SlideShare a Scribd company logo
1 of 54
Project
KidHack
Teaching the Next Next Generation
Security through Gaming
@grecs & @pupstrr
NovaInfosec.com
Disclaimer
• Opinions expressed do not express the views
or opinions of
– my employers, his schools
– my customers,
– my wife, his mom
– my daughter, his sister
– my parents, his grandparents
– my in-laws, his other grandparents
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
20 Yrs Industry
16 Yrs Infosec
5 Yrs SOC
NovaInfosec Consulting
• General Security Engineering/Architecture
• Everything SOC
– Engineering
– Operations
– Training
– SOC 2.0
datamation.com/cnews/article.php/3851071/Tech-Comics-Cloud-Computing-Consultants.htm
Agenda
• Background
• Existing Games
• KidHack Project
• What’s Next?
• Conclusion
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
BACKGROUND
Why
Inspiration
Background
Why
Background
Why
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Background
Why
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Background
Why
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Background
Why
Feds Need 10,000 Cyber Security Experts (6/7/2009)
Cybersecurity business, jobs expected to grow through 2016 (10/21/12)
Fewer Cyber Pros, More Cyber Problems (9/1/14)
Background
Why
• NSA Tapping Schools of Excellence
• University “Cyber” Degrees
• Technical Training Organizations
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Background
Why
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Preparing Next Next
Gen of Infosec Pros
by Getting Interested
Early
Recent Trainer Role -
Contemplating Best
Ways to Teach
Focus on Simulation with Gaming
Versus Setting Up Real Environment
SIMULATION WITH GAMING
…
NEXT-
NEXT
GEN
TRAINING
ROLE
Background
Inspiration
• CTFs (for years)
• Bruce Potter – DerbyCon 2013
– It’s Only a Game: Learning Security through Gaming
• History of CTF Contests & Other Games Hardcore Security Pros Play
• Games that Can Be Used to Engage Non-Security Pros  More Focused on
Theory vs Collecting List of Games
• http://bit.ly/pottergaming
• MrsYIsY – Network Computing
– Want To Develop Information Security Skills?
Capture The Flag
• Simulation of Real-World Security Operations
• http://bit.ly/mrsyctf
• Ender’s Game
– Military Tactics
– Simulations/Drills
EXISTING GAMES
Hacker
[d0x3d!]
Control-Alt-Hack
Hackers & Agents
Pwn
Uplink
CryptoClub
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Hacker
• Type: Card
• History/About
– 1990: Secret Service Raided Steve Jackson Games
• Confiscated Equipment, including Illuminati BBS.
– 1992: Made Game of It
• Satirizing Secret Service, Hackers, Phone Companies, etc.
– 1993: Hacker II – The Dark Side - more players & new rules
– 2001: Hacker – Deluxe Edition – Combined All Above into
Box Set
• Objective
– Players Act as Hackers
– Compete Against Each Other to Control Most Systems
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Hacker
• Hacker uses a variation of the Illuminati system; players lay
out cards (representing systems) to create the Net, which is
never the same twice. But instead of separate “power
structures” for each player, there is only one Net, and
players place tokens to indicate what systems they have
invaded and how completely they control them.
• For 3 to 6 players; takes from 90 minutes to 2 1/2 hours.
The supplement, Hacker II, lets you add two more players.
• Components include rulebook, 110 cards, 172 marker
chips, 6 console units, lots of “system upgrades,” and other
markers.
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Hacker
• Hacker II
– Supplement to Hacker (not playable alone)
– New Rules: Viruses, the Internet Worm, outdials, multiple accounts,
Black Ice, and Military Hardware.
– Consoles & Tokens for 2 More Players
• Hacker – Deluxe Edition
– Can you break into the world’s toughest computer systems? In Hacker,
players sail through the Net, competing to invade the most systems.
The more systems you crack, the more you learn, and the easier your
next target is. You can find back doors and secret phone lines, and
even crash the systems your rivals are using. But be careful. There’s a
Secret Service Raid waiting for you!
– Designed by Steve Jackson, Hacker requires guile and diplomacy. To
win, you must trade favors with your fellow hackers – and get more
than you give away. But jealous rivals will try to bust you. Three busts
and you’re out of the game!
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Hacker
• Availability
– Out of Print
– Dealers In Out-Of-Print Games
• http://www.sjgames.com/general/outofprint.html
• Write-Up
– http://bit.ly/hackercardgame
• Kid Review
Existing Games
[d0x3d!]
• Type: Card/Board
• History/About
– Inspired by 2010 Game
Forbidden Island
– Introduces Attack & Defend Mechanics and Other
Basic Computer Security Constructs
• Objective
– Teaching Non-Techies Computer Security
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
[d0x3d!]
• In [d0x3d!], you and up to three other players take on the role of an 1337 hacker
syndicate, infiltrating a network to reclaim valuable digital assets that have been
