Njack Csec - 2022

Download as pdf or txt
Download as pdf or txt
You are on page 1of 35

NJACK

CYBER SECURITY
Department
Cybersecurity

Cybersecurity is the practice of defending


computers, servers, mobile devices, electronic
systems, networks, and data from malicious attacks.

We sometimes use “Cyber Security” and “Ethical


Hacking” interchangeably but Ethical Hacking is
actually a part of cyber security.
What people say: “plenty of f sh in the sea”

What we hear: “plenty of PHISH in the sea”


What we def nitely don’t do

No, don’t be this


person

Stop your
creepypasta stuff
right there
What we def nitely don’t do

Darknet is a big
no-no from us
What we def nitely don’t do
IITP server ka
access mil gaya bro,
Apna CPI thoda bada
dete hai.
We don’t
misuse
our power
Expectations
Reality!
Misconceptions

➔ Hacking is all bad and


illegal.
➔ Hacker != Cracker
➔ If you saw it in a movie it
is probably inaccurate.
➔ And no you can’t just simply
hack your ex’s facebook
account
Random Terminal Image
Another one
What do we actually do in ethical hacking?

Mainly, we breach into websites and applications

● We break into systems (legally ofc)


● We participate in CTFs
● We build tools for security purposes
● Notify authorities about vulnerabilities in their
systems, the right way

What we don’t do:

● Abuse vulnerabilities without permission


● Deface websites
Capture The F ag
CTF (Capture The Flag) is a kind of information security
competition that challenges contestants to solve a variety
of tasks ranging from a scavenger hunt on wikipedia to basic
programming exercises, to hacking your way into a server to
steal data.

Basically, Hacking Puzzles


Categories of challenges
Web Exploitation - exploit the web application

Reverse engineering - decompile, disassemble and debug

Cryptography - math, encryption and encoding

Steganography - find hidden messages in images and other media


in their source code

Forensics - extract data out of files, over a port, discs, etc.

Binary Exploitation - finding a vulnerability in programs(binary


programs)
Challenge for you

John is new to cryptography. He just learned about ROT13 aka Caesar


Cipher,

Given the following information, help him to decrypt the message:

V nz Unpxrezna
ANSWER

I am Hackerman
GOOGLE CTF DEFCON PICOCTF

Some CTF events

APEIRON
CTF
(WIP)

INTER IIT
TECH MEET CTF
GSOC

Some
organizations
Open
Web
Application
Security
Project
Why Cyber Security?

The World needs Cyber Security Professionals

Excellent Job Security and Prospects

It's Fun, Rewarding Work - bug bounties and hacking


contests

And so you can say cool stuff like this


What we have for you

Sudo Override CTF - A CTF just for you!

Informative Teaching Sessions - we will organising various


sessions like Intro to Linux, Intro to CTFs, to get you started
with Cyber-Security

Biweekly Challenges - fun challenges covering various topics


like cryptography and reverse engineering

Workshops and Guest Lectures - workshops on ethical hacking,


cyber security tools, career opportunities, and a lot more
How to get started?
Last but not the
least
We have an
another quest
for you.
The Team

Siddharth Gupta Sarthak Biswas


Team OWASP

Dinesh Chukkala Rupak Biswas


THANK YOU!
DOUBTS?

(JUST KIDDING!)
The Team

Coordinator

Krishnan S N Utkarsh Singh


“Oh, I use arch btw” The Myth
The Puzzling Pineapple
Do any of you remember the pineapple from How I Met
Your Mother that ended up on Ted’s nightstand?
Yeah this is not it :P

(Btw, this is the answer to the first puzzle - https://github.com/Vaishakh-SM/php-login-reg)


Let’s get started
bit.ly/njack-linux

Any doubts?
Password:
Attackers
password
Phishing
mail

Present security
measures

You might also like