00:00The next talk is a hands-on, if I understood correctly, about a capture the flag.
00:24Hubert gave his first lecture 20 years ago and started programming when he was still in elementary school.
00:38Back then I was still using a C64 with Basic, but then when I got a bit older I switched to this security area.
00:46And what excites him about his job, and his hobby too, is bringing the spark from technology to people.
00:58Software doesn't flash pretty, but it is very relevant to all of our security.
01:03Thank you very much. Enjoy the talk.
01:06Thank you very much.
01:07Yes, a wonderful good day from me.
01:16Technology works?
01:18Stand a little further back and it'll work.
01:21Okay, all right.
01:23Okay. Hello, my name is Hubert Feider. I'd like to talk about Capture the Flag today.
01:29We were having some technical issues. That's why I only see a black monitor here.
01:35I have no eyes in the back of my head.
01:36So don't mind if I take a bit of a leaf out of my slides.
01:41And maybe, who am I?
01:46If the film allows it.
01:48Yes, wonderful.
01:49Introduction just said it.
01:52I believe I gave the first lecture here at the congress 20 years ago.
01:57I read the GPL to people back then.
02:00This topic is more relevant today than ever if you want to use open, open source software.
02:08Back then, I also did a lot of work in the area of NetBSD operating systems, package source code.
02:13Today, Linux is set as the open source operating system, but there are alternatives.
02:21Then I moved more into the security sector professionally.
02:25And at the same time, in my private life, I go out into the fresh air to geocach.
02:31There was also an exciting lecture at the Easter Egg.
02:33And yes, it's not that different.
02:37You both sometimes have problems that you don't understand, but then you want to solve them with analysis.
02:42And that is exactly the direction we will go in today.
02:47That's my background.
02:50I have been working with IT security and information security for many years.
02:55In recent years, there has been an increasing focus on products that are ultimately used in the area of critical infrastructure.
03:04And then, of course, it's also about what the weak points are that we might be heading towards here.
03:10If you want to contact me, the information and the slides themselves are available, feel free to use them.
03:17I will not read every word.
03:19It's important to me to make the cut sooner.
03:21Before we get started, maybe I could ask the question: who has ever played a CTF before, so I can get a feel for it.
03:31Well, yes, quite a few.
03:34Good.
03:34My idea was to show here that for a year now I have sat down once a week with a few interesting colleagues and said, now we're going to stick to it in a structured way.
03:45Let's tackle capture the flag and tackle technical challenges.
03:50And then I realized, yes, it is actually a broad topic, A, broad, B, deep, and many people are dealing with it.
03:58But I haven't seen much presence at the congress in recent years and that was the motivation to do the talk here, to say, what is CTF?
04:08And thank you to all those who didn't raise their hands.
04:12You are my primary target audience, but perhaps those who have responded can also gain a little more.
04:20It's a beginner's talk.
04:22It should motivate you to get started, to show that yes, there is an exciting path here.
04:29I would like to start with a bit of theory, an introduction: what is security anyway?
04:34Everyone talks about it, but what is it?
04:38Let's get to the topic briefly: yes, if I have security, I have to defend myself.
04:42This is not only evident in the use of force, but also in the details.
04:47However, we do not want to practice the defense case here, but rather the digital attack case.
04:53How do I approach the vulnerability analysis in a structured way in order to tackle a CTF whose challenges I don't even know at the beginning?
05:05Yes, where do I start?
05:06I'll show you two platforms where I think it's a good place to start.
05:13I'll also talk a little bit about the different types, what different game types there are, what tools are available, and where does it all go?
05:22If you say, yes, exciting topic, but it is perhaps no longer just for the quiet room on a Sunday afternoon, the topic of career could also be an option here.
05:34So, the term itself may perhaps come from the children's game where two or more camps try to steal each other's symbol for their headquarters.
05:51A, defend B, attack at the same time.
05:55For us, it's rather exciting; we want to do the whole thing digitally.
