SlideShare a Scribd company logo
Hey Hackermans!
Here is where you'll learn how to become a yourself!!
What are we learning today?
While this is a beginner introduction to cybersec… we want to first inspire you by what you can do in the
field of cybersecurity
Industry Roles What can you do as a cybersec engineer?
Certifications and Resources How you can learn/practice cybersecurity? (Certs, books, websites)
Web Vulnerabilities OWASP Top 10 with examples
Hands-on Demo! Exploit a command injection vulnerability (and win a $20 gift card 👀)
Recovery and
investigation!
Rewarding public to find
bugs for you??
How do you make money though?
01
05 Which one's
your favorite?
SOC Analyst
Detect attacks even
before they happen…
Malware Analyst
Analyzing and reversing
malware samples
Forensics
Bug Bounty
04
02
Penetration Tester
Break through defenses
before the hackers do
03
SOC
Analyst
01
"an ounce of
prevention is
worth a pound of
cure"
- Benjamin Franklin
SOC Analyst
Identify attack
vectors
Monitoring
infrastructure
Anomalies/suspicious activity
over the network
Response &
Resolution
Oh! you found something sus…
time to fix it :)
Potential places an attack can
happen in your software?
SIEM
● Security Information
and Event
Monitoring Systems
○ Splunk
○ IBM QRadar
○ ArcSight
Network
Security
● Firewalls
● Monitoring
traffic
Threat
Hunting
● Vulnerability
assessments
● Penetration
testing
SOC Analyst - Skills
Bug Bounty
02
Bug Bounties
● Get PAID to discover and report security vulnerabilities
● Payment can range anywhere from $0 to thousands
● Some platforms:
MCSS × GDSC: Intro to Cybersecurity Workshop
IRL
Examples!
Reddit Reflected XSS
Snapchat IDOR
GitLab Command Execution
How to Get Started: Certs
● HackTheBox Certified Bug Bounty Hunter ( HTB CBBH)
○ $210 exam, $8 monthly student subscription
● OffSec Web Assessor (OSWA)
○ $1599 Course + Exam
Penetration
Tester
03
Penetration Tester/Ethical Hacker
● Employed by a company to hack them
● Responsibilities:
○ Simulating cyber attacks for the purpose of identifying
vulnerabilities
○ Produces reports with findings and any
recommendations
○ May assist during remediation process
*Bug bounty = freelance pentesting*
How to become a pentester
● Get certified!
○ OffSec Certified Professional
○ HTB Certified Penetration Testing Specialist
Malware
Analyst
04
Malware Analyst
● Takes apart malware to determine how the attack was
deployed
● Determines what the attacker was trying to gain from the
malware
● Dissect the exploit and identify the key vulnerability that was
exploited which is then fixed by the developers
Malware Analyst - Skills
● Understanding of:
○ Operating Systems
○ Networking
○ Memory analysis
● Reverse Engineering
○ Assembly, Debugging, Analyzing code
● Malware analysis tools
○ Volatility, IDA, Ghidra
Forensics
05
Conduct analysis
of log files,
evidence, and other
information
Analyze
Confirm what is
known about an
intrusion and
discover new
information
Identify
Report any
detected and
identified details
about the
intrusions
Report
Tools used
Learning Resources
● Multiple Websites:
○ Hackthebox.eu
○ tryhackme.com
○ picoCTF
○ pwn.college
● Textbooks --
○ Practical Malware Analysis
○ Practical Binary Analysis
○ Hacking: The Art of Exploitation!!
● Infosec course -- CSC347 and CSC427 at UTM
Certifications
Offensive Security
Industry standard
HackTheBox Academy
Affordable
Prelude: OWASP Top 10
Hands-on
Demo!
EZ Linux Reference
● pwd - print working directory
● ls - list files in current directory
● cd [path]- change current directory
○ cd .. - go up one level
○ cd / - go to root directory
○ cd - go to home directory
● cat [filename] - print contents of file
Connecting to the Demo
● Visit your assigned http://34.130.93.18:port/ site (make sure you’re using http, not
https)
● If you find the flag hosted on the server, enter it in the discord server stage chat so we
know who won, we’ll contact you with your prize!
CREDITS: This presentation template was created by Slidesgo, and
includes icons by Flaticon and infographics & images by Freepik
Thanks!
Do you have any questions?
Please keep this slide for attribution
@gdscutm
@utmmcss