stolen from them. What are these assets? There are four types—financial data,
personally identifiable information, authentication credentials, and intellectual
property—but what exactly these represents is your little secret. Embarrassing
photos? The recipe for the best BBQ in the world? You decide.
• As you seek out these valuable digital assets, the network admins respond:
patching compromised machines, raising alarms, sometimes changing its very
topology to impede your movement. You and your team work together,
compromising and looting machines on the network, trying to not alert the
network admins of your presence. If the admins feel too threatened by the activity
they see on their network, they will take your stolen personal data and release it
onto the internet! In other words, you’ll get d0x3d!
• You all win together, or you all lose together. Brave the network and protect your
data!
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
[d0x3d!]
http://youtu.be/oMi-GB9tc6s
Existing Games
[d0x3d!]
• Availability
– Open-Source & Freely Available
• https://github.com/TableTopSecurity/d0x3d-the-game
• Download & Print
– $25 Boxed Set from TheGameCrafter.com
• https://www.thegamecrafter.com/games/-d0x3d-
• Write-Up
– http://bit.ly/d0x3dgame
• Kid Review
Existing Games
Control-Alt-Hack
• Type: Card
• History/About
– 3-6 Players, 14+, ~ 1 hour
– Announced DefCon 2012
– Available Nov 2012 (Amazon)
– Designed by Tamara Denning, Tadayoshi Kohno,
Adam Shostack
• Objective
– Teaching Non-Techies Computer Security
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Control-Alt-Hack
• Based on a game mechanic by gaming powerhouse Steve Jackson Games
(Munchkin and GURPS), Control-Alt-Hack™ is a tabletop card game about
white hat hacking.
• You and your fellow players work for Hackers, Inc.: a small, elite
computer security company of ethical (a.k.a. white hat) hackers who
perform security audits and provide consultation services. Their motto?
“You Pay Us to Hack You.”
• Your job is centered around Missions-tasks that require you to apply your
hacker skills (and a bit of luck) in order to succeed. Use your Social
Engineering and Network Ninja skills to break the Pacific Northwest’s
power grid, or apply a bit of Hardware Hacking and Software Wizardry to
convert your robotic vacuum cleaner into an interactive pet toy…no two
jobs are the same. So pick up the dice, and get hacking!
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Control-Alt-Hack
http://youtu.be/Kpnvsgiiz8s
Existing Games
Control-Alt-Hack
• Availability
– Amazon.com
• Write-Up
– http://bit.ly/ctrl-alt-hack
• Kid Review
http://www.amazon.com/gp/product/B008HIX5KO/
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Hackers & Agents
• Type: Card
• History/About
– Created by Jason Bevis
– 2 – 8 Players, 12+, < 30 mins
– Similar to Uno
• Skip  Encrypted (w/ text you can analyze & decrypt)
• Draw Two  Logs
• Reverse  Lead
• Wild  SQL Injection (with example injection code)
• Wild Draw Four  Rootkit
• Number Cards (with its binary representation to learn from)
• Objective
– Teaching Non-Techies Computer Security
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Hackers & Agents
• The world has been infiltrated with hackers who are out
to steal your personal data if they can get their hands on
it. The agents are well armed with forensic techniques and
sworn to catch these cyberpunks.
• Be the first to rid yourself of all the cards in your hand
before every other player and obtain as few points as
possible.
• Each player scores penalty points for cards left in their
hand. As soon as one player has reached 300 points the
game is over and the person with the lowest score is the
winner.
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Hackers & Agents
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Hackers & Agents
• Availability
– $15 from TheGameCrafter.com
• https://www.thegamecrafter.com/games/hackers-agents
– $9 Threat Booster from TheGameCrafter.com
• https://www.thegamecrafter.com/games/hackers-agents-threat-
deckcon-booster
• Write-Up
– http://bit.ly/hackersandagents
• Kid Review
Existing Games
Pwn: Combat Hacking
• Type: Video
• History/About
– Released March 2013
– Designed by 82 Apps, Inc.
• Objective
– Various Node Layouts (e.g., grid)
– Take Over All Competitor Nodes
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Pwn: Combat Hacking
• Engage in fast-paced computer hacking wars against
your cyberpunk rivals like you were in a retro-
futuristic hacking movie.
• PWN is a fast-paced, real-time strategy game where
you face off against other hackers within 3D virtual
networks and take each other out using wits, skill, and
computer viruses. Place devious hidden trojans and
backdoors, while strategically defending yourself with
encrypted nodes and firewalls. PWN lets you feel like
the hero (or villain) of your favorite computer hacking
action movies.
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Pwn: Combat Hacking
http://youtu.be/9D23qABd9gg
Existing Games
Pwn: Combat Hacking
