- Teacher: Stylianos Karagiannis
- Teacher: Joao Sardinha
Trainer
Stylianos Karagiannis, PDM/Ionian University
Session Details
- Session Title:
Cybersecurity Hackathon WinterSchool – Introduction and Preparation - Session Description:
This session provides an immersive introduction to essential cybersecurity skills, combining Linux fundamentals, network forensics, and penetration testing. Participants will gain hands-on experience in navigating Linux systems, analyzing network traffic, and exploiting vulnerabilities in a simulated attack scenario. The participants will be prepared for real-world cybersecurity challenges. - Key Learning Objectives:
Master essential Linux commands and operations for cybersecurity.
Understand the fundamentals of network traffic analysis and forensics.
Learn reconnaissance, exploitation, and privilege escalation techniques.
Develop skills for tackling Capture The Flag (CTF) challenges in cybersecurity.
Hackathon Details
- Lab Title:
Cybersecurity Hackathon WinterSchool - Lab Description:
In this Hacjathon, participants will engage in a penetration testing exercise where they must gain root access to a victim machine. The lab includes reconnaissance, exploitation, and privilege escalation phases. Additionally, participants will practice network traffic analysis to identify and exploit vulnerabilities, reinforcing key concepts in cybersecurity. - Key Learning Objectives:
Perform network reconnaissance to identify targets.
Use tools like Netdiscover and Nmap to scan and identify open ports and services.
Exploit identified vulnerabilities to gain initial access and escalate privileges.
Analyze network traffic and identify potential security threats. - Tools/Software Required:
Virtualization software (VirtualBox)
Tools: netdiscover, Nmap, Netcat, Wireshark, Linux terminal utilities, vulnerability scanners.
Pre-configured VM images for VictimVM, will be given as ova to deploy
- Teacher: Stylianos Karagiannis
Trainer
Christos Apostolakis, Zelus
Session Details
- Session Title:
Analyzing Malware samples using Forensics Analysis Tools - Session Description:
This session will focus on identifying malware and analyzing its processes using memory analysis tools. Participants will learn techniques for dumping processes to facilitate malware analysis - Key Learning Objectives:
Understand the methodology for initiating an analysis of a malware infection incident.
Learn to identify malicious processes and extract critical information about the methods used to infect system.
Gain insights into how malware functions, enabling participants to recover and mitigate its impact.
Lab Details
- Lab Title:
Malware Infection Incident analysis with Volatility and other State of the Art Digital Forensics Tools - Lab Description:
Lab focuses on the use of Digital Forensics Tools, that will help the participants to understand the methodologies we use to identify malware infections and how to analyze the evidence and perform Malware Analysis - Key Learning Objectives:
Utilize memory forensics tools to identify and analyze processes of an infected system in order to locate and isolate malicious software.
Perform process dumping to capture malware and evaluate its functionality - Tools/Software Required:
Volatility 3, hex editor (xxd), aeskeyfind
Virtual Environment: Kali Linux or other preferred Linux Distro with the essential tools installed
Trainer
Stylianos Karagiannis, PDM/Ionian University
Session Details
- Session Title:
Operating System Security - Session Description:
This session provides a concise introduction to operating system security, focusing on managing permissions, system hardening, and configuring firewalls in Linux and Windows. Participants will explore best practices and tools to secure systems against threats, with an emphasis on practical, real-world application. - Key Learning Objectives:
Understand file system permissions and their role in operating system security.
Learn system hardening techniques for Linux and Windows environments.
Configure and manage firewalls using UFW and Windows Firewall.
Lab Details
- Lab Title:
Operating System Hardening - Lab Description:
This lab focuses on system hardening using Lynis, an open-source security auditing tool for Linux. Participants will perform a detailed security audit, analyze the results, and implement hardening measures to strengthen the operating system against threats. The hands-on activities will provide practical experience in identifying and mitigating vulnerabilities. In addition, the lab provides hands-on practice in managing permissions, performing system audits with Lynis, and configuring firewalls in Linux and Windows environments. - Key Learning Objectives:
Configure and audit file system permissions in Linux and Windows.
Analyze audit reports to identify potential vulnerabilities.
Apply OS hardening techniques based on the recommendations from Lynis.
Understand the importance of compliance and benchmarking in security.
Set up and manage firewalls using UFW in Linux and Windows Firewall. - Tools/Software Required:
VirtualBox (for MAC users install UTM and follow:
Installed virtual machines Ubuntu, and ParrotOS.
Lynis (pre-installed in the Linux VM).
UFW and Windows Firewall utilities.
- Teacher: Stylianos Karagiannis