More Related Content

PDF
Master Ethical Hacking Basics Like a Pro
PDF
Sophisticated Attacks - Can We Really Detect Them _v1.2.pdf
PDF
Practical Incident Response - Work Guide
DOCX
How to Become a Successful Penetration Tester_ A Complete Guide.docx
PDF
Threat Hunting Professional Online Training Course
PPTX
Cse ethical hacking ppt
PDF
Top 10 Essential Ethical Hacker Tools Everyone Should Know.pdf
PDF
Top QC Electrical Courses in Kerala Kochi
Master Ethical Hacking Basics Like a Pro
Sophisticated Attacks - Can We Really Detect Them _v1.2.pdf
Practical Incident Response - Work Guide
How to Become a Successful Penetration Tester_ A Complete Guide.docx
Threat Hunting Professional Online Training Course
Cse ethical hacking ppt
Top 10 Essential Ethical Hacker Tools Everyone Should Know.pdf
Top QC Electrical Courses in Kerala Kochi

Similar to MCSS × GDSC: Intro to Cybersecurity Workshop (20)

PDF
CEH-brochure.pdf
PPTX
Introduction to hacking
PPTX
Cyber Threat Hunting Training (CCTHP)
PPTX
CSE-Ethical-Hacking-ppt.pptx
PPTX
Advanced Persistent Threats
PPTX
CSSE-Ethical-Hacking-ppt.pptx
PDF
Your internet-exposure-that-makes-you-vulnerable
PDF
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
PPTX
CSE-Ethical-Hacking-ppt.pptx
PPTX
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
PDF
Top 13 hacking software for beginners.pdf
PPTX
What is penetration testing and career path
PDF
Cyber Threat Hunting Meap V05 Chapters 1 To 8 Of 13 Nadhem Alfardan
PDF
CompTIA Security+ SY0-601 Domain 1
PPTX
Ethical-Hacking-ppt.pptx
DOCX
Lesson plan ethical hacking
PPTX
Basics of getting Into Bug Bounty Hunting
PPTX
Intro to INFOSEC
PPTX
Cyber Security Workshop GDSC-BITW
PDF
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
CEH-brochure.pdf
Introduction to hacking
Cyber Threat Hunting Training (CCTHP)
CSE-Ethical-Hacking-ppt.pptx
Advanced Persistent Threats
CSSE-Ethical-Hacking-ppt.pptx
Your internet-exposure-that-makes-you-vulnerable
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
CSE-Ethical-Hacking-ppt.pptx
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
Top 13 hacking software for beginners.pdf
What is penetration testing and career path
Cyber Threat Hunting Meap V05 Chapters 1 To 8 Of 13 Nadhem Alfardan
CompTIA Security+ SY0-601 Domain 1
Ethical-Hacking-ppt.pptx
Lesson plan ethical hacking
Basics of getting Into Bug Bounty Hunting
Intro to INFOSEC
Cyber Security Workshop GDSC-BITW
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Ad

More from GDSC UofT Mississauga (20)

PDF
CSSC ML Workshop
PPTX
ICCIT Council × GDSC: UX / UI and Figma
PDF
Community Projects Info Session Fall 2023
PDF
GDSC x Deerhacks - Origami Workshop
PDF
Reverse Engineering 101
PDF
Michael's OWASP Juice Shop Workshop
PDF
PDF
Discord Bot Workshop Slides
PDF
Web Scraping Workshop
PDF
Devops Workshop
PDF
HTML_CSS_JS Workshop
PDF
DevOps Workshop Part 1
PDF
Docker workshop GDSC_CSSC
PDF
Back-end (Flask_AWS)
PDF
Full Stack React Workshop [CSSC x GDSC]
PDF
Git Init (Introduction to Git)
PPTX
Database Workshop Slides
PPTX
ChatGPT General Meeting
PPTX
Elon & Twitter General Meeting
CSSC ML Workshop
ICCIT Council × GDSC: UX / UI and Figma
Community Projects Info Session Fall 2023
GDSC x Deerhacks - Origami Workshop
Reverse Engineering 101
Michael's OWASP Juice Shop Workshop
Discord Bot Workshop Slides
Web Scraping Workshop
Devops Workshop
HTML_CSS_JS Workshop
DevOps Workshop Part 1
Docker workshop GDSC_CSSC
Back-end (Flask_AWS)
Full Stack React Workshop [CSSC x GDSC]
Git Init (Introduction to Git)
Database Workshop Slides
ChatGPT General Meeting
Elon & Twitter General Meeting
Ad