• Availability
– IOS
• $2.99
• http://bit.ly/pwnios1
– Mac
• $4.99
• http://bit.ly/pwnmac1
• Write-Up
– http://bit.ly/pwngame
• Kid Review
Existing Games
Uplink
• Type: Video
• History/About
– 2001: Released for Windows &
Linux by Introversion Software
– 2006: Valve's Steam
– 2011: Ubuntu Software Center
– 2012: iPad & Android
• Objective
– Standard One-Off Missions
– Storyline with Player Receiving an E-Mail from
Deceased Uplink Agent
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Uplink
• You play an Uplink Agent who makes a living by performing jobs for
major corporations. Your tasks involve hacking into rival computer
systems, stealing research data, sabotaging other companies,
laundering money, erasing evidence, or framing innocent people.
• You use the money you earn to upgrade your computer systems,
and to buy new software and tools. As your experience level
increases you find more dangerous and profitable missions become
available. You can speculate on a fully working stock market (and
even influence its outcome). You can modify peoples academic or
criminal records. You can divert money from bank transfers into
your own accounts. You can even take part in the construction of
the most deadly computer virus ever designed.
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Uplink
http://youtu.be/xmqvoFfVbAo
Existing Games
Uplink
• Availability
– Windows/Linux
• $15 download; $20 Delivery
– iPad
• $4.99
• http://bit.ly/uplinkipad
– Mac
• $10
• http://bit.ly/uplinkmac
– Android (coming)
• Kid Review
Existing Games
CryptoClub
• Type: Website
• History
– Created by University of Illinois & Partners
– cryptoclub.math.uic.edu
– CryptoClub.org
• Objective
– Teach Basic Crypto Concepts
– Test Skills with Games & Challenges
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
CryptoClub
http://www.cryptoclub.org/
Existing Games
CryptoClub
• More Detail
– “The CryptoClub Project develops
classroom and web-based material
to teach cryptography and related
mathematics, as well as material to
support teachers of these topics. The
project is a collaboration between
UIC's Learning Sciences Research
Institute, Department of
Mathematics, Statistics, and
Computer Science, and School of Art
and Design.”
• Kid Review
Other
• Games
– NSA CryptoChallenge (http://bit.ly/nsacryptochallenge)
– VIM Adventures (http://bit.ly/vim-adventures)
• Computers/Programming
– Qimo and Edubuntu (http://bit.ly/learningthecomputer)
– Scratch, Logo (http://bit.ly/learningtoprogram)
• Conferences/Presentations
– HacKid
– Hak4Kidz (http://bit.ly/hak4kidz)
– r00tz (http://bit.ly/defconkids)
– “Teaching Kids Cyber Security” – Reuben Paul
(http://bit.ly/teachingkidscyber)
– “Minecraft Security” by Riese Goerlich
(http://bit.ly/minecraftsecurity)
Other
• Books/Podcasts/Blogs
– InventWithPython.com
• Hacking Secret Ciphers with Python
• Invent Your Own Computer Games with Python
• Making Games with Python and Pygame
– Super Scratch Programming Adventure
– Python for Kids
– “HackerTikes Podcast” - mubix (http://bit.ly/hackertikes)
• Curriculums/Competitions
– CyberPatriot (teams from elementary through high school)
– CyberAces
– Hacker High School (http://bit.ly/hackerhighschool)
– CyberQuest Challenges
– CCDC-like Teams
KidHack Project
• Platform
– Blog Page:
http://bit.ly/kidhac
k
• Categories
– Games
– Computers/Progra
mming
– Conferences/Presen
tations
– Books/Podcasts/Blo
gs
– Curriculums/Compe
titions
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
WHAT’S NEXT
Age-Based Curriculum
Effectiveness Survey
Reviewing New Games
Accepting Comm. Contributions
Have Fun
What’s Next
Age-Based Curriculum
Games Computers/Pr
ogramming
Cons/Presenta
tions
Books/Podcasts/
Blogs
Curriculums/Competi
tions
3-5 • Hackers & Agents
(12+)
• Qimo (3+)
6-8 • Pwn • Edubuntu • HacKid (5+) • Super Scratch
Programming
Adventure (9+)
9-11 • [d0x3d!]
• Uplink
• CryptoClub
• Scratch (8+) • Hak4Kidz (8+) • Python for Kids
(10+)
• CyberPatriot (ES
coming)
12-14 • Control-Alt-Hack
(14+)
• r00tz • Hacking Secret
Ciphers w/ Python
• CyberPatriot Teams
(MS)
15-17 • Hacker High School
• CyberPatriot Teams (HS)
• CyberAces
18-20 • CyberQuest Challenges
• CCDC Teams
What’s Next
Effectiveness Survey
• Demographics (e.g., age, sex, …)
• Prior “Cyber” Experience (e.g., games, school
programs)
• Game Being Surveyed On
– Time Spent Playing
– Ranking 1 – 10 on Various Characteristics
• General: “Funness, ” Play Again?
• Security: Firewalls, Encryption, Malware, …
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
What’s Next
• Finding New Games & Reviewing Them
• …
• Accepting Contributions from Community ;)
– Comments on KidHack Page: http://bit.ly/kidhack
– Contact Us Form: http://bit.ly/nispcontact
• …
• Have Fun!
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Conclusion
• Introduction
• Background
• Existing Games
• KidHack Project
• What’s Next
• Conclusion
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Questions?
• Twitter @grecs
• Website NovaInfosec.com, @novainfosec
• Contact http://bit.ly/nispcontact
o Questions/Consulting

