SlideShare ist ein Scribd-Unternehmen logo
1 von 28
How I learnt hacking in
high school
Lokesh Pidawekar
The road ahead
● Why learn this?
● Creating the lab environment
● How to learn
● Caveats
● What next, opportunity?
● Conclusion
● Security Engineer at Cisco Systems, Inc.
● Mastered Science of Information
Assurance from Northeastern University,
Boston (MA)
● Occasionally blog at
infosecforever.blogspot.com
● @MaverickRocky02
● lokesh [dot] pidawekar [at] gmail [dot] com
Disclaimer
The tools and techniques covered in the presentation can be dangerous and
are being shown only for educational purposes.
It is a violation of Federal and some states’ laws to attempt to gain
unauthorized access to information assets or systems belonging to others, or to
exceed authorized on systems for which access have not been granted.
Only use these tools with/on systems you own or with written permission from
the owner. Speaker does not assume any responsibility and shall not be held
liable for any illegal use of these tools.
Why learn this
http://www.wordstream.com/images/attention-economy-zoidberg-why.png
Penetration Testing
“Penetration testing is security testing in which assessors
mimic real world attacks to identify methods for
circumventing the security features of an application,
system or network1”
http://kcdigitalarts.net/wp-content/uploads/2013/01/simulation-network-security-consultation.jpg
Why Pentest?
● Better (cost and effort) to find holes before attackers
exploit them
● Vulnerability assessment is not enough
● Requirement from compliance standards such as PCI
DSS2
● Increases the security of the computing resources being
tested
How did I start
● Curiosity
● Self phishing (My first endeavor)
● Reading blogs about breaking things
● Practicing techniques on old software
● Attending security meetups
And why?
● They don’t teach how to break systems in schools
but employers expect to defend all attacks as if we
know how to do it
● Cruising through the interviews and practical tests
● To develop penetration testing skill
Know thy self, know thy enemy. A thousand
battles, a thousand victories
- Sun Tzu
Let the show begins
Recipe for making a hacking lab
● Some virtualization platform
● installing required software for attack
● installing vulnerable software
● learning key concepts
The infrastructure
● Raspberry Pi, old laptop
● Virtualization Software -
o VMware fusion/workstation (if the
school is giving free license),
otherwise vmware player, Oracle
Virtualbox, Qemu
http://catstechnology.com/wp-
content/uploads/2014/03/0FVNM9EASJX.jpg
Attacking OS
Dedicated OS
● Kali Linux (Formerly known as Backtrack)
● Samurai WTF
● Santoku Linux
● Backbox Linux
● Pentoo
● Android Tamer (because it’s the age of mobile)
Recent developments to build frameworks for pentesting is exciting for e.g.
Pentestbox, Appie, Pentester’s framework etc.
Vulnerable Platforms for practice
Operating System Metasploitable 2
Vulnerability Specific
Images
Pentesterlab, vulnhub, CTFs images
Web Application WebGoat, BwaPP, DVWA, OWASP
Bricks
Mobile Applications GoatDroid, InsecureBankv2, DVIA
Custom Cloud based Hack.me
Learning, how to:
● Hacking is not point and shoot
● Fundamental from OWASP
● Security Researchers blogs e.g. Project Zero3, etc.
● Conference talks, videos (anyone heard of @irongeek or
@securitytube)
● Online courses on Coursera, udemy etc.
Practice and Dedication
SQLi,
XSS,
Password
Cracking
etc.
Opportunities
Huge Opportunity
http://money.cnn.com/pf/best-jobs/2015/list/
Security recruitment and hacking
● Hacking the company will put you in prison
● Companies are becoming more hands-on while
recruitment
● There is no dummies guide for cracking security
interviews
Wargames and Capture the Flag
● There are plenty of CTF games happening throughout the year (Check any
Con)
● Some CTF are live round the year
o http://overthewire.org/wargames/ - Challenges ranging from web app
to Linux command and overflows
o http://io.smashthestack.org/
Online challenges
The researchers, companies put online challenges for various attacks
● https://xss-game.appspot.com/
● https://github.com/yahoo/webseclab
● https://google-gruyere.appspot.com/
● https://github.com/cure53/xss-challenge-wiki/wiki/Older-Challenges-and-
Write-Ups
Responsible Disclosure
● Because we are white hats :)
● Builds trust between vendors
and security community
● Name and fame or even some
money
http://web.securityinnovation.com/Portals/49125/images/Disclo
sure.jpg
Bug Bounty
Most of the companies have started to reward
researchers as part of bug bounty program
Example - Google, Facebook, LinkedIn etc.
Responsible disclosed vulnerabilities to Sony,
Prezi.com, Eventbrite etc.
There are platforms such as BugCrowd,
HackerOne, Synack, CrowdCurity etc. to
mediate for crowdsourcing bug bounty
Some guidelines to follow
● Write a concise report with proper steps to reproduce
the vulnerability
● Test security for the targets that are where you have
permissions explicitly
● Respect the vendor, do not indulge in malpractice
against them
● Do not copy paste other researcher’s report (there are
hell lot of bugs yet to be found)
● Rapid skill development is key to success in security
● They can’t teach everything in class
● It’s not easy to gain experience of exploiting all
vulnerabilities in real world
● Defense can be designed well if we will know attacking
techniques
Conclusion
References
1. http://csrc.nist.gov/publications/nistpubs/800-115/SP800-115.pdf
2. https://www.pcisecuritystandards.org/pdfs/infosupp_11_3_penetration_test
ing.pdf
3. http://googleprojectzero.blogspot.com/
4. http://www.zdnet.com/article/pwn2own-2015-the-year-every-browser-went-
down/
5. http://www.google.com/about/appsecurity/reward-program/
6. https://www.facebook.com/whitehat?_rdr
7. https://community.rapid7.com/docs/DOC-1875
8. https://pentesterlab.com/
Questions
Email - lokesh[dot]pidawekar[at]gmail[dot]com

Weitere ähnliche Inhalte

Was ist angesagt?

[PDF] Penetration Testing: A Hands-On Introduction to Hacking
[PDF] Penetration Testing: A Hands-On Introduction to Hacking[PDF] Penetration Testing: A Hands-On Introduction to Hacking
[PDF] Penetration Testing: A Hands-On Introduction to Hacking
ubew4tg34
 

Was ist angesagt? (7)

[PDF] Penetration Testing: A Hands-On Introduction to Hacking
[PDF] Penetration Testing: A Hands-On Introduction to Hacking[PDF] Penetration Testing: A Hands-On Introduction to Hacking
[PDF] Penetration Testing: A Hands-On Introduction to Hacking
 
Low Cost Tools for Security Challenges - Timothy De Block
Low Cost Tools for Security Challenges - Timothy De BlockLow Cost Tools for Security Challenges - Timothy De Block
Low Cost Tools for Security Challenges - Timothy De Block
 
Security principles and experiences from security audit (for .NET developers)
Security principles and experiences from security audit (for .NET developers)Security principles and experiences from security audit (for .NET developers)
Security principles and experiences from security audit (for .NET developers)
 
Reversing malware analysis training part10 exploit development basics
Reversing malware analysis training part10 exploit development basicsReversing malware analysis training part10 exploit development basics
Reversing malware analysis training part10 exploit development basics
 
OWASP: iOS Spelunking
OWASP: iOS SpelunkingOWASP: iOS Spelunking
OWASP: iOS Spelunking
 
Intro to Malware Analysis
Intro to Malware AnalysisIntro to Malware Analysis
Intro to Malware Analysis
 
Strayer sec 420
Strayer sec 420Strayer sec 420
Strayer sec 420
 

Ähnlich wie How I Learnt hacking in High School - BSidesLV - 2015

Web Security: What's wrong, and how the bad guys can break your website
Web Security: What's wrong, and how the bad guys can break your websiteWeb Security: What's wrong, and how the bad guys can break your website
Web Security: What's wrong, and how the bad guys can break your website
Andrew Sorensen
 
Exploits Attack on Windows Vulnerabilities
Exploits Attack on Windows VulnerabilitiesExploits Attack on Windows Vulnerabilities
Exploits Attack on Windows Vulnerabilities
Amit Kumbhar
 
CISSP Week 14
CISSP Week 14CISSP Week 14
CISSP Week 14
jemtallon
 
Finalppt metasploit
Finalppt metasploitFinalppt metasploit
Finalppt metasploit
devilback
 
Security engineering 101 when good design & security work together
Security engineering 101  when good design & security work togetherSecurity engineering 101  when good design & security work together
Security engineering 101 when good design & security work together
Wendy Knox Everette
 

Ähnlich wie How I Learnt hacking in High School - BSidesLV - 2015 (20)

Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015
Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015 Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015
Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015
 
So you wanna be a pentester - free webinar to show you how
So you wanna be a pentester - free webinar to show you howSo you wanna be a pentester - free webinar to show you how
So you wanna be a pentester - free webinar to show you how
 