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Modernizing your data center with Dell and AMD
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPT
Teaching material agriculture food technology
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
A Presentation on Artificial Intelligence
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
The Rise and Fall of 3GPP – Time for a Sabbatical?
MYSQL Presentation for SQL database connectivity
Digital-Transformation-Roadmap-for-Companies.pptx
Review of recent advances in non-invasive hemoglobin estimation
Modernizing your data center with Dell and AMD
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Diabetes mellitus diagnosis method based random forest with bat algorithm
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Teaching material agriculture food technology
NewMind AI Monthly Chronicles - July 2025
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
A Presentation on Artificial Intelligence
Advanced methodologies resolving dimensionality complications for autism neur...
Understanding_Digital_Forensics_Presentation.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy

MCSS × GDSC: Intro to Cybersecurity Workshop

  • 1. Hey Hackermans! Here is where you'll learn how to become a yourself!!
  • 2. What are we learning today? While this is a beginner introduction to cybersec… we want to first inspire you by what you can do in the field of cybersecurity Industry Roles What can you do as a cybersec engineer? Certifications and Resources How you can learn/practice cybersecurity? (Certs, books, websites) Web Vulnerabilities OWASP Top 10 with examples Hands-on Demo! Exploit a command injection vulnerability (and win a $20 gift card 👀)
  • 3. Recovery and investigation! Rewarding public to find bugs for you?? How do you make money though? 01 05 Which one's your favorite? SOC Analyst Detect attacks even before they happen… Malware Analyst Analyzing and reversing malware samples Forensics Bug Bounty 04 02 Penetration Tester Break through defenses before the hackers do 03
  • 5. "an ounce of prevention is worth a pound of cure" - Benjamin Franklin
  • 6. SOC Analyst Identify attack vectors Monitoring infrastructure Anomalies/suspicious activity over the network Response & Resolution Oh! you found something sus… time to fix it :) Potential places an attack can happen in your software?
  • 7. SIEM ● Security Information and Event Monitoring Systems ○ Splunk ○ IBM QRadar ○ ArcSight Network Security ● Firewalls ● Monitoring traffic Threat Hunting ● Vulnerability assessments ● Penetration testing SOC Analyst - Skills
  • 9. Bug Bounties ● Get PAID to discover and report security vulnerabilities ● Payment can range anywhere from $0 to thousands ● Some platforms:
  • 15. How to Get Started: Certs ● HackTheBox Certified Bug Bounty Hunter ( HTB CBBH) ○ $210 exam, $8 monthly student subscription ● OffSec Web Assessor (OSWA) ○ $1599 Course + Exam
  • 17. Penetration Tester/Ethical Hacker ● Employed by a company to hack them ● Responsibilities: ○ Simulating cyber attacks for the purpose of identifying vulnerabilities ○ Produces reports with findings and any recommendations ○ May assist during remediation process *Bug bounty = freelance pentesting*
  • 18. How to become a pentester ● Get certified! ○ OffSec Certified Professional ○ HTB Certified Penetration Testing Specialist
  • 20. Malware Analyst ● Takes apart malware to determine how the attack was deployed ● Determines what the attacker was trying to gain from the malware ● Dissect the exploit and identify the key vulnerability that was exploited which is then fixed by the developers
  • 21. Malware Analyst - Skills ● Understanding of: ○ Operating Systems ○ Networking ○ Memory analysis ● Reverse Engineering ○ Assembly, Debugging, Analyzing code ● Malware analysis tools ○ Volatility, IDA, Ghidra
  • 23. Conduct analysis of log files, evidence, and other information Analyze Confirm what is known about an intrusion and discover new information Identify Report any detected and identified details about the intrusions Report
  • 25. Learning Resources ● Multiple Websites: ○ Hackthebox.eu ○ tryhackme.com ○ picoCTF ○ pwn.college ● Textbooks -- ○ Practical Malware Analysis ○ Practical Binary Analysis ○ Hacking: The Art of Exploitation!! ● Infosec course -- CSC347 and CSC427 at UTM
  • 29. EZ Linux Reference ● pwd - print working directory ● ls - list files in current directory ● cd [path]- change current directory ○ cd .. - go up one level ○ cd / - go to root directory ○ cd - go to home directory ● cat [filename] - print contents of file Connecting to the Demo ● Visit your assigned http://34.130.93.18:port/ site (make sure you’re using http, not https) ● If you find the flag hosted on the server, enter it in the discord server stage chat so we know who won, we’ll contact you with your prize!
  • 30. CREDITS: This presentation template was created by Slidesgo, and includes icons by Flaticon and infographics & images by Freepik Thanks! Do you have any questions? Please keep this slide for attribution @gdscutm @utmmcss