CYBER DEFENDER

The cybersecurity event you don't want to miss.


About The Event

Cyber Defender is a 2-day workshop event hosted by CYSCOM on the 19th and 20th of April and is targeted at aspiring technical engineers and cyber security enthusiasts. The workshop is packed with fun events and knowledge to help you understand the field of cybersecurity and have a taste of what it feels like, even if you haven't got a clue about this field. Learn about the OWASP top 10 vulnerabilities with a hands-on session and make a secure web app. Improve and evaluate your ethical hacking skills with our CTF event on the second day. There are amazing prizes for winners, and, of course, participants don’t go home empty handed.



Timeline

DAY-1

...
Ethical Hacking in the real world

The event will kick start with a practical Demonstration of Ethical Hacking in the real world, where we will try to demnonstrate how easy it is for the attackers to take control of our system by finding grey areas/vulnerabilities in the network. A practical demonstration mirrors a real-life scenario where an attacker might be trying to gain access to your system and how you can use this knowledge to improve your system's security or find concealed bugs under authorized grounds.

...
HANDS ON SESSION COVERING OWASP TOP 10

If you're a Web developer or you just like making applications for fun, then you need to know about OWASP TOP 10 vulnerabilities. It is a standard awareness document for developers and web application security to know about different types of attacks like code injection or broken authentication. The hand's on session will be useful for the participants to understand faulty code writing and loopholes in the applications. After this session participants will understand the importance of writing clean and better code.

...
A WALKTHROUGH TO OWASP'S JUICE SHOP

Taking the session a step further we will then look at an example of a real application and try to exploit it with the knowledge of OWASP TOP10 we have just gained. OWASP Juice SHOP is maybe one of the most modern and lucrative applications but it is certainly not one of the most secure ones! Developed in Node.js and Angular it contains many underlying vulnerabilities just waiting to be found and a walkthrough to it should help you to understand how to secure applications.

DAY-2

...
CAPTURE THE FLAG (JEOPARDY STYLE)

Sure you must have heard about Capture the Flag in online games and you think they are fun, but you know what's even more fun is to Capture the Flags using your hacking skills! The second day of our event starts with a 4-hour long CTF with regular challenges in different domains to test your penetration testing knowledge and skills. With varying levels difficuties for challenges you have to submit flags to stay at the top of the leaderboard, Happy Hacking!

...
RESULTS AND DISCUSSION

With the event at its climax the leaderboard maintained will decide the overall winner of the event. After the event participants can share their views on the challenges provided and discuss with others to know more about how to solve each challenge. This healthy discussion will mark the end of our 2-day long event and encourage participants to take cybersecurity as a career path.