More Related Content

Viewers also liked

Undersink water purifier [호환 모드]
Undersink water purifier [호환 모드]Undersink water purifier [호환 모드]
Undersink water purifier [호환 모드]
J2smartceo
 
Green rich shower
Green rich showerGreen rich shower
Green rich shower
J2smartceo
 

Viewers also liked (9)

презентация компании Via
презентация компании Viaпрезентация компании Via
презентация компании Via
 
UVa Protocol
UVa ProtocolUVa Protocol
UVa Protocol
 
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
 
Rain water harvesting
Rain water harvestingRain water harvesting
Rain water harvesting
 
Undersink water purifier [호환 모드]
Undersink water purifier [호환 모드]Undersink water purifier [호환 모드]
Undersink water purifier [호환 모드]
 
Defending the Enterprise with Evernote at SourceBoston on May 27, 2015
Defending the Enterprise with Evernote at SourceBoston on May 27, 2015Defending the Enterprise with Evernote at SourceBoston on May 27, 2015
Defending the Enterprise with Evernote at SourceBoston on May 27, 2015
 
Green rich shower
Green rich showerGreen rich shower
Green rich shower
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 -  N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...Malware Analysis 101 -  N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
 
Bridges
BridgesBridges
Bridges
 

Similar to Project KidHack – Teaching the Next Next Generation Security through Gaming at BSidesOrlando on April 12, 2015

ethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.ppt
ricagip499
 
Technology in a global society presentation
Technology in a global society presentationTechnology in a global society presentation
Technology in a global society presentation
delmount
 