05:59So, we can do it at the keyboard, we don't have to go out into the fresh air.
06:03But there are also some very exciting CTFs that are hybrid.
06:07Anyone who was at the Easterhack in Regensburg this year will have experienced a great CTF, where you had to get some fresh air, but also work on the equipment.
06:17Well, that can happen too.
06:19Many of these CTFs in this area are purely keyboard-based.
06:24For many years, graphics have not been particularly important to me, but rather have been a little deeper in my stomach.
06:33I see a lot of people in their professional lives saying, yes, cyber security, an exciting topic, there's money in it, we want to get into it.
06:41It's just like you all used to say, we want to make computers because there's money in them.
06:46But just wanting it is not enough.
06:48And especially when you get into the very technical topic of how cyber security helps, so that you have the basics.
06:54In the security area, in the operating system area, in the network area.
06:59And you will inevitably learn these things along the way, not incidentally, but as an aid in a CTF if you want to be successful.
07:10There are also always new topics that you didn't even know existed last week.
07:15But that's one of the excitements, keeping your tools sharp and sticking with it.
07:21So the picture is relatively important to me here.
07:25The basics are also important.
07:26Maybe a little more theory, security is an abstract concept.
07:35What is at the core is something that is of value to me personally.
07:39This can have monetary value, emotional value, whatever.
07:42And if I live beautifully in a pristine meadow, that is beautiful.
07:47But most of the time there's some bad attacker who says, I want to steal this value somehow, duplicate it, publish personal data, something like that.
07:57And what do I do about it?
07:59Of course, I have some kind of protective measure.
08:02There's a door here. If I close my house, he can't get in.
08:04Yes, doors, now we have already talked, there is more in the physical realm.
08:10And when I talk about the topic of protection, you ultimately have to look at it in two dimensions.
08:19One is in width.
08:22Not only do I have the technology, but I also have to lock my house, seal off my server room, and maybe even put up a fence around it.
08:29I have to do the access control, which as such, the more the environment is, the more exciting it is.
08:37And in the end, I always say, the chain is the weakest.
08:41But you have to look at all the chains again if you have something to protect and defend.
08:46Conversely, the attacker only has to get in at one point.
08:51That makes it a little easier for him; he'll just look for the weakest link.
08:56So the width is not unimportant, I'll come back to that in a moment.
09:00The second is the topic in depth.
09:03I can combine one or more protection mechanisms or even several strong protection mechanisms.
09:09Here is the open door, which doesn't really have an effect, or the closed steel door, which has a very good effect.
09:15There are gradations in between that can also be controlled.
09:20At the end of the day, to have good security, you have to combine both and everything.
09:29That's kind of the basic idea I'd like to share with you to cover the stairs a bit here.
09:37Yes, now I said defense.
09:43There are many topics.
09:45I just wrote down a few passwords.
09:49I won't read them all to you.
09:50Especially in the area of important technical facilities, critical infrastructure, and government-owned corporate assets, there is a lot to protect where you do not want confidentiality or integrity to be violated.
10:07In other words, someone copied or changed something.
10:09The legislature has also noticed this.
10:12And at the EU level, there are now various laws that attempt to change this.
10:16Some of them are still at the beginning.
10:19But this is a path that has been started.
10:21This will also be reinforced in the coming days with NIST II, with the Cyber Resilience Act.
10:27We all know this in the area of data protection.
10:29There are also many best practices, norms, standards, A-National, B-International, which we are here.
10:37At the end of the day, they all consist of many individual measures that have to be taken.
10:44Yes, great.
10:46But that's kind of boring.
10:48This has nothing to do with technology.
10:51In this position you have to work with people.
10:53But that’s part of it too.
10:54It doesn't help if my computer is secure and the thousands of other people in the company aren't.
10:58So you have to think about how to get it into everyone's heads.
11:01Security awareness, organizational issues.
11:04We don’t want to look at all of that here.
11:09The other topic of defense here.
