Hack Challenge Redo (part3)

We had a small break with our hacking challenges Redo. The format of the Meetup required a change, to accommodate for less experienced visitors. And as much as I love the SANS Institute Challenges, they tend to be quite a puzzle, especially later one. So for now, we are going to focus on couple other Hacking Challenges that are available online. And hopefully in December, when new 2022 SANS Hack Challenge starts, we will have a group ready to battle it together 🙂

Let’s start from Over the Wire. There are plenty games there, we will start with the Bandit, as most suitable to get used to the platform. Bandit offers 33 levels to play, it teaches Linux commands and tools. In each level your goal is identical, find a password to the next level, but let’s start from the beginning.

Over the Wire artwork

To play Bandit you will need to establish SSH connection to the Over the Wire lab server, all details of connection are given in Level 0.

So, what is SSH?

Secure Shell, sometimes referred to as Secure Socket Shell, is a protocol which allows you to connect securely to a remote computer or a server by using a text-based interface. When a secure SSH connection is established, a shell session will be started, and you will be able to manipulate the server by typing commands within the client on your local computer. System and network administrators use this protocol the most, as well as anyone who needs to manage a computer remotely in a highly secure manner.

How to use SSH on Windows?

Most common ways of using SSH on Windows is by using one of the clients. Most popular clients are: PuTTY, BitwiseSSH and OpenSSH. Windows 10 users have now the option to use build-in OpenSSH client. Just follow the installation details of your choose client.

How to use SSH on Mac?

Mac’s have build-in Terminal feature, that provides SSH client.

How do we do it on Linux?

That shouldn’t be a problem for any regular Linux users, but in case you are just starting with Linux. Go to your terminal and type:

ssh

This should list all ssh details and commands. If that’s not the case, just use the following command to install OpenSSH:

sudo apt-get install openssh-client

Full list of common SSH flags can be found here.

This should get everyone started and ready for this week challenge 🙂

One more thing, you may need to use Vim and couple Linux commands.

See you @ 5-7pm today @ our dedicated Discord channel.

Announcing Cyber Night

TOG is holding a Cyber Security evening starting 23rd August 2017 and every 2 weeks thereafter. This is an open night for people to work on projects, or study, cybersecurity / information security topics. You should have some understanding of the topic and must bring your own laptop to take part. The event is a shared study session, not a class.
Some ‘cyber’ resources are available – we have a dedicated pen test box for you to hone your skills against including Bricks, Security Shepherd and more.
We will do our best to point attendees in the right direction, but it will be expected that people will be comfortable with finding out information on their own – either with the books on hand, or search engine.
The event starts at 7pm and ends at 10pm. Note the space will be members only before 7pm.

CryptoParty – Thursday 11th June @ 7pm

CryptoParty Logo

TOG is very pleased to announce that we will be holding the 4th Dublin CryptoParty. Doors will be open from 7pm on Thursday the 11th June 2015, and we will stay open as long as people are happy to stay ( within reason ).

CryptoParty attendees request you to respect their privacy and refrain from taking pictures or video unless participants express otherwise. Ask before snapping.

The idea of a CryptoParty is to make everyone more aware of their own on-line privacy and security in this vast inter-connected world that we live in.

We haven’t had one in a while, so we will discuss basics to bring everyone up to speed. Topics can include any of the following:

  • Tor
  • Tails
  • PGP/GnuPG
  • Text Secure / Signal
  • OTR

CryptoParty have a mailing list if you are so inclined. Its an open event, so no need to sign up.

See you on the 11th

Wireless Hacking Workshop – Saturday 27th June 2015 @ 12:30pm

IT Security<<SOLD OUT>> Contact me below to express interest in next one. If can run another during the summer if I get interest.

On Saturday 27th June at 12:30pm our very own jester`, Martin Mitchell or @jayester depending on the circles you run in, will be teaching a Wireless Hacking Workshop.

Wireless networks are everywhere. They have been available to many of us for well over 10 years, and it is something most of us rely on daily. Majority of us have a wireless network in our house, and connect to it regularly with our laptop, phone, games console, media player and now even televisions.

In this practical, hands on workshop I will be stepping you through the different wireless network security modes of 802.11 (WiFi), and demonstrating practical attacks against them. This workshop is not intended to teach you to perform malicious tasks on wireless networks, but it is to show you how easy it is, and how dangerous someone can be knowing even the most basic a few commands. This knowledge can also be used to audit wireless networks. This workshop will to make you more aware of the dangers of using a wireless networks with bad or no security enabled. Continue reading “Wireless Hacking Workshop – Saturday 27th June 2015 @ 12:30pm”