Getting ready for a Capture The Flag Hacking Competition
Getting ready for a Capture The Flag Hacking CompetitionGetting ready for a Capture The Flag Hacking Competition
Getting ready for a Capture The Flag Hacking Competition
 
Online Sync meetup: Metasploit 101 slides
Online Sync meetup: Metasploit 101 slidesOnline Sync meetup: Metasploit 101 slides
Online Sync meetup: Metasploit 101 slides
 
Year Zero
Year ZeroYear Zero
Year Zero
 
Web Security: What's wrong, and how the bad guys can break your website
Web Security: What's wrong, and how the bad guys can break your websiteWeb Security: What's wrong, and how the bad guys can break your website
Web Security: What's wrong, and how the bad guys can break your website
 
Ethical Hacking Conference 2015- Building Secure Products -a perspective
 Ethical Hacking Conference 2015- Building Secure Products -a perspective Ethical Hacking Conference 2015- Building Secure Products -a perspective
Ethical Hacking Conference 2015- Building Secure Products -a perspective
 
Exploits Attack on Windows Vulnerabilities
Exploits Attack on Windows VulnerabilitiesExploits Attack on Windows Vulnerabilities
Exploits Attack on Windows Vulnerabilities
 
CISSP Week 14
CISSP Week 14CISSP Week 14
CISSP Week 14
 
DMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal TricksDMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal Tricks
 
Security Champions - Introduce them in your Organisation
Security Champions - Introduce them in your OrganisationSecurity Champions - Introduce them in your Organisation
Security Champions - Introduce them in your Organisation
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdfVulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
 
Built-in Security Mindfulness for Software Developers
Built-in Security Mindfulness for Software DevelopersBuilt-in Security Mindfulness for Software Developers
Built-in Security Mindfulness for Software Developers
 
Finalppt metasploit
Finalppt metasploitFinalppt metasploit
Finalppt metasploit
 
Real life hacking101
Real life hacking101Real life hacking101
Real life hacking101
 
Chapter 9 system penetration [compatibility mode]
Chapter 9 system penetration [compatibility mode]Chapter 9 system penetration [compatibility mode]
Chapter 9 system penetration [compatibility mode]
 
Agile Secure Development
Agile Secure DevelopmentAgile Secure Development
Agile Secure Development
 
Security engineering 101 when good design & security work together
Security engineering 101  when good design & security work togetherSecurity engineering 101  when good design & security work together
Security engineering 101 when good design & security work together
 
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chancePenetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
 

Kürzlich hochgeladen

哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Monica Sydney
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
galaxypingy
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
Asmae Rabhi
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 

Kürzlich hochgeladen (20)