Ncsam 2019-cybersecurity-awareness-trivia final-508
Ncsam 2019-cybersecurity-awareness-trivia final-508Ncsam 2019-cybersecurity-awareness-trivia final-508
Ncsam 2019-cybersecurity-awareness-trivia final-508
Vishwan Aranha
 

Similar to Project KidHack – Teaching the Next Next Generation Security through Gaming at BSidesOrlando on April 12, 2015 (20)

Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
 
V3 gamingcasestudy
V3 gamingcasestudyV3 gamingcasestudy
V3 gamingcasestudy
 
Cross Game Dev with Corona
Cross Game Dev with CoronaCross Game Dev with Corona
Cross Game Dev with Corona
 
Landscape Of Virtual World Systems
Landscape Of Virtual World SystemsLandscape Of Virtual World Systems
Landscape Of Virtual World Systems
 
Path of Cyber Security
Path of Cyber SecurityPath of Cyber Security
Path of Cyber Security
 
Path of Cyber Security
Path of Cyber SecurityPath of Cyber Security
Path of Cyber Security
 
Career in Ethical Hacking
Career in Ethical Hacking Career in Ethical Hacking
Career in Ethical Hacking
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best Practices
 
ethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.ppt
 
Let’s play the game. Yet another way to perform penetration test. Russian “re...
Let’s play the game. Yet another way to perform penetration test. Russian “re...Let’s play the game. Yet another way to perform penetration test. Russian “re...
Let’s play the game. Yet another way to perform penetration test. Russian “re...
 
Eight Rules for Making Your First Great Game
Eight Rules for Making Your First Great GameEight Rules for Making Your First Great Game
Eight Rules for Making Your First Great Game
 
Technology in a global society presentation
Technology in a global society presentationTechnology in a global society presentation
Technology in a global society presentation
 
DEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsn
DEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsnDEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsn
DEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsn
 
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud XiaoFruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
 
Hack one iot device, break them all!
Hack one iot device, break them all!Hack one iot device, break them all!
Hack one iot device, break them all!
 
Capture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception DefenseCapture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception Defense
 
Ncsam 2019-cybersecurity-awareness-trivia final-508
Ncsam 2019-cybersecurity-awareness-trivia final-508Ncsam 2019-cybersecurity-awareness-trivia final-508
Ncsam 2019-cybersecurity-awareness-trivia final-508
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Hunt for the red DA
Hunt for the red DAHunt for the red DA
Hunt for the red DA
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 

Project KidHack – Teaching the Next Next Generation Security through Gaming at BSidesOrlando on April 12, 2015