11:12There are also some relatively exciting approaches in the area of telemetry and telemetry analysis.
11:19Which log files do I have in the company and what can I read from them?
11:24I can do an evaluation, analysis.
11:26What is normal behavior?
11:28What are anomalies and why is it abnormal?
11:30Is this just the employee who is on a business trip to Hamburg for a conference?
11:35Or is it an evil attacker?
11:39A few keywords about this.
11:40So the topic of cyber threat intelligence, threat intelligence.
11:43What threat is there?
11:44How is the attack carried out?
11:46Can I find them in my company or in the government agency, whatever?
11:50Or in my hackerspace?
11:51What are the signs of compromise?
11:55So the so-called Indicators of Compromise.
11:57If I know what possible attacks there are, I can see if I have them in my area.
12:01Can I do threat hunting?
12:04And if I found something, oops, there really are some signs,
12:07then I have to do a security incident response.
12:11And then, of course, clean it up, see what happened, so that the next one doesn't come back in.
12:16This is usually found in a so-called Security Operation Center,
12:21which evaluates the telemetry, but please pays attention to data protection.
12:25And that is a big issue that is now being ignored.
12:31Now we want to go to the other side.
12:35Let's look at this from the other side.
12:39We don't want to hack.
12:40We do not want to actively attack any personal, sensitive data here.
12:47We want to do something a little different, but in a more artificial scenario.
12:52Our attacker on the top right is wearing a white hat.
12:55It's also important to me to emphasize that we only do legal things here.
13:01I don’t want to get into the waters that we, especially at the Chaos Computer Club, there are always rumors,
13:08that we are doing something illegal.
13:09We don't do anything illegal.
13:11Why are we doing this?
13:12Finding and exploiting vulnerabilities, so it's more about technical depth.
13:18Yes, the word technology is in there too.
13:20You have to get to grips with the machine and be able to climb the stairs a bit.
13:25Why are we doing all this?
13:28A, to look in my own environment, do I have the possible attack, do I recognize it, in order to take a defensive measure
13:35or of course, in the next step, to generally weed my infrastructure in order to block attacks in general.
13:43And I've been working quite a bit on product safety in recent years.
13:49Of course, when I sell products to my customers, who may then use them in some environment that is important to them,
13:56keyword critical infrastructure, use it in such a way that the products are also safe and clean
14:02and could not lead to negative evaluations in any way.
14:09So product safety is my personal hook here, which maybe one or the other can take with them,
14:16But also, it could be IT in an administration, in a hospital, there too the topic is, I think, very well presented.
14:23How do I approach this whole thing?
14:28Here is a dissertation linked, mine, I have dealt with teaching and learning theories for a long time,
14:36back then in terms of, how do I learn someone, proper system administration, what is that anyway, how does it work,
14:44How can I learn this very complex area?
14:48People learn quickly and easily by heart; if I have a vocabulary list, I can learn by heart.
14:59I won't learn system administration and security by heart.
15:02Maybe also certain techniques and topics that I can do according to the textbook,
15:07but the more complex the scenarios are, the more I need a learning model,
15:11where I build my own understanding of the world, construct
15:17and then in the form of a constructivist learning process I also gain my understanding for myself.
15:23That's why the topic is so difficult.
15:25You can’t just download it like Matrix, know that,
15:29but you have to work on it over many years or over a long period of time and with practice, with practice.
15:35And that’s exactly where we’re starting now.
15:37How do I practice this?
15:38There is a keyword Cyber Range or just comparable Capture the Flag
15:44as a digital training environment in which we can simulate such an attack,
15:50which was provided, where we also know that there are vulnerabilities.
15:54Sometimes you know roughly what the attack vector is,
15:58Sometimes you don’t know, but you are only told,
16:01Here is an IP number, have fun with it.
16:03And then you have to think about how to start, what methods do I know,
16:08what is good, what is perhaps not good.
16:10You have to think, learn, read, watch videos, how you could approach it.
16:17And that's exactly where I'm living with you now.
