Ce.Se.N.A. Security
Ce.Se.N.A. (CeSeNA Security Network and Applications) is an Italian Cyber-Security and Hacking team
It’s mainly composed by undergraduate students attending degree of Ingegneria e Scienze Informatiche course
Team
Our aim is to study, understand and deepen Software Security, both in Network and Application side:
- Web Security
- Systems & Network Security
- Secure Coding
- Binary Reversing and Exploitation
- Forensics Tecniques
- Social Engineering
- Cryptography
Main Topics
- Software configurations
- GNU/Linux setups, a.k.a. UNIX porn
- Lockpicking
- Eating Pizza
- ...
Off-Topics
Main Activities
Main Activities
- Weekly Meetings
- Operations
- Competitions (CTF, Wargames, ...)
Weekly Meetings
- We usually meet every week
- Sharing knowledge, challenges, and experiences
- Horizontal Growth
Operations
- Multiple sub-groups
- Separate evening meetings
- Every group goes in-deep in one specific topic
- Vertical Growth
Current Operations
- OpARM
- OpPataviumart
- OpWaldo
- OpFSOR
- OpSkynet
OpARM
Operation with the intent of studying themes like Reverse Engineering and Exploitation on ARM architectures
OpPataviumart
Group which role is to analyze and extend Advanced Web Attacks, using Advanced Web Exploitation techniques
Thus the subject of study are the advanced aspects of typical web attacks, usually studied by CeSeNA during its (horizontal) weekly meeting, but examined on a more detailed level
OpWaldo
Group focusing on Digital Forensics, particularly concentrating on every theme related to Memory Forensics in Windows environment
OpFSOR
A group that was born with the purpose of studying some aspects, specific of Red Teams Operations and Penetration Testing
OpSkynet
Group studying Artificial Intelligence in Cyber Security context
The objective is to make use of search algorithms, classification algorithms, etc.. applied to Cyber Security
This Operation has a dual purpose:
- It can be useful during CTF
- It can provide a great support to OpFSOR
Competitions
They let us improve a lot and exchange, interact and discuss with other brilliant people from all over the world
CTF
Capture the Flag (CTF) is a special kind of information security competition
CTF
There are two common types of CTF:
- Jeopardy
- Attack-Defence
CTF: Jeopardy
Jeopardy-style CTF is made of a collection of challenges:
- Every challenge has a category (for example: Web, Forensic, Crypto, Binary, ...)
- Teams can gain points for every solved task (usually more points for more complicated challenges)
- When the game time is over, the sum of points shows you a CTF winner
- Famous examples include: RuCTFe, Defcon CTF quals, ...
CTF: Attack-Defense
Attack-Defense is another kind of competitions, where:
- Every team has his own host/network with vulnerable services
- Your team has time for patching your services and developing exploits
- Organizers connect participants of the competition and the CTF starts!
- You should:
- Protect your own services for Defense Points
- Hack opponents for Attack Points
Our Point of View
Our Point of View
We like the Hackish culture:
- We don't care if a software or system just works, we aren't satisfied until we deeply understand how it works, in low-level details
- We are open to share our knowledge and to increase it with yours
The Jargon File
Current definition of a Hacker in the Jargon File:
- A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary
- A person who delights in having an intimate understanding of the internal workings of a system
- One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming
The Jargon File
- A person capable of appreciating hacking value
- A person who is good at programming quickly
- An expert at a particular program, or one who frequently does work using it or on it
- An expert or enthusiast of any kind: one might be an astronomy hacker, for example
- One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations
h4x0r vs suxx0r
-
haxor (= hacker)
-
suxx0r (= who sucks): it's typically attributed to script-kiddies
Which Hat?
Black Hat
Black-hat hackers violate computer security for personal gain, such as:
- Stealing credit card numbers
- Harvesting personal data for sale to identity thieves
- Perform DDOS attacks
- Install ransomware on victims
- ...
Black Hat
A black-hat hacker who finds a new, zero-day security vulnerability would sell it to criminal organizations on the black market or use it to compromise computer systems
White Hat
- White Hat hackers are the opposite of Black Hat hackers
- They are the Ethical Hackers, experts in compromising computer security systems who use their abilities for good, ethical, and legal purposes
- Examples include MalwareMustDie group
Grey Hat
-
A Gray Hat hacker may sometimes violate laws or typical ethical standards, but does not have the malicious intent, typical of a Black Hat hacker
-
When they discover a vulnerability, instead of telling the vendor how the exploit works, he or she may offer to repair it for a small fee
No Hat
-
Their goal is to learn hacking techniques just for
increase the personal knowledge and for having fun! -
They don't care about the hat you are wearing
-
IO SmashTheStack topic: take off your hats and lets corrupt some memor-y-ies
How to start?
Getting Started
- Getting started with Cyber-Security is hard as fuck!
- It requires deep knowledge in almost every feel of IT
Getting Started
You need to change your way of thinking:
- Stop thinking like an Engineer
- Start thinking like a Hacker
- Stop using stuff
- Start breaking stuff
- Stop asking yourself how to use it
- Start asking yourself how it works
Contacts
If you are curious about what we are doing, feel free to contact us at cesena.team@gmail.com
We usually meet every week, sharing write-ups, knowledge, challenges and interesting experiences..
https://cesena.ing2.unibo.it
How to Join
If you like our activities and you want to contribute come aboard!
You can join CeSeNA whenever you want!
CeSeNA Introduction
By Alessandro Molari
CeSeNA Introduction
CeSeNA Introduction
- 1,277