUbantu, Ralph OS & Configuring Kioptrix
Day 02
Linux OS Basics
Difference between Windows and Linux
learn what makes Linux better then Windows
Linux File System
Understanding & Explore linux file system
Basic Commands
Exlpore 20 basic Linux commands for working in Linux
Create and view commands
Explore the file creation and viewing commands
Users and Privileges
Figure out the use of user privileges in Linux OS
Apt & Configuration
Simple configuring Linux by apt
Day 02
Introduction to Network
Term Networking
Explore the term networking
Different types of network
Explore the types of networks around the world
Network topology
Learn about the main topologies in networking
IP Address
The term IP Adress & it's working
MAC Address
The term MAC Address and it's working
Subnetting
The term subnetting and it's working
Day 03
Introduction to Network
OSI Model
Walk into the OSI model & learn how it works
TCP & UDP
Discuss main TCP & UDP protocols & it's working
Network commands
Explore more network commands
Starting & Stopping services
Explore main commands for starting & stopping a service
Day 03
5 Stages of Hacking
Email Harvesting
Find all the mails under main domain
Subdomain gathering
Find all the subdomains under main domain
Identify web technology
Learn about the technologies behind web applications
Day 04
5 Stages of Hacking
Scanning with Nmap
Scanning the host with nmap & collect all the info about the host
Nmap commands
Explore 15 Nmap commands
Scanning with Brup
Set up Brup & scan the host
Scanning with Nikto
Scanning the host with Nikto tool & find major vulnerabilities
Introduction to metasploit
Starting with metasploit and scanning the host.
Enumeration SMB
Find the version and other details of SMB port
Enumeration SSH
Find the version and other details of the SSH port
Day 05
5 Stages of Hacking
Re-potential vulnerabilities
Find the easiest vulnerability using the art of googling
Reverse shell vs blind shell
Learn the main difference and use of blind & reverse shell
Understanding shells working
Simple practical session for understanding a shell’s working
Staged vs non-staged payload
Learn the difference between staged & non-staged payloads
Gaining root access with metasploit
We get root access to Kioptrix using metasploit
Manual exploitation [Openfuck]
Here we use a simple C script to exploit Kioptrix
Brute force tool - Hydra
For getting root access, we brute force using the tool - Hydra
Brute force tool - Metasploit
For getting root access, we use the tool - Metasploit 500
Day 06
CTF Challenge
CTF Challenge
In the area of cybersecurity, CTFs have become competitions to demonstrate expertise in attacking (or defending) computer resources. The essence of a CTS is puzzle solving. The challenges are created by and for people who like solving puzzles. One aspect potentially frustrating to beginners is that the goal of the challege may not be spelled out. Take that in stride.
Minimum System Requirements
For having a smooth experience throughout this bootcamp. You will need to have a system with the following requirements.