So You Want to be a Hacker?

The Presentation inside:

Slide 0

So You Want to be a Hacker? Then let’s get started October 16, 2014

Slide 1

A Brief Introduction Gotta start somewhere

Slide 2

Introduction The necessary prerequisites Immersing yourself Educating yourself Places to practice responsibly Common tools Making it count The road to brighter pastures? The Talk’s Agenda

Slide 3

Down in front Who Am I? Christopher Grayson [email protected] @_lavalamp Senior Security Analyst at Bishop Fox (Pen-Testing FTW) MSCS, BSCM from GT Former Research Scientist from GT Former president, GT hacking club

Slide 4

I currently have my dream job I’ve never had to choose between education and safety I had the good fortune of attending SkyDogCon in 2012 But the story continues… Little bit of luck, little bit of skill Why am I Here Today?

Slide 5

3 teams at SkyDogCon Duplicity CTF, got 2nd, 3rd and 4th place …out of 4 teams Received tickets to Shmoocon 2013, Offensive Security training Competed in TOOOL Master Keying competition Received ticket to Shmoocon 2014 The plot thickens… Many Reasons

Slide 6

We work in the coolest industry. Period. We need more talented individuals. We need safe places to hone our skills. Hopefully not by accident Why are YOU Here?

Slide 7

Lots of debate around the term Commonly used by the media to refer to malicious people with technical skills Used in the community to show reverence towards another’s capabilities Not to start a debate… The Term “Hacker”

Slide 8

Three cheers for the media What a Hacker Certainly Isn’t

Slide 9

The Approach Comfort zones to the wind

Slide 10

Patience Enthusiasm Perseverance Interest Keeping it zen What Does it Take to Break?

Slide 11

You will get frustrated. You will not learn everything overnight. You will get ridiculed. Nothing worth doing was ever easy Be Wary…

Slide 12

Becoming a “hacker” is not so much a profession as it is a way of life. It requires mental fortitude and patience above all else. Expertise comes slowly. It’s entirely worth the journey. Still interested? Takeaways

Slide 13

The Environment In over Y(our) head

Slide 14

Expertise requires a lot of technical knowledge. This can’t be gained overnight. The first step is to listen to the lingo. Care to go for a swim? The Word of the Day is Immersion

Slide 15

Powerful message board Lots of infosec boards /r/hacking /r/netsec /r/howtohack /r/websec /r/sysadmin /r/blackhat Ever heard of it before? Reddit

Slide 16

Hang out on Freenode to talk through challenges and difficulties you have trouble with. #metasploit – Metasploit developers #corelan – Folks from Corelan team #vulnhub – Folks from Vulnhub team #offsec – Folks from Offensive Security Not all that dissimilar to pirate ships Freenode

Slide 17

Good way to keep track of the industry’s pulse Lots of mailing lists for all skill levels and areas of interest #SPAMSPAMSPAM Mailing Lists

Slide 18

Ghost in the Wires The Art of Intrusion The Art of Deception Kingpin The Cuckoo’s Egg Code Hacking – The Art of Exploitation What are those again? Books

Slide 19

Sneakers Hackers War Games The good, the bad, and the ugly Movies

Slide 20

DEF CON Black Hat Shmoocon Meet your fellow nerds Conferences

Slide 21

Some of the venues listed previously are less friendly towards new-comers than others. General rule of thumb is to research any questions that you have prior to asking them. Showing that you’ve done your own work before asking for the help of others goes a long way in this community. Armor of thick skin+3 Disclaimer

Slide 22

Lessons to be Learned Straight Edumacated

Slide 23

The hardest part is having the gumption to stick with it. Technical skills can be learned (even if learned slowly). Technical skills are required, and typically the more the better. Perhaps, Perhaps, Perhaps So Now we Get Into the Difficult Stuff?

Slide 24

Incredibly-thorough course on Computer Science Learn from the best of them Harvard Introduction to CS

Slide 25

Fundamental understanding of networking is important One bytes two bytes three bytes four Computer Networks on Coursera

Slide 26

The ability to write code greatly helps in this field. From script kiddie to script master Programming for Everybody on Coursera

Slide 27

OpenSecurityTraining can be found online “Is dedicated to sharing training material for computer security classes, on any topic, that are at least one day long.” Has free, professional courses on all matters hacking Even has course outlines and pre-requisites! Hardly known but hugely helpful

Slide 28

SecurityTube can be found online Large amounts of free videos created by the site’s founder Aggregation of conference videos and lectures Full primers on lots of different hacking areas Aggregate those videos!

