├── README.md ├── images ├── c11.png ├── c12.png ├── c13.png ├── c14.png ├── e11.png ├── e12.png ├── e21.png ├── f1.png ├── f21.png ├── f22.png ├── f23.png ├── f24.png ├── p11.png ├── p12.png ├── p21.png ├── p31.png ├── r11.png ├── r12.png ├── r21.png └── s11.png ├── presentation.pdf ├── LICENSE ├── .gitignore └── presentation.tex /README.md: -------------------------------------------------------------------------------- 1 | # bilmok-slides 2 | 3 | CTF presentation for BILMOK. 4 | -------------------------------------------------------------------------------- /images/c11.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/halit/bilmok-slides/HEAD/images/c11.png -------------------------------------------------------------------------------- /images/c12.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/halit/bilmok-slides/HEAD/images/c12.png -------------------------------------------------------------------------------- /images/c13.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/halit/bilmok-slides/HEAD/images/c13.png -------------------------------------------------------------------------------- /images/c14.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/halit/bilmok-slides/HEAD/images/c14.png -------------------------------------------------------------------------------- /images/e11.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/halit/bilmok-slides/HEAD/images/e11.png -------------------------------------------------------------------------------- /images/e12.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/halit/bilmok-slides/HEAD/images/e12.png -------------------------------------------------------------------------------- /images/e21.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/halit/bilmok-slides/HEAD/images/e21.png -------------------------------------------------------------------------------- /images/f1.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/halit/bilmok-slides/HEAD/images/f1.png -------------------------------------------------------------------------------- /images/f21.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/halit/bilmok-slides/HEAD/images/f21.png -------------------------------------------------------------------------------- /images/f22.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/halit/bilmok-slides/HEAD/images/f22.png -------------------------------------------------------------------------------- /images/f23.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/halit/bilmok-slides/HEAD/images/f23.png -------------------------------------------------------------------------------- /images/f24.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/halit/bilmok-slides/HEAD/images/f24.png -------------------------------------------------------------------------------- /images/p11.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/halit/bilmok-slides/HEAD/images/p11.png -------------------------------------------------------------------------------- /images/p12.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/halit/bilmok-slides/HEAD/images/p12.png -------------------------------------------------------------------------------- /images/p21.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/halit/bilmok-slides/HEAD/images/p21.png -------------------------------------------------------------------------------- /images/p31.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/halit/bilmok-slides/HEAD/images/p31.png -------------------------------------------------------------------------------- /images/r11.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/halit/bilmok-slides/HEAD/images/r11.png -------------------------------------------------------------------------------- /images/r12.