16:19So, oops, CTF, where do I start?
16:25I have brought along two internet platforms that I personally think are good for getting started.
16:31One is TryHackMe.
16:33I have a screenshot here on the left.
16:36They not only cover this hacker scenario,
16:39They also cover a lot of the basics.
16:41The graphic on the right shows it a bit, there is a structured text,
16:44I can read a lot there, but I also get questions about understanding.
16:48Also get a prepared virtual machine,
16:50I can start and see, okay, now I have my environment.
16:53I can configure it, I can do it in Wireshark,
16:57Try any pentesting tool, prepared to do a log file analysis.
17:02TryHackMe is very nice,
17:05but then also start virtual machines prepared in the CTFs area.
17:12I can extend the current fixed time
17:14and then try my luck to see how it works.
17:19What does it look like up close?
17:21I think I included a few screenshots.
17:23Yes.
17:25One of the CTFs here that we simply stand out with the name,
17:29is the Stux CTF from TryHackMe.
17:31On the left is the task, IP number and read two files from the system.
17:39Of course you have to go in and say,
17:41Okay, the one on the right is also nice, what environment do I use for that?
17:46TryHackMe comes with a virtualized attack box.
17:49I don't have to install anything first.
17:51I can do all this in the web browser.
17:53So the right part is also possible in a web browser.
17:56But you can still use your own box via OpenVPN.
17:59So rather this one than that one.
18:02And then just list his analysis activities here.
18:06There are often instructions that can be found on the Internet.
18:09How do I do that?
18:10That’s where the learning effect comes in.
18:11So much for TryHackMe.
18:19Good start.
18:21The other thing I'd really like to show is Over the Wire.
18:24So-called war games.
18:26In effect, a defined scenario.
18:28Or rather, as you can see here on the left, a whole bunch of scenarios.
18:33I tried to sort the white box a bit thematically.
18:36So people who aren't that familiar with Unix or Linux can start with Bandit.
18:44If you want to explore web programming in depth, including SQL and blind SQL injections, you'll find what you're looking for at Natas.
18:51Otherwise binary reverse engineering, binary exploits.
18:55There are many defined environments.
18:59One of the exciting things.
19:00I think I have two things with me.
19:01The first is the bandit exercise.
19:05As I said, actually a Linux standard.
19:08How do I get in?
19:10That's what's exciting about Over the Wire because it sets up an environment.
19:16Top left: SSH login.
19:18So I think I have to log in via SSH first, which is sometimes a problem.
19:22And then just look to see where I can find what I need.
19:26On the left you can see a whole series of levels where you can hop from one to the next.
19:34I've included an example here for those who are already a little familiar with Linux, with an SSH pass, so I can add this one line to my documentation, my notes, which I want to refer back to.
19:45And then here at the end I log in with a login in a port and say LS.
19:50Aha, I see a readme file, then I know I can only look at it in the CAT buffet.
19:54And now, as usual, the password that's in there now is grayed out, you have to earn it yourself.
20:02Then I can use the password to go from Bandit 0 to Bandit 1 and then to the next level.
20:08And that's where we'll make progress here.
20:10And if you're now wondering, aha, password, interesting, these passwords that you're looking for are also known as flags,
20:19often have a format that contains an identifier, a keyword, curly brackets, and various things.
20:29Password 1, Password 2, Password 3 to distinguish between the different levels.
20:32But the flag at the front is always the same, the keyword, so I know, aha, that's a flag.
20:40When I analyze a binary file, it's very helpful to see, ah yes, in that pile of binary, there's something interesting in there or not.
20:50Here, just using Unix Linux via SSH, I think that's a very nice, easy way to get started.
20:56But it goes into a lot of depth, just to give you a warning.
20:59I have the level, so over 30 levels, and at level 17 it stuck for the first time.
21:04And then it goes slowly, but then the learning process begins.
21:10So recommendation.
21:11A second recommendation I would like to give is Natas, which is a pure weaving exercise.