Slide 29

Corelan can be found online In-depth tutorials detailing exploit-writing and binary exploitation Tons of other educational resources, primarily focused on binary and RE topics Write yourself some exploits

Slide 30

Offensive Security can be found online The group that created Backtrack and Kali Linux distributions Training is not free, but the training you get from their courses is top-notch and well-managed. Has an IRC channel that you can hang out in! The authors of kali, Backtrack Offensive Security

Slide 31

Has a number of certifications for security training Not free, must pay to maintain certifications Getting certified SANS Institute

Slide 32

Cisco has a number of certifications in the security space. Not free, must pay to maintain certifications MOAR CERTIFICATIONS?! Cisco Certifications

Slide 33

Go to Work Getting your hands not-so-dirty

Slide 34

VulnHub can be found online: A large repository of software images that are created solely to be vulnerable Great place to get software packages to hack on Has an IRC channel you can hang out in! Stand up your own lab Vulnerable Images

Slide 35

Web application that is built specifically to have lots of vulnerabilities Great starting place for beginning to hack Web applications Emphasis on the d DVWA

Slide 36

CTF365 can be found online: Touts a massive online, persistent CTF CTFTime can be found online: Keeps track of CTF competitions worldwide, maintains scores for teams across different CTFs Brutal training grounds Ongoing Competitions

Slide 37

We Chall can be found online: Is an aggregation site for individual challenges Advertises a total of 133 challenges available Short, sweet, and to the point Stand-Alone Challenges

Slide 38

Managed service provider that consolidates bug bounty programs Go and hack things in real life and get $$$ Industry experience Bugcrowd

Slide 39

Tools of the Trade An awfully full bag of tricks

Slide 40

Used for monitoring local network traffic Great way to learn more about network protocols Networks are chattier than you may think Wireshark

Slide 41

An HTTP proxy with lots of hacky bells and whistles Used universally across the professional security industry Web app hacker’s swiss army knife Burp Suite

Slide 42

Packaged in with all modern browsers Used mostly by developers for testing functionality during the development process Repurposing tools for fun and profit! Browser Developer Tools

Slide 43

Good tool for generating password lists Made by yours truly ? A good password list is nice to have LavaPasswordFactory

Slide 44

Where LavaPasswordFactory generates password lists, John the Ripper cracks them! Crack goes the password John the Ripper

Slide 45

The de facto standard penetration testing Linux distribution Comes with all of the bells and whistles at installation Bells and whistles galore Kali Linux

Slide 46

Great platform for virtualization If you don’t know what virtualization, check it out! Virtualization is your friend VMWare Fusion / Workstation

Slide 47

Making it Count What next?

Slide 48

Penetration testing Security analyst Security engineer All the technical things! Hacking for good Positions in the Field

Slide 49

Doing this stuff maliciously is a bad idea Far too many opportunities to help others and the community Don’t let it go to waste We’ve already got enough bad guys Don’t Let it go to Waste

Slide 50

References A Centralized Story

Slide 51

The Electronic Frontier Foundation on the Computer Fraud and Abuse Act Wikipedia on Aaron Swartz H3 at Georgia Tech Research Institute The UCSB iCTF SECCDC Take One References

Slide 52

VulnHub – Vulnerable by Design CTF365 CTF Time! WeChall – A Challenge Aggregation Site Take two References

Slide 53

Atlanta OWASP Security Mailing Lists Sneakers movie on IMDB Hackers movie on IMDB Take three References

Slide 54

War Games movie on IMDB Hacking movies list on IMDB DEF CON Black Hat Take four References

Slide 55

Shmoocon Harvard Introduction to Computer Science Computer Networks on Coursera Programming for Everybody on Coursera Take five References

Slide 56

OpenSecurityTraining Security Tube Offensive Security Take six References

Slide 57

SANS Security Training Cisco Security Training DVWA BugCrowd Take seven References

Slide 58

Wireshark Burp Suite Reddit Freenode IRC Take eight References

Slide 59

Questions? Hopefully you’ve got a few

Slide 60

Thank you @_lavalamp