  • 1. Project KidHack Teaching the Next Next Generation Security through Gaming @grecs & @pupstrr NovaInfosec.com
  • 2. Disclaimer • Opinions expressed do not express the views or opinions of – my employers, his schools – my customers, – my wife, his mom – my daughter, his sister – my parents, his grandparents – my in-laws, his other grandparents Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 3. Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 4. 20 Yrs Industry 16 Yrs Infosec 5 Yrs SOC
  • 5.
  • 6. NovaInfosec Consulting • General Security Engineering/Architecture • Everything SOC – Engineering – Operations – Training – SOC 2.0 datamation.com/cnews/article.php/3851071/Tech-Comics-Cloud-Computing-Consultants.htm
  • 7.
  • 8. Agenda • Background • Existing Games • KidHack Project • What’s Next? • Conclusion Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 9. Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs, BACKGROUND Why Inspiration
  • 11. Background Why Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 12. Background Why Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 13. Background Why Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 14. Background Why Feds Need 10,000 Cyber Security Experts (6/7/2009) Cybersecurity business, jobs expected to grow through 2016 (10/21/12) Fewer Cyber Pros, More Cyber Problems (9/1/14)
  • 15. Background Why • NSA Tapping Schools of Excellence • University “Cyber” Degrees • Technical Training Organizations Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 16. Background Why Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs, Preparing Next Next Gen of Infosec Pros by Getting Interested Early Recent Trainer Role - Contemplating Best Ways to Teach Focus on Simulation with Gaming Versus Setting Up Real Environment SIMULATION WITH GAMING … NEXT- NEXT GEN TRAINING ROLE
  • 17. Background Inspiration • CTFs (for years) • Bruce Potter – DerbyCon 2013 – It’s Only a Game: Learning Security through Gaming • History of CTF Contests & Other Games Hardcore Security Pros Play • Games that Can Be Used to Engage Non-Security Pros  More Focused on Theory vs Collecting List of Games • http://bit.ly/pottergaming • MrsYIsY – Network Computing – Want To Develop Information Security Skills? Capture The Flag • Simulation of Real-World Security Operations • http://bit.ly/mrsyctf • Ender’s Game – Military Tactics – Simulations/Drills
  • 18. EXISTING GAMES Hacker [d0x3d!] Control-Alt-Hack Hackers & Agents Pwn Uplink CryptoClub Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 19. Existing Games Hacker • Type: Card • History/About – 1990: Secret Service Raided Steve Jackson Games • Confiscated Equipment, including Illuminati BBS. – 1992: Made Game of It • Satirizing Secret Service, Hackers, Phone Companies, etc. – 1993: Hacker II – The Dark Side - more players & new rules – 2001: Hacker – Deluxe Edition – Combined All Above into Box Set • Objective – Players Act as Hackers – Compete Against Each Other to Control Most Systems Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 20. Existing Games Hacker • Hacker uses a variation of the Illuminati system; players lay out cards (representing systems) to create the Net, which is never the same twice. But instead of separate “power structures” for each player, there is only one Net, and players place tokens to indicate what systems they have invaded and how completely they control them. • For 3 to 6 players; takes from 90 minutes to 2 1/2 hours. The supplement, Hacker II, lets you add two more players. • Components include rulebook, 110 cards, 172 marker chips, 6 console units, lots of “system upgrades,” and other markers. Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 21. Existing Games Hacker • Hacker II – Supplement to Hacker (not playable alone) – New Rules: Viruses, the Internet Worm, outdials, multiple accounts, Black Ice, and Military Hardware. – Consoles & Tokens for 2 More Players • Hacker – Deluxe Edition – Can you break into the world’s toughest computer systems? In Hacker, players sail through the Net, competing to invade the most systems. The more systems you crack, the more you learn, and the easier your next target is. You can find back doors and secret phone lines, and even crash the systems your rivals are using. But be careful. There’s a Secret Service Raid waiting for you! – Designed by Steve Jackson, Hacker requires guile and diplomacy. To win, you must trade favors with your fellow hackers – and get more than you give away. But jealous rivals will try to bust you. Three busts and you’re out of the game! Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 22. Existing Games Hacker • Availability – Out of Print – Dealers In Out-Of-Print Games • http://www.sjgames.com/general/outofprint.html • Write-Up – http://bit.ly/hackercardgame • Kid Review
