Programme

Course Description

This session begins with an introduction of popular red-teaming/penetration testing tools, the basic steps of penetration testing are also covered to prepare the participants for the next phase of this session. 

Having introduced a general methodology to penetration testing and the tools to apply it, the participants will be introduced to the Battlegrounds module of the Hack the Box platform which will host a CTF event. In this CTF a series of virtual machines will be introduced by the Focal Point’s Red Team to the attendees of the CyberHOT event, then the attendees will be given time to work on each challenge and finally a short solution will be presented to conclude each section.


The CyberHOT Summer school sessions aims for the participants:



Red Team’s Experience:


Target Audience

Ethical hackers, penetration testers, IT security professionals

Opening of CyberHOT (8:30-9:00)

9:00 - 9:10 Welcome by the Organisers


9:10 - 10:00 Keynote Speaker Tejas Patel (DARPA Program Manager) - Cyber Agents for Security Testing and Learning Environments (CASTLE)

Cyber Agents for Security Testing and Learning Environments (CASTLE) aims to address these challenges by developing a toolkit that instantiates realistic network environments and trains artificial intelligence agents to support in the defense against advanced persistent cyber threats. Researchers will explore the use of reinforcement learning to automate network hardening and ultimately accelerate cybersecurity assessments with approaches that are automated, repeatable, and measurable.


10:00 - 10:15 Coffee Break


10:15 - 11:15 Introduction to HtB (Hack the Box) platform - Penetration Testing Walkthroughs 1/2: 

The purpose of this session is to get participants familiar with HtB’s platform and attacker VM instance. In this session a full walkthrough of two easy challenges will be offered by the lecturers. Attendees are expected to follow up step by step and submit the flags derived from the challenges to the platform. 


Challenges:


Challenge 1 Highlights:


Challenge 2 Highlights:


11:15 - 11:25 Coffee Break


11:25 – 12:45 Penetration Testing Walkthroughs 2/2:

The purpose of this session is to get the participants engaged with more penetration testing challenges by offering step by step walkthroughs. In this session a full walkthrough of two further easy challenges will be offered by the lecturers. Attendees are expected to follow up step by step and submit the flags derived from the challenges to the platform.


Challenges:


Challenge 3 Highlights: 


Challenge 4 Highlights:


12:45 – 13:45 Lunch Break


13-45 – 17:00 Capture the Flag, Penetration Testing Exercise

The purpose of this session is to engage the participants with more penetration testing challenges, initially without a walkthrough, so they can troubleshoot it themselves. In this session a short introduction will be offered to each challenge, participants will be given 20-30 minutes to work on each challenge and have a high level solution presented to them afterwards for 10-15 minutes before they move on to the next challenge. Attendees are expected to engage on these challenges based on the methodology followed throughout the morning sessions.


Challenges:


Challenge 5 Highlights:


Challenge 6 Highlights: 


Challenge 7 Highlights:


Challenge 8 Highlights:


End of CyberHOT Summer School - Certifications (17:00)

The HtB Lab will be available to the attendees for a week after the CyberHOT event, to give them time to complete challenges from the second session.

Background Requirements for the attendees:

Necessary Background:

Nice to have: