Introduction
 to InfoSec

Because all it takes is green text on a black background

What is InfoSec?

What InfoSec is NOT

InfoSec as a Career

$$$

Bug Bounties

Security Research

Why do security vulnerabilities exist?

But how do hackers work?

So what does InfoSecIITR do?

CTFs!

Organizing CTFs on Backdoor along with SDSLabs

Meetup every week to solve challenges together, and have discussions on everything related to security

We love Slack <3

Show up regularly for meetings, and you'll be added in :)

Win Contests!

Deloitte CCTC

Microsoft BTS Quals

Rank 1, 5, 8 in India

Microsoft BTS

(Finals)

Winners and First Runners Up

 

2nd, 13th, 14th rank in India (qualified for the finals to be held in November)

And many others....

CTF! WTF?

Categories

Crypto

  • Ancient Crypto: ROT13, Cesar Cipher, Vignere Cipher etc.

 

 

  • Modern Crypto: AES, DES, RSA etc.

Reverse Engineering

Web

  • XSS
  • SQLi
  • Directory Traversal
  • File include
  • Code Injection
  • ...

Forensics

  • Analyzing Network Captures(Wireshark etc.)
  • Steganography: concealing a file, message, image, or video within another file, message, image, or video.
  • "Undeleting" files
  • ...

Binary Exploitation

Text

  • Buffer overflows
  • Return-oriented programming
  • Format String vulnerability
  • ...

Types

Jeopardy

Attack-Defence

Jeopardy

Attack Defence

Wargames

(Always online CTFs)

  • backdoor.sdslabs.co
  • picoctf.com
  • pwnable.kr
  • overthewire.org/wargames/
  • io.netgarage
  • gracker.org
  • ...and many more

And

Now

This...

Demo time

Questions?

Meeting+Workshop at 8:30pm today

Bring your laptops along :)

deck

By jaybosamiya

deck

  • 284