  • 23. Existing Games [d0x3d!] • Type: Card/Board • History/About – Inspired by 2010 Game Forbidden Island – Introduces Attack & Defend Mechanics and Other Basic Computer Security Constructs • Objective – Teaching Non-Techies Computer Security Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 24. Existing Games [d0x3d!] • In [d0x3d!], you and up to three other players take on the role of an 1337 hacker syndicate, infiltrating a network to reclaim valuable digital assets that have been stolen from them. What are these assets? There are four types—financial data, personally identifiable information, authentication credentials, and intellectual property—but what exactly these represents is your little secret. Embarrassing photos? The recipe for the best BBQ in the world? You decide. • As you seek out these valuable digital assets, the network admins respond: patching compromised machines, raising alarms, sometimes changing its very topology to impede your movement. You and your team work together, compromising and looting machines on the network, trying to not alert the network admins of your presence. If the admins feel too threatened by the activity they see on their network, they will take your stolen personal data and release it onto the internet! In other words, you’ll get d0x3d! • You all win together, or you all lose together. Brave the network and protect your data! Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 26. Existing Games [d0x3d!] • Availability – Open-Source & Freely Available • https://github.com/TableTopSecurity/d0x3d-the-game • Download & Print – $25 Boxed Set from TheGameCrafter.com • https://www.thegamecrafter.com/games/-d0x3d- • Write-Up – http://bit.ly/d0x3dgame • Kid Review
  • 27. Existing Games Control-Alt-Hack • Type: Card • History/About – 3-6 Players, 14+, ~ 1 hour – Announced DefCon 2012 – Available Nov 2012 (Amazon) – Designed by Tamara Denning, Tadayoshi Kohno, Adam Shostack • Objective – Teaching Non-Techies Computer Security Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 28. Existing Games Control-Alt-Hack • Based on a game mechanic by gaming powerhouse Steve Jackson Games (Munchkin and GURPS), Control-Alt-Hack™ is a tabletop card game about white hat hacking. • You and your fellow players work for Hackers, Inc.: a small, elite computer security company of ethical (a.k.a. white hat) hackers who perform security audits and provide consultation services. Their motto? “You Pay Us to Hack You.” • Your job is centered around Missions-tasks that require you to apply your hacker skills (and a bit of luck) in order to succeed. Use your Social Engineering and Network Ninja skills to break the Pacific Northwest’s power grid, or apply a bit of Hardware Hacking and Software Wizardry to convert your robotic vacuum cleaner into an interactive pet toy…no two jobs are the same. So pick up the dice, and get hacking! Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 30. Existing Games Control-Alt-Hack • Availability – Amazon.com • Write-Up – http://bit.ly/ctrl-alt-hack • Kid Review http://www.amazon.com/gp/product/B008HIX5KO/ Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 31. Existing Games Hackers & Agents • Type: Card • History/About – Created by Jason Bevis – 2 – 8 Players, 12+, < 30 mins – Similar to Uno • Skip  Encrypted (w/ text you can analyze & decrypt) • Draw Two  Logs • Reverse  Lead • Wild  SQL Injection (with example injection code) • Wild Draw Four  Rootkit • Number Cards (with its binary representation to learn from) • Objective – Teaching Non-Techies Computer Security Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 32. Existing Games Hackers & Agents • The world has been infiltrated with hackers who are out to steal your personal data if they can get their hands on it. The agents are well armed with forensic techniques and sworn to catch these cyberpunks. • Be the first to rid yourself of all the cards in your hand before every other player and obtain as few points as possible. • Each player scores penalty points for cards left in their hand. As soon as one player has reached 300 points the game is over and the person with the lowest score is the winner. Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 33. Existing Games Hackers & Agents Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 34. Existing Games Hackers & Agents • Availability – $15 from TheGameCrafter.com • https://www.thegamecrafter.com/games/hackers-agents – $9 Threat Booster from TheGameCrafter.com • https://www.thegamecrafter.com/games/hackers-agents-threat- deckcon-booster • Write-Up – http://bit.ly/hackersandagents • Kid Review
  • 35. Existing Games Pwn: Combat Hacking • Type: Video • History/About – Released March 2013 – Designed by 82 Apps, Inc. • Objective – Various Node Layouts (e.g., grid) – Take Over All Competitor Nodes Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 36. Existing Games Pwn: Combat Hacking • Engage in fast-paced computer hacking wars against your cyberpunk rivals like you were in a retro- futuristic hacking movie. • PWN is a fast-paced, real-time strategy game where you face off against other hackers within 3D virtual networks and take each other out using wits, skill, and computer viruses. Place devious hidden trojans and backdoors, while strategically defending yourself with encrypted nodes and firewalls. PWN lets you feel like the hero (or villain) of your favorite computer hacking action movies. Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 37. Existing Games Pwn: Combat Hacking http://youtu.be/9D23qABd9gg