21:16So you don't get an SSH login, but a URL with login and password, where you then also get a password request.
21:23Then you log in and get the message, yes, you can find the password on this page.
21:31Well, great, you get the idea pretty quickly, look at the source code and then notice that there is a comment.
21:39Wonderful, this is obviously the flag find here again.
21:43And then I can go to the next level, Natas 1, and I can get in with the password.
21:48And that's how you play your way forward.
21:50This also works relatively well and easily in the first few levels.
21:54But then, as I said, it leads to SQL injections, blind SQL injections.
21:59There's definitely something in there.
22:02There is also criticism of over-the-wire in the area of reverse engineering and binary exploits.
22:08All of this is without today's standard protection mechanisms like ASLR, without DEP.
22:14Yes, the exercises are 10, 15 years old, but it's a good starting point.
22:20And I want to show it to you here.
22:22The technical perfection here is a broad field.
22:27But we want to start.
22:29And I think that's where you can achieve some initial success.
22:32I would like to pass this on to you and I deserve it too.
22:35The feeling of success is the beautiful thing about it.
22:37What is there all there?
22:46Where can I do this?
22:49TryHackMe, as I already mentioned, is ultimately a commercial platform.
22:52There is a lot that is free.
22:55Yes, you need to register an account, of course.
22:57There's hack-the-box, similar, a little bit technical, a little bit higher, level-based.
23:04Should I write something down?
23:05Of course, both offer premium content, for which I have to pay.
23:10Whether I want that depends on whether I value my own learning value.
23:15There are many commercial cyber ranges.
23:18There is a link to it in the documents.
23:19So it usually involves a relatively large amount of money at the corporate level.
23:25Companies or organizations such as SANS, ISC2, ISACA also address the topic of security in great detail.
23:33Often a lot of organizational work, but some also very technical work here.
23:37But here the target audience is often companies with corresponding four-digit amounts,
23:42which you don't necessarily want to afford, especially when you're just starting out.
23:45There are dedicated CTF platforms such as Pico-CTF or Pone College,
23:52which then promote knowledge building more.
23:54I can recommend it.
23:57What you might find related are so-called bug bounty programs,
24:01where I can register as a company and say,
24:03hey, I have some internet service.
24:04I think it's safe.
24:06But dear hackers, if you want to earn some money,
24:10before you break something,
24:12If you have found something, please contact us,
24:14because then there is a little money.
24:16And then there are Hacker One and Yes, as well as Hack and Integrity.
24:21They now also offer to arrange targeted pentests.
24:25If you feel confident about it, you can certainly get mediated.
24:28Otherwise, I'll make an offer
24:31and then I'll see if I can find anything from you.
24:34Yes, there is quite a lot.
24:37I'll give you this to read at home.
24:39What is running in parallel, CTF, is also often held in weekend events.
24:50Hack.lu is one such example that is very technically well organized
24:55before the Fluxfingers, who might be here today,
24:58who are definitely at the congress.
24:59There is from HPX, it says a typo,
25:05CTF on 38 C3, so here, starts tonight at 9, 10 pm,
25:13It will take 48 hours and we will see what the tasks are.
25:17I don't know them myself yet.
25:18If you want to watch it live, 48 hours,
25:21I have to see how I can manage with sleeping.
25:24Feel free to watch as a team with friends.
25:27There are also longer events, I have listed a few here,
25:32where you can then spend the weekend, which has several tasks,
25:34has more time, but also gets to see quite a lot because of the abundance.
25:40What meta information is available is the website ctftime.org,
25:46which simply shows which teams there are,
25:51what was there to see in the past here top right
25:54and of course the most exciting part, what upcoming events are there,
25:59Which CTFs can I play next weekend.
26:02The community there is very active,
26:05but also partly very closed
26:08and again the motivation from my side,
26:11to take a look at it, to approach it,
26:13not to be afraid to say,
26:15Hey, I'll sign up and see what happens.
