# A Netrunner's Guide to CyberSci ###### By Robert Babaev --- # whoami <!-- .slide: data-transition="slide" --> ![Robert @ NSEC 2022](https://i.imgur.com/hxStDZ6.jpg =712x533) ---- <!-- .slide: data-transition="slide" --> - Robert Babaev - 3rd year standing CS, Computer and Internet Security - CyberSci Team Canada player (Jul. 2021 - Dec. 2021) - CyberSci Team Canada captain (Jan. 2022? - Jun. 2022) - Penetration Tester @SoftwareSecured (May. 2022 - Aug. 2022) --- # Stories ---- ## ./hatch <!-- .slide: data-transition="zoom" --> ![](https://i.imgur.com/qYcHpoG.png) ---- ## python3 first_pwns.py <!-- .slide: data-transition="zoom" --> - Cybersecurity workshop, basic web hacking - H4TT, first real CTF - First time cracking password-protected file (unsuccessfully) - How precious googling stuff was ---- ## NorthSec <!-- .slide: data-transition="zoom-in slide-out" --> ![](https://i.imgur.com/ccRrGsj.png) ---- ## java NorthSec2020 <!-- .slide: data-transition="slide" --> - First major conference CTF - I was practically useless - Communications were terrible - “Okay that didn't work” *What didn't work*? - Lot of stress from the challenge difficulty - Wasn't really able to keep myself calm ---- ## node NorthSec2021.js <!-- .slide: data-transition="slide" --> - Much better than NSEC 2020 - Had acquired some more skills by this point - Was able to submit at least 2 flags entirely on my own - Got a writeup! - Still had a long way to go ---- ## curl “http://cybersci.nationals.2021” <!-- .slide: data-transition="slide" --> ![](https://i.imgur.com/95XRoaS.png) ---- <!-- .slide: data-transition="fade" --> - “Hey, I need a substitute” - Took the shot - International competitions? - Next to no flags of my own - Supporting info helped score points - Team Rocket came 2nd! ---- ## nmap —location=prague ecsc2021.cz <!-- .slide: data-transition="zoom-in slide-out" --> ![](https://i.imgur.com/Z8GTZxQ.png) ---- <!-- .slide: data-transition="slide" --> - Did not practice much - Severely underestimated difficulty - How hard could it be? - I was coming in as a junior - Result? Canada came 18th out of 19 countries - We beat Malta tho - Upside? - Got to visit Europe, see Prague - Drank some beer - Met some new friends ---- ## sqlmap https://icc2022.eu/leadup?id=1 <!-- .slide: data-transition="zoom-in slide-out" --> ![](https://i.imgur.com/oSCZQkU.png) ---- <!-- .slide: data-transition="slide" --> - Training was more on the forefront - Attended some CTFs in the months before the event - First taste of attack/defense - SaarCTF 2022 - Working on tooling and knowledge base - Writeups - NSEC 2022 - Working as Team Canada - Used some info from a challenge creator’s video to get a flag ---- ## feroxbuster -u https://icc2022.eu/athens <!-- .slide: data-transition="slide" --> ![](https://i.imgur.com/CXWN9Ny.jpg) ---- <!-- .slide: data-transition="slide" --> - First ICC ever - Got to meet the VP of EU Commission - Got to meet players from around the world - 15 players - Big challenge was team comms - Jeopardy and Attack/Defense - Came 5th out of 7 teams - Realized CTFs weren’t for me --- # Takeaways ---- ## Struggling - You WILL struggle at some point - New field - New knowledge - New skills - Programming only gets you so far ---- ## Persistence - Persistence is key - Progression from NSEC 2020 to NSEC 2022 - The solution to a challenge could be one command away - Short term and long term persistence ---- ## Humility - Never underestimate the difficulty of a CTF - If someone can complete every single challenge of a CTF, it was too easy - CTFs are meant to be difficult for the level that they’re in - Never assume you can do a CTF solo - These are team games ---- ## Recon - If you know who made a challenge… - Stalk them (OSINT) - Watch their videos - Read their tweets - Disclaimer: Don’t like actually stalk them and go try to visit them IRL ---- ## Teamwork - COMMUNICATE! - Attack/defense in particular, but Jeopardy too! - If you have something interesting, LET YOUR TEAM KNOW! - Communication goes beyond game day - Coordinate training - Coordinate teambuilding - Work on learning and making tools --- # Other Tips ---- ## Fundamentals - Lock down your fundamentals - If you don’t know those at higher levels, you’re gonna have a rough time - Regionals it’s okay, everyone’s learning - Nationals and beyond, get that stuff *down* ---- ## Googling - Search engines are your friend that will do literally anything and everything for you - Use them - Use them well - Google Dorking - Known recon method - Boolean search ---- ## Pressing Buttons - Just try things - If you think something is impossible - try it anyway - If you think something is possible - probably is - If you’re stuck with no other options, the time cost is probably worth it ---- ## Stepping Back - All else fails? - Take a walk - Clear your head - Think about literally anything but the challenge - Psychology - Brain can “background” thoughts - Ever solved a problem in the shower? ---- ## Writeups - Read writeups - Every good hacker makes and reads writeups - Figure out how they did a challenge - Try it yourself if you can! - Another advantage - Making writeups grants visibility - Put writeup links on your personal website ---- ## Learning - Labs - Home lab with VMs and Raspberry Pis - HacktheBox, HTB Academy, TryHackMe - Learn by Playing - The only real way to get better at CTFs is playing CTFs --- # Ask some questions!
{"metaMigratedAt":"2023-06-17T12:06:32.441Z","metaMigratedFrom":"YAML","title":"A Netrunner's Guide to CyberSci","breaks":true,"contributors":"[{\"id\":\"8ac638c0-de59-497e-8f2d-e99390f9d70f\",\"add\":6917,\"del\":1147}]"}
    268 views