  • 38. Existing Games Pwn: Combat Hacking • Availability – IOS • $2.99 • http://bit.ly/pwnios1 – Mac • $4.99 • http://bit.ly/pwnmac1 • Write-Up – http://bit.ly/pwngame • Kid Review
  • 39. Existing Games Uplink • Type: Video • History/About – 2001: Released for Windows & Linux by Introversion Software – 2006: Valve's Steam – 2011: Ubuntu Software Center – 2012: iPad & Android • Objective – Standard One-Off Missions – Storyline with Player Receiving an E-Mail from Deceased Uplink Agent Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 40. Existing Games Uplink • You play an Uplink Agent who makes a living by performing jobs for major corporations. Your tasks involve hacking into rival computer systems, stealing research data, sabotaging other companies, laundering money, erasing evidence, or framing innocent people. • You use the money you earn to upgrade your computer systems, and to buy new software and tools. As your experience level increases you find more dangerous and profitable missions become available. You can speculate on a fully working stock market (and even influence its outcome). You can modify peoples academic or criminal records. You can divert money from bank transfers into your own accounts. You can even take part in the construction of the most deadly computer virus ever designed. Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 42. Existing Games Uplink • Availability – Windows/Linux • $15 download; $20 Delivery – iPad • $4.99 • http://bit.ly/uplinkipad – Mac • $10 • http://bit.ly/uplinkmac – Android (coming) • Kid Review
  • 43. Existing Games CryptoClub • Type: Website • History – Created by University of Illinois & Partners – cryptoclub.math.uic.edu – CryptoClub.org • Objective – Teach Basic Crypto Concepts – Test Skills with Games & Challenges Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 45. Existing Games CryptoClub • More Detail – “The CryptoClub Project develops classroom and web-based material to teach cryptography and related mathematics, as well as material to support teachers of these topics. The project is a collaboration between UIC's Learning Sciences Research Institute, Department of Mathematics, Statistics, and Computer Science, and School of Art and Design.” • Kid Review
  • 46. Other • Games – NSA CryptoChallenge (http://bit.ly/nsacryptochallenge) – VIM Adventures (http://bit.ly/vim-adventures) • Computers/Programming – Qimo and Edubuntu (http://bit.ly/learningthecomputer) – Scratch, Logo (http://bit.ly/learningtoprogram) • Conferences/Presentations – HacKid – Hak4Kidz (http://bit.ly/hak4kidz) – r00tz (http://bit.ly/defconkids) – “Teaching Kids Cyber Security” – Reuben Paul (http://bit.ly/teachingkidscyber) – “Minecraft Security” by Riese Goerlich (http://bit.ly/minecraftsecurity)
  • 47. Other • Books/Podcasts/Blogs – InventWithPython.com • Hacking Secret Ciphers with Python • Invent Your Own Computer Games with Python • Making Games with Python and Pygame – Super Scratch Programming Adventure – Python for Kids – “HackerTikes Podcast” - mubix (http://bit.ly/hackertikes) • Curriculums/Competitions – CyberPatriot (teams from elementary through high school) – CyberAces – Hacker High School (http://bit.ly/hackerhighschool) – CyberQuest Challenges – CCDC-like Teams
  • 48. KidHack Project • Platform – Blog Page: http://bit.ly/kidhac k • Categories – Games – Computers/Progra mming – Conferences/Presen tations – Books/Podcasts/Blo gs – Curriculums/Compe titions Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 49. Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs, WHAT’S NEXT Age-Based Curriculum Effectiveness Survey Reviewing New Games Accepting Comm. Contributions Have Fun
  • 50. What’s Next Age-Based Curriculum Games Computers/Pr ogramming Cons/Presenta tions Books/Podcasts/ Blogs Curriculums/Competi tions 3-5 • Hackers & Agents (12+) • Qimo (3+) 6-8 • Pwn • Edubuntu • HacKid (5+) • Super Scratch Programming Adventure (9+) 9-11 • [d0x3d!] • Uplink • CryptoClub • Scratch (8+) • Hak4Kidz (8+) • Python for Kids (10+) • CyberPatriot (ES coming) 12-14 • Control-Alt-Hack (14+) • r00tz • Hacking Secret Ciphers w/ Python • CyberPatriot Teams (MS) 15-17 • Hacker High School • CyberPatriot Teams (HS) • CyberAces 18-20 • CyberQuest Challenges • CCDC Teams
  • 51. What’s Next Effectiveness Survey • Demographics (e.g., age, sex, …) • Prior “Cyber” Experience (e.g., games, school programs) • Game Being Surveyed On – Time Spent Playing – Ranking 1 – 10 on Various Characteristics • General: “Funness, ” Play Again? • Security: Firewalls, Encryption, Malware, … Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 52. What’s Next • Finding New Games & Reviewing Them • … • Accepting Contributions from Community ;) – Comments on KidHack Page: http://bit.ly/kidhack – Contact Us Form: http://bit.ly/nispcontact • … • Have Fun! Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 53. Conclusion • Introduction • Background • Existing Games • KidHack Project • What’s Next • Conclusion Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 54. Questions? • Twitter @grecs • Website NovaInfosec.com, @novainfosec • Contact http://bit.ly/nispcontact o Questions/Consulting