26:18You will learn something
26:19and that is the point we need,
26:23to get to the top of the cyber stairs.
26:30What else is there to do?
26:32species.
26:35In principle, a distinction is made between two major types,
26:38This is Jeopardy, which we may know from Hacker Jeopardy,
26:40there are different categories
26:42and then there are different challenges from easy to difficult,
26:45Accordingly, there are points and point systems.
26:47Categories can then be
26:50Hacking web applications,
26:52Open source intelligence, where is what hidden,
26:56a binary disassembly,
26:57Reverse engineering
26:58or then up to the binary exploit
27:01in any application
27:02so much targeted data,
27:05that you might be able to take over a computer.
27:07That is so that
27:08advanced levels.
27:11Alternatively
27:12so-called attack and defense
27:14or also called King of the Hill.
27:15There are two or more parties,
27:17everyone gets their own server
27:18and there is attack and defense
27:21and at the same time.
27:23So I have to look
27:24what can be expected from
27:25the opposing parties have the same computer as me.
27:28I can analyze mine,
27:29I can analyze them,
27:31I can attack their weak points,
27:33but at the same time I have to fix my weak points,
27:36so that I am not attacked.
27:38Clear, easy,
27:39shut down the computer,
27:40nice try,
27:43but most of the time you want
27:44a specific service too,
27:45to keep points,
27:47keep alive.
27:48So,
27:50Services may not be switched off.
27:52This is usually a bit hectic,
27:53also for advanced,
27:55but maybe we will see
27:56and can be fun
27:58in a controlled environment.
28:00How do I do this?
28:04Which tools do I use based on experience?
28:08I am not from the Windows corner,
28:10There are certainly people
28:11who are at home there,
28:12does that.
28:13I would personally,
28:15I come from the BSD corner,
28:17I wouldn’t necessarily
28:18see my homeland,
28:19but Kali Linux has a lot
28:21Security software preinstalled.
28:23That's the thing,
28:25where I say,
28:25either in the VM,
28:27you can saw them up,
28:28set up again.
28:29And then of course there are
28:31a huge amount of tools,
28:32which I will not advertise at all now,
28:34because,
28:35We'll still be sitting there tomorrow.
28:37N/a,
28:37any Windows-Linux board resources,
28:39What does my operating system actually do?
28:41That's where it all starts.
28:42Do I not know my Windows operating system?
28:45What is in the network area,
28:47in the web sector?
28:48How do I tackle SQL injections?
28:50What tools are available for a
28:52Binary reverse engineering?
28:53How do I approach any
28:54Binary exploits?
28:55There are exciting tools everywhere,
28:57you just have to look at them
29:00and learn.
29:01This is effectively a
29:02very, very broad field,
29:05in my opinion, endless.
29:06The graphic here on the right shows
29:07a little bit of an attempt
29:08from someone,
29:10who tried this,
29:11to map,
29:11can be unfolded,
29:13So this thing is huge.
29:15This is simply knowledge,
29:16that we as a community
29:18create on the planet
29:20and that we of course
29:21have to keep an overview.
29:23Always keep in mind,
29:25we are talking about attack.
29:27Where can I find a crack
29:28and come in?
29:30Because in my job
29:30would like this crack
29:31Know knowledge
29:32and complete kitten,
29:34so that no one gets in.
29:37That is the
29:38ultimate goal,
29:39my motivation here.
29:41Find security gaps,
29:42close.
29:46How do I learn?
29:48Yes again,
29:48uses everything,
29:49what is there,
29:50what you know,
29:51YouTube books,
29:52I once had a book
29:52linked here,
29:54which is relatively old,
29:55that also a little
29:55approaches the topic in a structured manner.
29:58Otherwise there is also
29:59often at CTF
30:00a so-called
30:01Write-up afterwards,
30:02where someone writes,
30:03How did I solve the challenge?
30:05How did I approach it?
30:06With my knowledge,
30:06with my methods,
30:07with my tools?
