HITB⁺ CyberBattle of the Emirates
All students will be required to undergo a technical assessment before being selected for the final training program.
A list of essential reading materials to help you prepare can be found at the bottom of this page.
The boot camp gives knowledge level to get started in to capture the flag (CTF) challenges for High Schools and what it could mean to defend the system against attackers or be in offensive side and carry on different kind of attacks via different attack vectors and attack scenarios. During the boot camp participants will learn different areas in cyber security and face hands-on exercises while participating in this bootcamp. Complete course will include 12 capture the flag challenges as pre warm up and final CTF challenge facing other teams.
In this course, the attendees can learn cyber security basics, different programming and scripting language aspects, networking, server configuration and hardening, target scaning and enumeration and vulnerability discovery:
Time planning
The Days will be divided into 4 sessions, small breaks and a lunch as following:
08:15 – 09:00 – Morning gathering and coffee
09:00 – 10:30 – Session 1
10:30 – 10:45 – Small break / coffe and snacks
10:45 – 12:15 – Session 2
12:15 – 13:15 – Lunch break
13:15 – 14:45 – Session 3
14:45 – 15:00 – Small break / coffee and snacks
15:00 – 16:00 – Session 4
· Overall idea and concept of cyber security
o Threats in cyber space
o Defensive cyber security basics
o Offensive cyber security basics
· Legal aspects of Cyber
· Network topology
o IP address segmentation
o Network traffic analysis
o Network attack vectors
· “ME” in Cyberspace
o Why there is a need for cyber security professionals
o Cyber security in military organizations
o OSINT
· Virtualization overview
o Benefits of virtualization – Common software solutions and configurations
o Virtual Machine Setup
· Intro to programming technologies
o Reversing and debugging web applications
o Vulnerability discovery
o Web based backdoors
· Understand how information is stored and accessed via local network
o Understand storage concept
o Permission importance and access control rules
· Encryption methods
o Ransomware examples – when Hackers encrypt
· Web server setup
o Web server hardening
o Web server vulnerabilities
o Attacking web servers (reconnaissance, scanning, exploitation)
· Breach compilation of recent cyber attacks
o Examples how companies get compromised
o Bad Operational Security
o How to “Stay under the Radar”
· Hackers Toolbox
o Use of different tools in offensive operations
· Capture The Flag (CTF) Challenges
o 12 practical warm-up CTF Challenges
The boot camp gives an overview of how penetration testers and hackers think, practical work to develop participants’ imagination and what it could mean to defend against attackers. During the boot camp participants will face hands-on problems to solve using the previously introduced tools and knowledge.
In this course, the attendees can observe how pen testers and hackers work in a closed-environment:
Time planning
The Days will be divided into 4 sessions, small breaks and a lunch as following:
08:15 – 09:00 – Morning gathering and coffee
09:00 – 10:30 – Session 1
10:30 – 10:45 – Small break / coffe and snacks
10:45 – 12:15 – Session 2
12:15 – 13:15 – Lunch break
13:15 – 14:45 – Session 3
14:45 – 15:00 – Small break / coffee and snacks
15:00 – 16:00 – Session 4
· Session 1 – Intro & Description of Lab Environment
· Session 2 – Reconnaissance
· Session 3 – Scanning and Enumeration
o Network scanning: host discovery, port scanning, version detection, scanning in IPv6 networks
o DNS and SNMP enumeration
· Session 4 – Credential Attacks
o Methods for storing the passwords
o Pass-the-hash
· Session 1 – Attacks and Defence of Network Infrastructure
o Mac flooding, ARP attacks, VLAN hopping, man-in-the-middle attacks in IPv6 networks
o Port security, private VLANs, DHCP snooping and dynamic ARP inspection, 802.1x
· Session 2 – Various Branded Vulnerabilities
o Kernel exploiting – Dirty COW,
o CGI-based web server exploiting – Shellshock,
o OpenSSL exploiting – Heartbleed
· Session 3 – DNS
o DNS protocol overview
o DNS attacks: tunnelling, rebinding, snooping, cache poisonining
· Session 4 – Memory Exploitation
o Binary patching
o Buffer overflow privilege escalation
The laptops must have the following software installed:
You should have full administrative privileges and access to the laptop.
Don’t have a laptop with the right specifications? Email us.
This list of reading materials will help you prepare for the per-assessment technical test and also give you insights into the areas you’ll need to understand to get the most of out of this training session.
Click the tabs above to show the list of reading materials
Networking basics
Basic networking essentials
OSI model & OSI model vulnerabilities
Students must know the layer structure and common risks
Virtualization (VirtualBox examples)
Students should be able to deploy virtual machine
Operating systems (CMD & Terminal basic commands)
Commands is a must
Vulnerabilities
Common vulnerabilities in web applications
CTF related information
Ideas, writeups and hands on practice tasks before bootcamp
Networking
More on networking like how to pivot and IPv6 related information
Exploit development
Exploit development basics and Metasploit exploit development examples
Networking
OSI model & OSI model vulnerabilities
Operating systems
Web
Vulnerabilities
CTF related information
Networking
Exploit development
Reverse engineering
Containers
Web
Cryptography
CTF related & Hands on
Egils Malbergs is a Senior Cyber Security Engineer at CybExer Technologies. He is working with customers across industries to identify and report security flaws from computer systems, networks and infrastructure. Malbergs has extensive experience with institutions from government, defense, financial, critical infrastructure, education and other industries from Eurasia and Gulf region. He has carried out numerous technical exercises and trainings, performed penetration tests, red teaming and other defensive and offensive operations. Malbergs previous career encompasses deep knowledge from security engineering, systems administration, full stack development and also teaching and training.
Rain Nõmmsalu is a Cyber Security Specialist at CybExer Technologies. He designs and executes offensive operations for penetration testing and also develops red teaming and penetration testing automation solutions. Nõmmsalu has worked with institutions from government, defence, financial, critical infrastructure, education and other industries from Eurasia and Gulf region. He has also strong experience with maintaining and developing computer networks, firewalls, intrusion prevention system and other security tools. He has previously worked with government agency in cyber security incident response capacity. Nõmmsalu has studied Information Technology at Helsinki Metropolia University of Applied Sciences and holds Cisco CCNA Cyber Ops certificate.