20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 

How I Learnt hacking in High School - BSidesLV - 2015

  • 1. How I learnt hacking in high school Lokesh Pidawekar
  • 2. The road ahead ● Why learn this? ● Creating the lab environment ● How to learn ● Caveats ● What next, opportunity? ● Conclusion
  • 3. ● Security Engineer at Cisco Systems, Inc. ● Mastered Science of Information Assurance from Northeastern University, Boston (MA) ● Occasionally blog at infosecforever.blogspot.com ● @MaverickRocky02 ● lokesh [dot] pidawekar [at] gmail [dot] com
  • 4. Disclaimer The tools and techniques covered in the presentation can be dangerous and are being shown only for educational purposes. It is a violation of Federal and some states’ laws to attempt to gain unauthorized access to information assets or systems belonging to others, or to exceed authorized on systems for which access have not been granted. Only use these tools with/on systems you own or with written permission from the owner. Speaker does not assume any responsibility and shall not be held liable for any illegal use of these tools.
  • 6. Penetration Testing “Penetration testing is security testing in which assessors mimic real world attacks to identify methods for circumventing the security features of an application, system or network1” http://kcdigitalarts.net/wp-content/uploads/2013/01/simulation-network-security-consultation.jpg
  • 7. Why Pentest? ● Better (cost and effort) to find holes before attackers exploit them ● Vulnerability assessment is not enough ● Requirement from compliance standards such as PCI DSS2 ● Increases the security of the computing resources being tested
  • 8. How did I start ● Curiosity ● Self phishing (My first endeavor) ● Reading blogs about breaking things ● Practicing techniques on old software ● Attending security meetups
  • 9. And why? ● They don’t teach how to break systems in schools but employers expect to defend all attacks as if we know how to do it ● Cruising through the interviews and practical tests ● To develop penetration testing skill
  • 10. Know thy self, know thy enemy. A thousand battles, a thousand victories - Sun Tzu
  • 11. Let the show begins Recipe for making a hacking lab ● Some virtualization platform ● installing required software for attack ● installing vulnerable software ● learning key concepts
  • 12. The infrastructure ● Raspberry Pi, old laptop ● Virtualization Software - o VMware fusion/workstation (if the school is giving free license), otherwise vmware player, Oracle Virtualbox, Qemu http://catstechnology.com/wp- content/uploads/2014/03/0FVNM9EASJX.jpg
  • 13. Attacking OS Dedicated OS ● Kali Linux (Formerly known as Backtrack) ● Samurai WTF ● Santoku Linux ● Backbox Linux ● Pentoo ● Android Tamer (because it’s the age of mobile) Recent developments to build frameworks for pentesting is exciting for e.g. Pentestbox, Appie, Pentester’s framework etc.
  • 14. Vulnerable Platforms for practice Operating System Metasploitable 2 Vulnerability Specific Images Pentesterlab, vulnhub, CTFs images Web Application WebGoat, BwaPP, DVWA, OWASP Bricks Mobile Applications GoatDroid, InsecureBankv2, DVIA Custom Cloud based Hack.me
  • 15. Learning, how to: ● Hacking is not point and shoot ● Fundamental from OWASP ● Security Researchers blogs e.g. Project Zero3, etc. ● Conference talks, videos (anyone heard of @irongeek or @securitytube) ● Online courses on Coursera, udemy etc.
  • 19. Security recruitment and hacking ● Hacking the company will put you in prison ● Companies are becoming more hands-on while recruitment ● There is no dummies guide for cracking security interviews
  • 20. Wargames and Capture the Flag ● There are plenty of CTF games happening throughout the year (Check any Con) ● Some CTF are live round the year o http://overthewire.org/wargames/ - Challenges ranging from web app to Linux command and overflows o http://io.smashthestack.org/
  • 21. Online challenges The researchers, companies put online challenges for various attacks ● https://xss-game.appspot.com/ ● https://github.com/yahoo/webseclab ● https://google-gruyere.appspot.com/ ● https://github.com/cure53/xss-challenge-wiki/wiki/Older-Challenges-and- Write-Ups
  • 22. Responsible Disclosure ● Because we are white hats :) ● Builds trust between vendors and security community ● Name and fame or even some money http://web.securityinnovation.com/Portals/49125/images/Disclo sure.jpg
  • 23.
  • 24. Bug Bounty Most of the companies have started to reward researchers as part of bug bounty program Example - Google, Facebook, LinkedIn etc. Responsible disclosed vulnerabilities to Sony, Prezi.com, Eventbrite etc. There are platforms such as BugCrowd, HackerOne, Synack, CrowdCurity etc. to mediate for crowdsourcing bug bounty
  • 25. Some guidelines to follow ● Write a concise report with proper steps to reproduce the vulnerability ● Test security for the targets that are where you have permissions explicitly ● Respect the vendor, do not indulge in malpractice against them ● Do not copy paste other researcher’s report (there are hell lot of bugs yet to be found)
  • 26. ● Rapid skill development is key to success in security ● They can’t teach everything in class ● It’s not easy to gain experience of exploiting all vulnerabilities in real world ● Defense can be designed well if we will know attacking techniques Conclusion
  • 27. References 1. http://csrc.nist.gov/publications/nistpubs/800-115/SP800-115.pdf 2. https://www.pcisecuritystandards.org/pdfs/infosupp_11_3_penetration_test ing.pdf 3. http://googleprojectzero.blogspot.com/ 4. http://www.zdnet.com/article/pwn2own-2015-the-year-every-browser-went- down/ 5. http://www.google.com/about/appsecurity/reward-program/ 6. https://www.facebook.com/whitehat?_rdr 7. https://community.rapid7.com/docs/DOC-1875 8. https://pentesterlab.com/

Hinweis der Redaktion

  1. https://community.rapid7.com/docs/DOC-1875 https://pentesterlab.com/ https://www.vulnhub.com/ https://ctf.isis.poly.edu/static/archives/2014/index.html https://www.owasp.org/index.php/Category:OWASP_WebGoat_Project http://www.mmeit.be/bwapp/download.htm http://www.dvwa.co.uk/ https://www.owasp.org/index.php/OWASP_Bricks http://damnvulnerableiosapp.com/ https://www.owasp.org/index.php/Projects/OWASP_GoatDroid_Project https://github.com/dineshshetty/Android-InsecureBankv2 https://hack.me/
  2. http://blog.securityinnovation.com/blog/2014/10/how-to-interview-at-security-innovation.html
  3. http://captf.com/practice-ctf/ http://www.wechall.net/challs/