hacker bootcamp
TRANSCRIPT
![Page 1: Hacker bootcamp](https://reader033.vdocuments.us/reader033/viewer/2022050806/58f30a4b1a28abf9138b45b1/html5/thumbnails/1.jpg)
HackBamaHacker Bootcamp and CTF event.
1
![Page 2: Hacker bootcamp](https://reader033.vdocuments.us/reader033/viewer/2022050806/58f30a4b1a28abf9138b45b1/html5/thumbnails/2.jpg)
CTF Event
2
Team Server Battleground
![Page 3: Hacker bootcamp](https://reader033.vdocuments.us/reader033/viewer/2022050806/58f30a4b1a28abf9138b45b1/html5/thumbnails/3.jpg)
“There are three common types of CTFs:
● Jeopardy
● Attack-Defence
● mixed
3
Capture the Flag (CTF) is a special kind of information security competitions.
![Page 4: Hacker bootcamp](https://reader033.vdocuments.us/reader033/viewer/2022050806/58f30a4b1a28abf9138b45b1/html5/thumbnails/4.jpg)
“● Login
● Explore
● Locate
● Pivot
● Control
● Defend4
You’ll then begin in the virtual battlegrounds.
![Page 5: Hacker bootcamp](https://reader033.vdocuments.us/reader033/viewer/2022050806/58f30a4b1a28abf9138b45b1/html5/thumbnails/5.jpg)
Embedded DeviceTeam Server
5
Servers get and ethernet connection to the battleground.Points are gained for keeping services running.Teams may attack each other's servers.Teams may patch flaws in services. New services may be distributed during the course of the event. Teams will have to proxy through server to attain battleground points.
![Page 6: Hacker bootcamp](https://reader033.vdocuments.us/reader033/viewer/2022050806/58f30a4b1a28abf9138b45b1/html5/thumbnails/6.jpg)
Build Your own IOT device.
6
Hardware specificationH2 Quad-core Cortex-A7 H.265/HEVC 1080P.
·Mali400MP2 GPU @600MHz
512MB DDR3 SDRAM
10/100M Ethernet RJ45 POE is default off.
Onboard WIFI
XR819, IEEE 802.11 b/g/n
Supports external board via 13 pin header
USB 2.0 HOST,
26 Pins Header, compatible with Raspberry Pi B+
13 Pin Header, with 2x USB, IR pin, AUDIO(MIC, AV)
![Page 7: Hacker bootcamp](https://reader033.vdocuments.us/reader033/viewer/2022050806/58f30a4b1a28abf9138b45b1/html5/thumbnails/7.jpg)
“1.hardware assembly2.Linux kernel3.Embedded OS4.Setup & Maintenance5.Hardware Reverse
Engineering6.Software Reverse Engineering7.Penetration Testing
Methodology8.Programming Basics
7
Course Outline integrates with CTF
![Page 8: Hacker bootcamp](https://reader033.vdocuments.us/reader033/viewer/2022050806/58f30a4b1a28abf9138b45b1/html5/thumbnails/8.jpg)
Class#1Hardware Assembly
8
● Learn the components of an embedded system.
● how to assemble the embedded system
● How to solder● Make your own custom IOT
device● Discus ways that system can be
expanded to do more.
![Page 9: Hacker bootcamp](https://reader033.vdocuments.us/reader033/viewer/2022050806/58f30a4b1a28abf9138b45b1/html5/thumbnails/9.jpg)
Class#2Linux Kernel
9
● What is the Kernel? ● How to compile a system
specific kernel for better system performance.
● How to apply a kernel patch.● How to edit the kernel.● Hardening the kernel against
cyber threats.
![Page 10: Hacker bootcamp](https://reader033.vdocuments.us/reader033/viewer/2022050806/58f30a4b1a28abf9138b45b1/html5/thumbnails/10.jpg)
Class#3Setting up the operating system on your embedded system.
10
● Getting access to the embedded system
● Making updates to the system● How to compile a program● Installing services
![Page 11: Hacker bootcamp](https://reader033.vdocuments.us/reader033/viewer/2022050806/58f30a4b1a28abf9138b45b1/html5/thumbnails/11.jpg)
Class #4Configuration, maintenance and hardening.
11
● How to configure common services.
● How to maintain a linux system.● How to lock things down to
protect your system from threats.
![Page 12: Hacker bootcamp](https://reader033.vdocuments.us/reader033/viewer/2022050806/58f30a4b1a28abf9138b45b1/html5/thumbnails/12.jpg)
Class #5Hardware reverse engineering basics
12
● This will be cover the basics of how to glean information about unknown systems.
● Hardware component visual identification.
● gaining access or pulling software via programming and testing ports.
● bypassing hardware protective measures.
● chip decapping
![Page 13: Hacker bootcamp](https://reader033.vdocuments.us/reader033/viewer/2022050806/58f30a4b1a28abf9138b45b1/html5/thumbnails/13.jpg)
Class #6Software Reverse Engineering
13
● Course on malware reverse engineering
● Dissecting the code● Analysing traffic
![Page 14: Hacker bootcamp](https://reader033.vdocuments.us/reader033/viewer/2022050806/58f30a4b1a28abf9138b45b1/html5/thumbnails/14.jpg)
Class #7Penetration Testing Methodology
14
![Page 15: Hacker bootcamp](https://reader033.vdocuments.us/reader033/viewer/2022050806/58f30a4b1a28abf9138b45b1/html5/thumbnails/15.jpg)
Class #8Essential Skills Needed and Why
15
● Programming● Databases● Researching● Tools● Networking● Problem-Solving Skills