30:09There is on CTF-Time
30:10Write-ups are often linked
30:12or on the website
30:14on Medium.com.
30:16If you use the keyword
30:17CTF is looking for
30:18you are also very well served,
30:20Write-ups can be found here.
30:22So also gladly,
30:22if you can't get any further,
30:24I believe,
30:24when you show this Stux CTF,
30:26There are many write-ups,
30:28which then also help well,
30:30to give a push,
30:31not to type out the complete solution,
30:33you don't learn anything there.
30:34But if you know the rider,
30:35you need a push,
30:37you get it.
30:41Yes,
30:43what happens then?
30:44So before we get to the point,
30:46again,
30:46you have to practice it.
30:47This is time-consuming,
30:49this is time-consuming,
30:50that is also frustrating,
30:51but only if you overcome the frustration,
30:53you will learn.
30:55And when you say,
30:56OK,
30:56Now I've done this a few times,
30:58I think,
30:58then a certain amount of fun will arise,
31:00hopefully.
31:02What comes next?
31:03Yes,
31:04and if you want to invest more time,
31:06At some point you have to ask yourself,
31:07what am I living for,
31:08Who pays the rent and food?
31:10Can I do this professionally?
31:11Short answer,
31:12Yes.
31:15There are currently in this entire IT industry
31:18many job titles,
31:20that sprout up.
31:21in the security sector even more so.
31:25I have picked out one of many possible things on the left,
31:30where I say,
31:30n/a,
31:31How do I get started?
31:33Most of the time I have an IT solution,
31:35where I also have to say regarding security,
31:37How do I do it?
31:38Do I need a security architect?
31:39Then I usually need someone
31:41who implements this cleanly,
31:42programmed,
31:43extends.
31:44This will probably be a security engineer.
31:48Very exciting for us now,
31:50it is always good,
31:51to have a second opinion,
31:53to have an independent third party look at it.
31:56There is the topic of ethical hacking on the bottom left,
31:59Penetration testing,
32:00Pentesting comes into play,
32:01where we can of course say,
32:04I want to take a look at this,
32:05I offer this as a service,
32:07but this can also be done internally within companies
32:08on my infrastructure and products,
32:11where, of course, something will hopefully be found,
32:13to say, hey, now it's better and safer afterwards.
32:16We remember,
32:17Security means
32:19Values against attacks from threats
32:22protect through protective measures
32:24and although I have the weak points,
32:27but then have protective measures,
32:28then I became better and more confident.
32:32Yes, the topic of Security Architect Engineering,
32:35In the running instinct I naturally want to look,
32:37how is my landscape,
32:38I might need a security analyst,
32:41who finds something in the worst case
32:42or in the best case,
32:44then I need digital forensics,
32:46Incident Response,
32:47to look,
32:48how did it happen anyway
32:49and in the end this whole security posture,
32:53they say,
32:53the entire landscape
32:55to keep track
32:56and again the chain
32:57then to decline all the limbs,
33:00is usually the task
33:01by a Chief Information Security Officer.
33:04Just learned again yesterday,
33:06that the group in the area,
33:07which then burns out the fastest,
33:09because there is usually a lot to do.
33:10but shows a little bit,
33:13where the job task goes
33:14and how the job profiles
33:16emerge here.
33:18Here now specifically bottom left,
33:19Ethical Hacking,
33:20Penetration testing,
33:21Pentesting,
33:22perhaps one of the exciting career options here.
33:25So, let's do a time check.
33:32For us again.
33:34What do I do?
33:35How do I approach it?
33:37Make.
33:39I have shown you a few websites,
33:41Over the Wire,
33:42with the Linux thing,
33:44simply web of binary exploits
33:46things get hairy.
33:47I showed TryHackMe.
33:50I thought about
33:51whether I turn it over.
33:52Can also be done with TryHackMe
33:53take very good first steps.
33:56Make.
33:57Practice.
33:57Gain experience.
33:59Exchange.