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/halit/bilmok-slides/HEAD/images/r12.png -------------------------------------------------------------------------------- /images/r21.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/halit/bilmok-slides/HEAD/images/r21.png -------------------------------------------------------------------------------- /images/s11.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/halit/bilmok-slides/HEAD/images/s11.png -------------------------------------------------------------------------------- /presentation.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/halit/bilmok-slides/HEAD/presentation.pdf -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | The MIT License (MIT) 2 | 3 | Copyright (c) 2015 Halit Alptekin 4 | 5 | Permission is hereby granted, free of charge, to any person obtaining a copy 6 | of this software and associated documentation files (the "Software"), to deal 7 | in the Software without restriction, including without limitation the rights 8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 9 | copies of the Software, and to permit persons to whom the Software is 10 | furnished to do so, subject to the following conditions: 11 | 12 | The above copyright notice and this permission notice shall be included in all 13 | copies or substantial portions of the Software. 14 | 15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 21 | SOFTWARE. 22 | 23 | -------------------------------------------------------------------------------- /.gitignore: -------------------------------------------------------------------------------- 1 | ## Core latex/pdflatex auxiliary files: 2 | *.aux 3 | *.lof 4 | *.log 5 | *.lot 6 | *.fls 7 | *.out 8 | *.toc 9 | 10 | ## Intermediate documents: 11 | *.dvi 12 | *-converted-to.* 13 | # these rules might exclude image files for figures etc. 14 | # *.ps 15 | # *.eps 16 | # *.pdf 17 | 18 | ## Bibliography auxiliary files (bibtex/biblatex/biber): 19 | *.bbl 20 | *.bcf 21 | *.blg 22 | *-blx.aux 23 | *-blx.bib 24 | *.brf 25 | *.run.xml 26 | 27 | ## Build tool auxiliary files: 28 | *.fdb_latexmk 29 | *.synctex.gz 30 | *.synctex.gz(busy) 31 | *.pdfsync 32 | 33 | ## Auxiliary and intermediate files from other packages: 34 | 35 | # algorithms 36 | *.alg 37 | *.loa 38 | 39 | # amsthm 40 | *.thm 41 | 42 | # beamer 43 | *.nav 44 | *.snm 45 | *.vrb 46 | 47 | #(e)ledmac/(e)ledpar 48 | *.end 49 | *.[1-9] 50 | *.[1-9][0-9] 51 | *.[1-9][0-9][0-9] 52 | *.[1-9]R 53 | *.[1-9][0-9]R 54 | *.[1-9][0-9][0-9]R 55 | *.eledsec[1-9] 56 | *.eledsec[1-9]R 57 | *.eledsec[1-9][0-9] 58 | *.eledsec[1-9][0-9]R 59 | *.eledsec[1-9][0-9][0-9] 60 | *.eledsec[1-9][0-9][0-9]R 61 | 62 | # glossaries 63 | *.acn 64 | *.acr 65 | *.glg 66 | *.glo 67 | *.gls 68 | 69 | # hyperref 70 | *.brf 71 | 72 | # listings 73 | *.lol 74 | 75 | # makeidx 76 | *.idx 77 | *.ilg 78 | *.ind 79 | *.ist 80 | 81 | # minitoc 82 | *.maf 83 | *.mtc 84 | *.mtc0 85 | 86 | # minted 87 | *.pyg 88 | 89 | # morewrites 90 | *.mw 91 | 92 | # nomencl 93 | *.nlo 94 | 95 | # sagetex 96 | *.sagetex.sage 97 | *.sagetex.py 98 | *.sagetex.scmd 99 | 100 | # sympy 101 | *.sout 102 | *.sympy 103 | sympy-plots-for-*.tex/ 104 | 105 | # todonotes 106 | *.tdo 107 | 108 | # xindy 109 | *.xdy 110 | -------------------------------------------------------------------------------- /presentation.tex: -------------------------------------------------------------------------------- 1 | \documentclass[compress]{beamer} 2 | \usetheme{sthlm} 3 | 4 | \usepackage{ 5 | booktabs, 6 | datetime, 7 | dtklogos, 8 | graphicx, 9 | multicol, 10 | pgfplots, 11 | ragged2e, 12 | tabularx, 13 | tikz, 14 | wasysym 15 | } 16 | 17 | \pgfplotsset{compat=1.8} 18 | 19 | \usepackage[utf8]{inputenc} 20 | \usepackage[T1]{fontenc} 21 | \usepackage{newpxtext,newpxmath} 22 | 23 | \usepackage{listings} 24 | \lstset{ % 25 | language=[LaTeX]TeX, 26 | basicstyle=\normalsize\ttfamily, 27 | keywordstyle=, 28 | numbers=left, 29 | numberstyle=\tiny\ttfamily, 30 | stepnumber=1, 31 | showspaces=false, 32 | showstringspaces=false, 33 | showtabs=false, 34 | breaklines=true, 35 | frame=tb, 36 | framerule=0.5pt, 37 | tabsize=4, 38 | framexleftmargin=0.5em, 39 | framexrightmargin=0.5em, 40 | xleftmargin=0.5em, 41 | xrightmargin=0.5em 42 | } 43 | 44 | \usetikzlibrary{ 45 | backgrounds, 46 | mindmap 47 | } 48 | 49 | \setbeameroption{show notes} 50 | 51 | \title{CTF} 52 | \subtitle{Siber güvenlik bilmeceleri} 53 | \date{07.03.2015} 54 | \author{\texttt{Halit Alptekin}} 55 | \institute{BILMOK} 56 | 57 | \hypersetup{ 58 | pdfauthor = {Halit Alptekin: info@halitalptekin.com}, 59 | pdfsubject = {Cyber Security, }, 60 | pdfkeywords = {ctf, cyber security, hacking}, 61 | pdfmoddate= {D:\pdfdate}, 62 | pdfcreator = {LaTeX} 63 | } 64 | 65 | \begin{document} 66 | 67 | \maketitle 68 | 69 | \section*{whoami} 70 | \begin{frame}{whoami} 71 | 72 | \begin{itemize} 73 | \item Bilgisayar mühendisliği öğrencisi 74 | \item Özgür yazılım ve açık kaynak tutkunu 75 | \item Siber güvenlik meraklısı 76 | \item TMD, LKD, Octosec üyesi 77 | \item Amator telsizci, amatör matematikçi 78 | \end{itemize} 79 | 80 | \end{frame} 81 | 82 | \section*{Plan} 83 | \begin{frame}{Plan} 84 | \tableofcontents[hideallsubsections] 85 | \end{frame} 86 | 87 | 88 | \section{CTF} 89 | 90 | \begin{frame}{nedir?} 91 | 92 | \begin{itemize} 93 | \item Eğitici ve uygulamalı oyunların genel adıdır 94 | \item Eski Roma yıllarından beri gerçekleştirilir 95 | \item Amaç, saldırı ve savunma bilgilerini uygulamaya dökmektir 96 | \item İsmi bayrak yakalama olsa da amaç her zaman bir bayrağa sahip olmak değildir 97 | \end{itemize} 98 | 99 | \end{frame} 100 | 101 | \begin{frame}{niye?} 102 | 103 | \begin{itemize} 104 | \item Katılanların farklı düşünme yeteneklerini geliştirir 105 | \item Sahip olunan teorik bilgilerin, uygulamasını yapma şansı verir 106 | \item Yeteneklerin ölçülmesi için bir araçtır 107 | \item Sıkıcı öğrenme yerine, eğlenceli öğrenmeyi amaçlar 108 | \item Siber güvenlik alanı uygulamalı bir alandır, kitaplarda kalamaz 109 | \end{itemize} 110 | 111 | \end{frame} 112 | 113 | \begin{frame}{Neler gerekli?} 114 | \centering 115 | \begin{tikzpicture}[scale=0.88] 116 | \path[mindmap,concept color=sthlmGreen,text=white] 117 | node[concept] {\textcolor{white}{CTF}} 118 | [clockwise from=-30] 119 | child[concept color=sthlmBlue,text=white] { node[concept] {Siber Güvenlik} } 120 | child[concept color=sthlmLightBlue,text=white] { node[concept] {Programlama} } 121 | child[concept color=sthlmBlue,text=white] { node[concept] {Zeka} }; 122 | \end{tikzpicture} 123 | \end{frame} 124 | 125 | \begin{frame}{türleri?} 126 | 127 | \begin{itemize} 128 | \item Jeopardy 129 | \begin{itemize} 130 | \item Web 131 | \item Crypto 132 | \item Stego 133 | \item Reverse 134 | \item Forensic 135 | \item Binary 136 | \item Exploit 137 | \item Programming 138 | \item Mobile 139 | \item Misc 140 | \end{itemize} 141 | \item Saldır-savun 142 | \begin{itemize} 143 | \item Pentest 144 | \end{itemize} 145 | \item Karışık 146 | \end{itemize} 147 | 148 | \end{frame} 149 | 150 | \section{Ornekler} 151 | 152 | \subsection{Forensic} 153 | 154 | \begin{frame}{Forensic 1} 155 | \begin{figure} 156 | \centering 157 | \includegraphics[width=\textwidth]{images/f1.png} 158 | \end{figure} 159 | \end{frame} 160 | 161 | \begin{frame}{Forensic 2} 162 | \begin{figure} 163 | \centering 164 | \includegraphics[width=\linewidth]{images/f21.png} 165 | \end{figure} 166 | \end{frame} 167 | 168 | \begin{frame}{Forensic 2} 169 | \begin{figure} 170 | \centering 171 | \includegraphics[width=\textwidth,height=1.8in]{images/f22.png} 172 | \end{figure} 173 | \begin{figure} 174 | \centering 175 | \includegraphics[width=\textwidth]{images/f23.png} 176 | \end{figure} 177 | \end{frame} 178 | 179 | \begin{frame}{Forensic 3} 180 | \begin{figure} 181 | \centering 182 | \includegraphics[width=\textwidth]{images/f24.png} 183 | \end{figure} 184 | \end{frame} 185 | 186 | \begin{frame}{Forensic 4} 187 | 188 | \begin{itemize} 189 | \item Memory dump 190 | \item Disk images 191 | \item Pcap analysis 192 | \item Googling 193 | \end{itemize} 194 | 195 | \end{frame} 196 | 197 | \subsection{Crypto} 198 | 199 | \begin{frame}{Crypto 1} 200 | \begin{figure} 201 | \centering 202 | \includegraphics[height=2.8in]{images/c12.png} 203 | \end{figure} 204 | \end{frame} 205 | 206 | \begin{frame}{Crypto 1} 207 | \begin{figure} 208 | \centering 209 | \includegraphics[width=\textwidth]{images/c11.png} 210 | \end{figure} 211 | \end{frame} 212 | 213 | \begin{frame}{Crypto 1} 214 | \begin{figure} 215 | \centering 216 | \includegraphics[width=0.2\textwidth,height=1.5in]{images/c13.png} 217 | \end{figure} 218 | \begin{figure} 219 | \centering 220 | \includegraphics[height=1in]{images/c14.png} 221 | \end{figure} 222 | \end{frame} 223 | 224 | \begin{frame}{Crypto 2} 225 | 226 | \begin{itemize} 227 | \item Hash length extension attack 228 | \item OTP 229 | \item Bit flipping attack 230 | \item RSA 231 | \item SSL 232 | \item Encoders 233 | \end{itemize} 234 | 235 | \end{frame} 236 | 237 | \subsection{Exploit} 238 | 239 | \begin{frame}{Exploit 1} 240 | \begin{figure} 241 | \centering 242 | \includegraphics[height=2in]{images/e11.png} 243 | \end{figure} 244 | \begin{figure} 245 | \centering 246 | \includegraphics[width=\textwidth,height=0.5in]{images/e12.png} 247 | \end{figure} 248 | \end{frame} 249 | 250 | \begin{frame}{Exploit 2} 251 | \begin{figure} 252 | \centering 253 | \includegraphics[width=\textwidth]{images/e21.png} 254 | \end{figure} 255 | \end{frame} 256 | 257 | \begin{frame}{Exploit 3} 258 | 259 | \begin{itemize} 260 | \item Buffer overflows(Stack, Heap) 261 | \item Format string bugs 262 | \item Privilege escalation 263 | \item Unix 264 | \item Virtual machines 265 | \end{itemize} 266 | 267 | \end{frame} 268 | 269 | \subsection{Programming} 270 | 271 | \begin{frame}{Programming 1} 272 | \begin{figure} 273 | \centering 274 | \includegraphics[width=\textwidth]{images/p11.png} 275 | \end{figure} 276 | \end{frame} 277 | 278 | \begin{frame}{Programming 1} 279 | \begin{figure} 280 | \centering 281 | \includegraphics[width=0.8\textwidth]{images/p12.png} 282 | \end{figure} 283 | \end{frame} 284 | 285 | \begin{frame}{Programming 2} 286 | \begin{figure} 287 | \centering 288 | \includegraphics[width=0.8\textwidth,height=3in]{images/p21.png} 289 | \end{figure} 290 | \end{frame} 291 | 292 | \begin{frame}{Programming 3} 293 | \begin{figure} 294 | \centering 295 | \includegraphics[width=\textwidth]{images/p31.png} 296 | \end{figure} 297 | \end{frame} 298 | 299 | \begin{frame}{Programming 4} 300 | 301 | \begin{itemize} 302 | \item Computer science 303 | \item QR code, barcode 304 | \item Video manipulation 305 | \item Audio processing 306 | \end{itemize} 307 | 308 | \end{frame} 309 | 310 | \subsection{Reverse} 311 | 312 | \begin{frame}{Reverse 1} 313 | \begin{figure} 314 | \centering 315 | \includegraphics[height=2.8in]{images/r11.png} 316 | \end{figure} 317 | \end{frame} 318 | 319 | \begin{frame}{Reverse 1} 320 | \begin{figure} 321 | \centering 322 | \includegraphics[width=\textwidth]{images/r12.png} 323 | \end{figure} 324 | \end{frame} 325 | 326 | \begin{frame}{Reverse 2} 327 | \begin{figure} 328 | \centering 329 | \includegraphics[width=\textwidth]{images/r21.png} 330 | \end{figure} 331 | \end{frame} 332 | 333 | \begin{frame}{Reverse 3} 334 | 335 | \begin{itemize} 336 | \item Windows applications 337 | \item Anti-debugging, anti-reversing 338 | \item Obfuscate 339 | \item Estoric languages 340 | \end{itemize} 341 | 342 | \end{frame} 343 | 344 | \subsection{Stego} 345 | 346 | \begin{frame}{Stego 1} 347 | \begin{figure} 348 | \centering 349 | \includegraphics[width=\textwidth,height=2.5in]{images/s11.png} 350 | \end{figure} 351 | \end{frame} 352 | 353 | \begin{frame}{Stego 2} 354 | 355 | \begin{itemize} 356 | \item Steghide, outguess 357 | \item LSB 358 | \item Color, brigthness 359 | \item Audio 360 | \item Linguistic steganography 361 | \end{itemize} 362 | 363 | \end{frame} 364 | 365 | \subsection{Web} 366 | 367 | \begin{frame}{Web} 368 | 369 | \begin{itemize} 370 | \item NoSql injection 371 | \item PHP exploit 372 | \item Python micro web frameworks 373 | \item Perl-cgi exploit 374 | \item Shelshock 375 | \item Hearthbleed 376 | \end{itemize} 377 | 378 | \end{frame} 379 | 380 | \subsection{Mobil} 381 | 382 | \begin{frame}{Mobil} 383 | 384 | \begin{itemize} 385 | \item APK decompile 386 | \item IOS forensic 387 | \item Android kernel exploitation 388 | \end{itemize} 389 | 390 | \end{frame} 391 | 392 | \section{Etkinlikler} 393 | 394 | \begin{frame}{Türkiye?} 395 | 396 | \subsection{Türkiye} 397 | 398 | \begin{itemize} 399 | \item Sibermeydan 400 | \item Hackmetu 401 | \item Kızımız Pek Hacker 402 | \item Hack2Net 403 | \item Dünyayı Kurtaran Hacker 404 | \end{itemize} 405 | 406 | \end{frame} 407 | 408 | \subsection{Yurtdışı} 409 | 410 | \begin{frame}{Yurtdışı?} 411 | 412 | \begin{itemize} 413 | \item Ghost in the Shellcode 414 | \item RuCTF 415 | \item PlaidCTF 416 | \item 9447 417 | \item Seccon 418 | \item Boston Key Party CTF 419 | \item HackIM 420 | \end{itemize} 421 | 422 | \end{frame} 423 | 424 | \subsection{Wargames} 425 | 426 | \begin{frame}{Hazırlık?} 427 | 428 | \begin{itemize} 429 | \item http://www.smashthestack.org/ 430 | \item http://www.overthewire.org/wargames/ 431 | \item http://www.hackthissite.org/ 432 | \item http://exploit-exercises.com/ 433 | \item http://vulnhub.com/ 434 | \item http://computer-forensics.sans.org/community/challenges 435 | \item http://hax.tor.hu/ 436 | \item https://pwn0.com/ 437 | \item http://www.damnvulnerablelinux.org/ 438 | \item http://www.ethicalhack3r.co.uk/damn-vulnerable-web-app/ 439 | \end{itemize} 440 | \end{frame} 441 | 442 | \section{Referans} 443 | 444 | \subsection{Diğerleri} 445 | 446 | \begin{frame}{Geri Kalanlar} 447 | 448 | \begin{itemize} 449 | \item http://www.smashthestack.org/ 450 | \item http://trailofbits.github.io/ctf/ 451 | \item http://captf.com/practice-ctf/ 452 | \item http://captf.com/ 453 | \item http://ftp.hackerdom.ru/ctf-images/ 454 | \item http://shell-storm.org/repo/CTF/ 455 | \item https://ctftime.org 456 | \item http://clist.by/ 457 | \end{itemize} 458 | \end{frame} 459 | 460 | \begin{frame}{Son} 461 | Sunumu kaynak kodları ile beraber Github adresimde bulabilirsiniz. 462 | \begin{itemize} 463 | \item \url{github.com/halitalptekin} 464 | \item \url{twitter.com/halitalptekin} 465 | \item \url{info@halitalptekin.com} 466 | \end{itemize} 467 | \end{frame} 468 | 469 | \end{document} --------------------------------------------------------------------------------