Intro to CTF

5 Days Hands On Bootcamp

Pentesting is a hard thing. It's even harder to figure out how to get started on this journey. This workshop is aimed toward absolute beginners and to give them an easy understanding learning path.

We are focused on cracking OSCP like Kioptrix. Kioptrix boot-to-root VMs are well known as a good starting vulnerable machines for hacking challenges. This is especially true for those who are looking to pursue the OSCP certification, as it is considered to be beginner-friendly

Starting On 1st January 2023

Supported By
Riglabs
Lyminal
Lyminal

Getting Started

This workshop is divided into 2 parts. The learning section and the challenge section

ONLINE

Part One

Day 01

  • Introduction to Fundamentals of Cyber Security.

Day 02

  • Linux OS Basics
  • Introduction to Netowrk

Day 03

  • Introduction to Network
  • 5 Stages of Hacking

Day 04

  • 5 Stages of Hacking

Day 05

  • Exploitation Basics

OFFLINE

Part Two

Challenge

  • CTF Challenge

Detailed Plan Structure

Shown below are the detailed plan structure for each day. Click above cards to view the plan for each day.

Workshop Plan

Day 01

Introduction & Fundamentals of Cyber Security

01

Cyber Security, a walk-through

Intro to Cyber World & Cyber Security

02

Different careers in Cyber Security

How to build cyber security career & its streams

03

Key terminology in cyber security

Importance of cyber security & how to differ from other field

04

Elements of information security

5 Key elements & critical elements of information security

05

Types of threat actors

Common threats & defense mechanism

06

Passive attacts in cyber security

Learn about what is passive attacking vector

07

Active attacks in cyber security

Explore active attacking vectors

08

Setting up a lab

Download and Setting of VMware, BlackUbantu, Ralph OS & Configuring Kioptrix

Day 02

Linux OS Basics

01

Difference between Windows and Linux

learn what makes Linux better then Windows

02

Linux File System

Understanding & Explore linux file system

03

Basic Commands

Exlpore 20 basic Linux commands for working in Linux

04

Create and view commands

Explore the file creation and viewing commands

05

Users and Privileges

Figure out the use of user privileges in Linux OS

06

Apt & Configuration

Simple configuring Linux by apt

Day 02

Introduction to Network

01

Term Networking

Explore the term networking

02

Different types of network

Explore the types of networks around the world

03

Network topology

Learn about the main topologies in networking

04

IP Address

The term IP Adress & it's working

05

MAC Address

The term MAC Address and it's working

06

Subnetting

The term subnetting and it's working

Day 03

Introduction to Network

01

OSI Model

Walk into the OSI model & learn how it works

02

TCP & UDP

Discuss main TCP & UDP protocols & it's working

03

Network commands

Explore more network commands

04

Starting & Stopping services

Explore main commands for starting & stopping a service

Day 03

5 Stages of Hacking

01

Email Harvesting

Find all the mails under main domain

02

Subdomain gathering

Find all the subdomains under main domain

03

Identify web technology

Learn about the technologies behind web applications

Day 04

5 Stages of Hacking

01

Scanning with Nmap

Scanning the host with nmap & collect all the info about the host

02

Nmap commands

Explore 15 Nmap commands

03

Scanning with Brup

Set up Brup & scan the host

04

Scanning with Nikto

Scanning the host with Nikto tool & find major vulnerabilities

05

Introduction to metasploit

Starting with metasploit and scanning the host.

06

Enumeration SMB

Find the version and other details of SMB port

07

Enumeration SSH

Find the version and other details of the SSH port

Day 05

5 Stages of Hacking

01

Re-potential vulnerabilities

Find the easiest vulnerability using the art of googling

02

Reverse shell vs blind shell

Learn the main difference and use of blind & reverse shell

03

Understanding shells working

Simple practical session for understanding a shell’s working

04

Staged vs non-staged payload

Learn the difference between staged & non-staged payloads

05

Gaining root access with metasploit

We get root access to Kioptrix using metasploit

06

Manual exploitation [Openfuck]

Here we use a simple C script to exploit Kioptrix

07

Brute force tool - Hydra

For getting root access, we brute force using the tool - Hydra

08

Brute force tool - Metasploit

For getting root access, we use the tool - Metasploit 500

Day 06

CTF Challenge

01

CTF Challenge

In the area of cybersecurity, CTFs have become competitions to demonstrate expertise in attacking (or defending) computer resources. The essence of a CTS is puzzle solving. The challenges are created by and for people who like solving puzzles. One aspect potentially frustrating to beginners is that the goal of the challege may not be spelled out. Take that in stride.

Minimum System Requirements

For having a smooth experience throughout this bootcamp. You will need to have a system with the following requirements.

  • CPU: 2Core, 2.8GHz - Intel/AMD
  • RAM: 4GB DDR3 (8 GB DDR3 Recommended)
  • Storage: 40GB HDD
  • Operating System: Windows 64-bit, Kali Linux(VMWare), Ralph OS(VMWare)
  • Misc: Support for Virtualization enabled via BIOS