A Two day workshop on cyber security and recon taken by me in GDSC-BITW. It covers topics, cyber security, penetration testing, linux fundamentals, practice labs.
4. Table of contents
What is Recon, why it is
necessary, general
practices, effective recon.
Cyber Security, Career,
Roadmaps.
Why Linux, Windows vs.
Linux.
OSINT framework,
importance of OSINT
Installation, Command Line, File
System, Tools and
Technologies.
TryHackMe and
HackTheBox labs
01
04
02
05
03
06
Introduction Why Linux Linux Fundamentals
Recon OSINT LABS
11. What is Cyber Security
It is a practice to take advantage of vulnerability or loophole in the
system.
Some times people do these activities for illegal work or for helping
others to stay safe.
To secure yourself from the evil peoples.
12. Skills required
• Problem solving
• Troubleshooting
• Computers basic knowledge
• Linux command line
• Networking
• Programming
13. Quick insights of basic terminologies
One who hack for illegal work, without
permissions.
One who hack for good reason with
permissions.
White Hat Hacker
Black Hat Hacker
Grey Hat Hacker
Hacks without permission but doesn’t harm
anyone.
14. Infected computer used to
harm, to perform DDOS
Malicious software which is
used to damage or harm
the system
Denail of Service is used to
send large number of
packets to the target
Distributed DOS is done with
multiple system and multiple
user with the help of botnet
A file infected by a malware
which can be used to take
access to the system
A fake url page sent to target
to gain credentials
Botnet Malware Exploit
DOS DDOS Phishing
15. A cryptographic term used to
convert a plain text into
unreadable text using keys
and algorithms
A cryptographic term used to
convert a unreadable text
into plain text using keys
and algorithms
Infected file through which
hacker can spy the
activities of target user
It creates a backdoor to target
system through which
attacker can get access into it
silently
It is an deadly attack which
encrypts the file
Used to change IP address
and our location
Encryption Decryption Ransomware
Spyware Trojan Horse VPN
16. A cryptographic term used to
convert a plain text into
unreadable text using keys
and algorithms
A cryptographic term used to
convert a unreadable text
into plain text using keys
and algorithms
Infected file through which
hacker can spy the
activities of target user
It creates a backdoor to target
system through which
attacker can get access into it
silently
It is an deadly attack which
encrypts the file
Used to change IP address
and our location
Social Engineering Decryption Ransomware
Spyware Trojan Horse VPN
18. Steps performed by an Ethical Hacker
It covers pre discussion
on all activities involved
in penetration test and
discussion what to and
where to test.
Gathering of information
and scanning for
vulnenrabilites.
Documentation of
vulnerabilities and the
evidence collected
during the test.
To find the exploit for the
found vulnerability.
Plan
Report
Discover
Attack
21. Why Linux
Uses Less resources
and provides secured
environment
A better file system
and powerful than
windows
It is open source and
stable
Fully customizable from
each aspects and most of
cyber security tools are
created for linux
22. Kali Linux
A penetration testing
framework compatitable to run
on all devices like arm, pc,
desktop, mobile, tablets
23. Resources to practice
• Picoctf
• Tryhackme
• Hackthebox
• Overthewire
• Portswigger
• vulnhub
29. CREDITS: This presentation template was created by Slidesgo, and
includes icons by Flaticon, and infographics & images by Freepik
Thanks!
Do you have any questions?