33:59There is a great community here.
34:01Use the.
34:02We have them too.
34:03They are all available online too.
34:04And I can only recommend
34:07to enter this exciting field.
34:10This is the end of my content
34:15briefly summarized again.
34:17What did we look at?
34:20Introduction.
34:20We know what security is.
34:22I have protection of important things,
34:24through pre-threats,
34:25through protective measures,
34:27in width, in depth.
34:30We took a little dive,
34:32how could I make a defense.
34:34Telemetry,
34:34as I did at the beginning
34:35with security lists,
34:37with digital forensics,
34:39Incident Response,
34:40I need something like that.
34:43We then had more
34:43focused on the attack side.
34:45What scenarios are there?
34:46How can I practice this?
34:48What types are there?
34:50What tools are available?
34:51And at the end topic Start
34:53and outlook,
34:55possible career options
34:56for this exciting area here.
35:01That's the end of it for me.
35:04I say thank you.
35:06First of all, thank you for listening.
35:08Thanks also to my employer,
35:11the Rheinhaus machine factory in Regensburg,
35:13which enables me to
35:14to be here today.
35:16And also thanks to the
35:17Mad Monday CTF Team,
35:18with whom I have been working for the last twelve months
35:20played a lot of CTFs
35:23and hopefully many more
35:25I'll play on the way.
35:28Anyone looking for contact,
35:30Addresses are there,
35:31I think you can find
35:31with the name on the Internet.
35:32In any case.
35:33With this I say thank you again to you
35:36for listening.
35:38I am now finished with the content
35:39and would then be ready for questions,
35:42if there are any.
35:49Thank you.
35:51We have two microphones,
35:53to capture questions.
35:54As I said,
35:55make yourselves really noticeable,
35:57so we can bring you the microphone.
35:59Questions,
36:05Hands up,
36:07Robbery.
36:18Here at the very back left.
36:20Oh, now.
36:23Yes indeed.
36:25Is it on?
36:27Yes, it's on.
36:27My question is,
36:30you briefly mentioned
36:31that when I meet a team
36:33want to connect,
36:34to play in a group,
36:36that it is closed with classes
36:38and so,
36:39simply from a personal experience,
36:41How can I best handle this humanly?
36:45So,
36:47maybe two dimensions to it.
36:49I have to find my team first,
36:51must look,
36:52in personal circle of acquaintances,
36:54in his hackerspace,
36:55in its professional community,
36:58where can I find people
36:59who are interested in principle
37:01and then have time.
37:03Experience shows,
37:04That's good,
37:04if you somehow
37:05in Timebox does with us.
37:07The team is not called
37:08Map Monday,
37:08we always do it Monday evening,
37:10because everyone somehow
37:11the time
37:12and registered the head.
37:13Then you sit together
37:14and then we do it.
37:15And of course,
37:16everyone brings different things,
37:18Experiences and strengths
37:19and weaknesses.
37:20and that will
37:21then find the task.
37:25I don't know,
37:26does that answer the question?
37:28Yes, thanks.
37:29Gladly.
37:33Further questions?
37:33Yes, I think then,
37:44I say thank you again.
37:46If there are no further questions,
37:48then we thank you very much
37:50for this crash course.
37:51That's it.
37:52That's it.
37:53That's it.
37:54That's it.
37:55That's it.
37:55That's it.
37:56That's it.
37:57That's it.
37:57That's it.
37:58That's it.
37:58That's it.
37:59That's it.
37:59That's it.
38:00That's it.
38:00That's it.
38:01That's it.
38:01That's it.
38:02That's it.
38:02That's it.
38:03That's it.
38:04That's it.
38:04That's it.
38:05That's it.
38:05That's it.
38:06That's it.
38:06That's it.
38:07That's it.
38:08That's it.
38:08That's it.
38:09That's it.
38:10That's it.
38:10That's it.
38:11That's it.
38:12That's it.
38:13That's it.
38:14That's it.
38:15That's it.