Introduction
to InfoSec
Because all it takes is green text on a black background
What is InfoSec?

What InfoSec is NOT
InfoSec as a Career
$$$
Bug Bounties


Security Research



Why do security vulnerabilities exist?

But how do hackers work?

So what does InfoSecIITR do?
CTFs!

Organizing CTFs on Backdoor along with SDSLabs

Meetup every week to solve challenges together, and have discussions on everything related to security
We love Slack <3
Show up regularly for meetings, and you'll be added in :)
Win Contests!
Deloitte CCTC


Microsoft BTS Quals
Rank 1, 5, 8 in India

Microsoft BTS
(Finals)
Winners and First Runners Up


2nd, 13th, 14th rank in India (qualified for the finals to be held in November)

And many others....
CTF! WTF?
Categories
Crypto

- Ancient Crypto: ROT13, Cesar Cipher, Vignere Cipher etc.
- Modern Crypto: AES, DES, RSA etc.
Reverse Engineering

Web
- XSS
- SQLi
- Directory Traversal
- File include
- Code Injection
- ...
Forensics
- Analyzing Network Captures(Wireshark etc.)
- Steganography: concealing a file, message, image, or video within another file, message, image, or video.
- "Undeleting" files
- ...
Binary Exploitation

Text
- Buffer overflows
- Return-oriented programming
- Format String vulnerability
- ...
Types

Jeopardy

Attack-Defence
Jeopardy


Attack Defence

Wargames
(Always online CTFs)
- backdoor.sdslabs.co
- picoctf.com
- pwnable.kr
- overthewire.org/wargames/
- io.netgarage
- gracker.org
- ...and many more
And
Now
This...
Demo time
Questions?
Meeting+Workshop at 8:30pm today
Bring your laptops along :)
deck
By jaybosamiya
deck
- 345