Skip to content

Cyber Hackathon Workshop Experience — Day 1

Updated: at 11:01 PM (8 min read)

IGNITE in collaboration with Ministry of I.T. has been organizing Cyberhackathon across major cities of Pakistan to attract youth towards untapped jobs of cybersecurity for past 4 years. Before the actual hackathon, organizers arrange workshops across cities to give the participants chance to brush up their cyber skills and gain knowledge from the industry experts. I had the chance to attend one of the workshops today & I’ll be documenting my experience in this writeup.

Table of Contents

Open Table of Contents

Distinguished Speakers

Material Covered

Mr. Ahsan gave the overview of Cyber Security Space — how threats are evolving, state sponsored targeted incidents of stuxnet and lazarus. Discussed the benefits of adoption of pro-active over the traditional approaches.

Mr. Salman gave us overview about Networks & Securing them — OSI Models, TCP/IP models, IPv4/IPv6, IP subnetting, IPS/IDS and different types of WLAN Network attacks.

Mr. Ali Zain gave us more of hand on practice about network analysis tools — wireshark, nmap, nikto and burpsuite. We played 6 CTFs and were explained the

Cyber Security Overview

In this section we were briefed about brief history, attacks classification, CIA triads, Mitre ATT&CK and CTFs. Mr. Ahsan was kind enough to walkthrough us with the overview of the ever evolving cyberspace & took few quizes on Mentimeter to check our understanding and at the same time keep us engaging.

Common Cyber Security Threats

Discussed the potential of cyber space in the upcoming era, subfields of cyber security. The rise of threat intelligence, adoption of proactive approaches over traditional active approaches, mindset development and then skill development were discussed. We talked about types of attacks, which are commodity attacks happening 90% of the time, targeted attacks having 9.9% share and 0.1% belongs to state sponsored targeted attacks. We discussed the cyber-security in view of geopolitical scenarios such as stuxnet and lazarous incidents and the need of the cyber-skilled personals to defend the national interests.

CIA Triads

CIA triad is made up of Confidentiality, Integrity, Availability and are said to be the pillars of cyber space along with the new additions of non-repudiation and authorization. Below is brief explanation of each of the terms:

Mitre ATT&CK

I’m not a beginner in cyber space and have been following it for about 4 years, but the fact that I was unfamiliar with such goldmine struck me hard internally. Mitre ATT&CK which stands for Adversarial Tactics, Techniques and Common Knowledge is a database of adversary tactics and techniques based on real-world observations. Quoting the website,

The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community.

Cryptography & Cryptanalysis

Several cryptographic algorithms such as Ceaser cipher, Motor cipher, ROT13, Vigenère cipher and several others were discussed. We talked about the difference b/w hash functions (irreversible & fixed length output) and encryption (reversible & output length varies of the input), types of encryption (symmetric & asymmetric). We saw a practical demo of ciphers, hash functions when input certain string and understood their functionality well.

Impacts of Quantum computing leaps, threats of Quantum computing to the current encryption algorithms, rise of Quantum Encryption & Cryptography were talked in details.

CTFs — Intro & Getting Started with

The concept of CTF wasn’t new to me, I’ve practiced some CTFs online and found them to be difficult considering my knowledge back then and left considering it was only for those with deep dive computer and networks knowledge.

Capture the flag or CTFs events are gamified competitive hacking events that are based on different challenges or aspects of information security. We practiced 6 CTFs with Mr. Ali Zain with wireshark and it was totally fun exploring things :)

Hack the Box, TryHackMe and several other providers exists online that provides machines or challenges to the persons looking to improve their skills.

Networks Refresher & Network Security

In this section, Mr. Salman gave us walkthrough with Networks Fundamentals, Network Threats and implementing measures for Networks Security.

Fundamentals

Quick refresher to the network fundamentals such as IPv4/IPv6, OSI model, TCP/IP model, NAT, Subnetting were given by the speaker. Transition of IPv4 to IPv6, why we the need of OSI model arose when the TCP/IP model existed & the role of NAT in accommodating the internet devices within the IPv4 was discussed.

OSI Model LayerTCP/IP Model LayerDescription
Application LayerApplication LayerInterfaces directly with end-user applications and provides network services.
Presentation Layer-Formats and encrypts data for the application layer.
Session Layer-Manages sessions between applications, establishing and terminating connections.
Transport LayerTransport LayerEnsures reliable data transfer, error checking, and flow control.
Network LayerInternet LayerHandles routing of packets across networks using logical addressing (IP).
Data Link LayerLink LayerResponsible for node-to-node data transfer and error detection.
Physical LayerNetwork Interface LayerTransmits raw bits over a physical medium, defining hardware specifications.

Firewalls, IDS and IPS

Firewalls are used to monitor, filter and control the incoming and outgoing internet traffic based on predetermined rule. Different types of firewalls such as NGFW, Perimeter firewall, Software and Hardware based firewalls were discussed.

Intrusion detection systems (IDS) and intrusion prevention systems (IPS) constantly watches the network, identifying possible incidents and logging information about them, stopping the incidents, and reporting them to security administrators.

WLAN Vulnerabilities & Attacks

Speaker discussed various WLAN vulnerabilities such as usage of weak encryption protocols (WEP, WPA2, WPA2), poorly configured hardware and default settings that lead to exploitation and unauthorized access.

Practice with Network Analysis Tools

In the previous sections, we were given theoretical background knowledge of the cyber and the related domains for better understanding the whole picture. In this section, we were guided by Mr. Ali Zain in playing 6 CTFs and this was the fun part of the day for me.

Conclusion

The first day of the workshop was engaging and full of knowledge. I appreciate the efforts and hardwork of IGNITE and the speakers in arranging and giving lectures in the workshop. Theoretical portion took the majority of the time today, since we all need basic refresher into what we’re going to learn, its significance, but the ground work has been done and I’m hoping to do more challenges on the day 2 of the workshop.