0% found this document useful (0 votes)
12 views

Week 1

Uploaded by

jou20230893
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Week 1

Uploaded by

jou20230893
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Welcome!

CSC Beginners Training (Level


One)
First Semester 2024/25 (Fall)
About the Club:
• CSCPSUT
• Trainings, Workshops, Talks, CTFs, much more
• Main goals are spreading awareness about information
security in the community as well as sharing the passion and
interest to help each other grow and develop in security
related topics.
• https://cscpsut.com/
• https://ctf.cscpsut.com/
WHAT IS CYBERSECURITY?
Cybersecurity Career Paths
1. Security Analyst
• Defends systems against cyber threats
• Monitors networks for suspicious activity
2. Red Team (Offensive Security)
• Simulates attacks to find vulnerabilities
• Tests and improves security defenses
3. SOC Analyst
• Monitors security events in real time
• Responds to incidents and escalates as needed
4. GRC (Governance, Risk, and Compliance)
• Ensures security policies and compliance
• Manages risk and regulatory requirements
5. Incident Response Analyst
• Investigates and responds to security breaches
• Works with teams to contain and fix issues
CIA TRIAD
CAPTURE THE FLAG
(CTF)
Capture The Flag (CTF) competitions are cybersecurity challenges where
participants solve a variety of security-related puzzles and tasks to find hidden
“flags”. The more flags you find, the more points you receive.

Some categories found in CTFs:

OSINT – Web Exploitation – Forensics – Cryptography – Reverse Engineering –


Binary Exploitation

https://ctf101.org/ https://ctftime.org/calendar/
https://tryhackme.com/ https://picoctf.org/
https://app.hackthebox.com/ https://www.root-me.org
OPEN-
SOURCE
INTELLIGENC
E (OSINT)
WHY IS
OSINT
IMPORTANT?
WHAT IS OSINT?
OSINT is the collection and analysis of data gathered from open sources
to produce actionable intelligence.

OSINT can be conducted for infinitely many scenarios, these scenarios


include:
• Missing Person Search
• Scam Investigations
• Person of Interest Background Check
• And literally anything that comes to your mind!
OSINT RESOURCES
DISCLAIMER: WE ARE NOT
RESPONSIBLE FOR ANYTHING YOU DO
WITH THE INFORMATION WE TEACH
YOU!!!!!
• https://start.me/p/b5Aow7/asint_collection
• https://osintframework.com/
• https://osint.industries/
• And most importantly: https://www.google.com/
1. GOOGLE
DORKING
Google Dorking, also known as Google Hacking, is the “art” of
searching through google to find more accurate results, eliminating all
irrelevant results.

There are various techniques and usages for Google


Dorking. We will go through most of the common
techniques. Those techniques can be applied to any
search engine of your choosing.

• https://www.blackhat.com/presentations/bh-europe-05/BH_EU_05-Long.pdf

• https://gist.github.com/sundowndev/283efaddbcf896ab405488330d1bbc06

• https://web.archive.org/web/20140822191407/http://www.boris-koch.de/wp-conte
nt/uploads/2011/01/Liste-Google-Hacking.pdf
2. REVERSE IMAGE
SEARCH
Reverse image search is a technique used to find information related to a particular
image. Instead of using text-based queries to search for images, you provide an image
as input, and the search engine or tool tries to find similar or related images, as well as
information about the image.

Common use cases for reverse image search include:


1. Identifying Objects or People
2. Verifying Authenticity
3. Finding Higher-Resolution Versions
4. Locating the Source
5. Research and Inspiration
3. SOCIAL MEDIA
OSINT
Gathering and analyzing publicly available information from various social media
platforms to gain insights, track trends, and assess individuals or organizations. It
involves extracting data, such as posts, profiles, and interactions, to support research,
investigations, and decision-making.

https://inteltechniques.com/tools/Email.html
https://github.com/megadose/holehe
https://whatsmyname.app/
https://archive.org/
https://github.com/sherlock-project/sherlock
4. BUSINESS OSINT
Gathering publicly accessible information about businesses. Users utilize online
sources like websites, social media, news outlets, and public records to acquire
insights into a company's activities, performance, and strategies, aiding in informed
decision-making and market understanding.

• Gathering information about a target company


• Gathering information about target personnel
• Leveraging business and social networks
• Using leak/breach data effectively

https://mxtoolbox.com/SuperTool.aspx%20that
https://opencorporates.com/
https://haveibeenpwned.com/
METHODOLOGY
• Know your goal: Clearly articulate your goals and what
information you need
• Know what you have: Think about the information you
have and what you can do with it
• Always research what you have
• Be Ready to get lost in information dumps and
learning to filter out what’s important and what isn’t
• There are many fields of OSINT, pick the one you’re
interested in and learn as much as you can about it.
Questions

You might also like