changes to stuff

This commit is contained in:
stephensottosanti
2021-02-05 17:48:06 -06:00
parent 5f0d761467
commit c906b7f246
19 changed files with 81 additions and 30 deletions

View File

Before

Width:  |  Height:  |  Size: 648 KiB

After

Width:  |  Height:  |  Size: 648 KiB

View File

@@ -1 +0,0 @@
# Welcome

View File

@@ -1,26 +0,0 @@
# Crimson Cyber Defense Competition Team
Welcome! Everyone from begginer level to advanced are welcome and encouraged to join
the competition team. It is a great opportunity to learn more about cyber security
and really dive deep into what it takes to solve complex cyber security problems.
Here you will find resources on CTFs and other competitions. New to cyber competitions?
Check out the resources within the [Where_to_Start](/Competition_Team/0_Where_to_Start) directory.<br/>
# Before You Start!
If you are looking to start solving your own challenges and learning about how to compete,
if you do not already have a virtual machine set up to where you can solve these challenges
go ahead and checkout the [kali directory](/Kali_Linux) and follow the instructions on how to set
up your own kali linux virtual machine!
# CTF
CTF stands for Capture The Flag. If you didn't know, now you know.
# Tools
Checkout each individual CTF topic's directory and learn more about them and find out
which tools you can be using right now to help you with solving CTF challenges!<br/>
Different topics you might come across in a CTF event include:<br/>
[Forensics](/Competition_Team/CTF/Forensics)<br/>
[Cryptography](/Competition_Team/CTF/Cryptography)<br/>
[Web Exploitation](/Competition_Team/CTF/Web_Exploitation)<br/>
[Reverse Engineering](/Competition_Team/CTF/Reverse_Engineering)<br/>
[Binary Exploitation](/Competition_Team/CTF/Binary_Exploitation)<br/>

View File

@@ -0,0 +1,22 @@
# Meet the Crimson Defense H@ckers
For a team that lives in the deep dark corners of the dark web, The Crimson Defense H@ckers really do know how to hide. After quite a long time of tracking them down I got them all to give a description of who they are and how they got into hacking. They keep their true identity sacred, so the following information might not be accurate. There is a risk to putting your personal information out on the surface web, especially for an elite security team such as this one. There might be some truth to these but since I can't be certain of it, I'll leave that up for you to decide. <br>
## The Team
<b>percyKnox</b> <br>
<b>inspectElement</b><br>
I live, laugh, love the web.
<b>guiltyRemnant</b><br>
<b>ACHME</b><br>
<b>AlluringPanda</b><br>
<b>LOR</b><b>
<b>cryptoKiller</b><br>
<b>pandasPo</b><br>

View File

26
Dark_Web/README.md Normal file
View File

@@ -0,0 +1,26 @@
# The Dark Web
If you were able to attend the meeting in which we talked all about the internet ans the dark web then go ahead and download the resources here that will get you on to the dark web. There is also a text file with .onion URLs that we discussed during the meeting. If you did not attend the meeting then I reccommend you read what is below to get a decent understanding of how all of this works and what it means to access the dark web. <br>
## Resources
Link to download TOR browser:<br>
[TOR Browser](https://www.torproject.org/)<br>
<br>
Link to download TAILS. Follow the instructions on how to verify your downlaod:<br>
[TAILS](https://tails.boum.org/install/)<br>
<br>
For those curious, TAILS will help you become more anonymous if you are trying to be extra careful when on the dark web. I have TOR on my mac and I use it to access the dark web when I'm bored or want to access a specific site with a little more anonymity. <br>
## Google as a Browser
Google sells ads not only on their search engine, but also on over 2.2 million other websites and over 1 million apps. Every time you visit one of these sites or apps, Google is storing that information and using it to target ads at you. A quick alternative can be to switch to Firefox. Firefox keeps very little data on you and blocks third-partie's tracking cookies by default. Firefox is not watching you. <br>
## Google as a Search Engine
Search engines are your second gate keepers to the internet, right after your ISP. Google tweaks what and how results appear on the page, which changes how you think. Average users don't understand just how much google knows about them. It goes against what search engines are made for, providing organic search results. Organic search result is refferring to how all pages are indexed based on the search term and the content of the website alone and they are ranked according to how well these two parameters match. <br>
See for yourself. Go ahead and google "is google manipulating search results" on google.com and then search it again on another search engine such as duckduckgo.com and take a look at the difference. Google places content they want above the organic search results, making you scroll and making it more difficult to get to the organic results. <br>
## Incognito Mode
If you were wondering why ads still follow you around when you are in incognito mode it is because incognito mode only deletes your local search and browsing history, just the content on your computer. Websites, search engines, internet service providers, and governments can still easily track you accross the web. <br>
## Virtual Private Network
VPNs, do you know what they really do?

View File

@@ -5,7 +5,7 @@ up to advanced individuals who are looking to learn more and advance their skill
in every repository as they all contain important information that could help with finding certain resources and getting things set up properly!
<p align="center">
<img width="350px" src="Archive/images/318feea7cf1545feb4dcfd711f64b263.png" alt="Logo"/>
<img width="350px" src="00_Archive/images/318feea7cf1545feb4dcfd711f64b263.png" alt="Logo"/>
</p>
<br>
<b>Email:</b> crimsonCyberDefense@gmail.com <br>
@@ -13,8 +13,38 @@ in every repository as they all contain important information that could help wi
<b>Website:</b> uacrimsondefense.github.io<br>
<br>
## [Meet the Crimson Defense H@ckers](/Crimson_Defense_H@ckers)
The competition team is comprised of individuals motivated and driven to protect the world from any potential exploit or vulnerability. While both focused on hardening systems and pen-testing systems to make sure they are as secure as they can be, the Crimson Defense H@ckers work tirelessly day in and day out. They are an elite security group and there isn't a problem too difficult for them to solve. Head over to the Crimson Defense H@ckers directory and meet the team!
## [Where do I even start?](/0_Where_To_Start)
One of most puzzling things to figure out, especially when trying to start learning about cybersecurity. There is so much to learn, which is one of the reasons why it is so great. But with there being so much information out there it can be hard to figure out where to even begin. This folder will help those brand new to cybersecurity. Individuals who have little to no experience and want to get started but don't know where to go. Hopefully the resources here will help you understand what cybersecurity is all about.<br><br>
## [I'm new but I'm not brand new, you know?](/1_Beginner)
After learning the basics and having an understanding of what cybersecurity is, it is time to start diving deeper and learning all about the different aspects of cybersecurity.
After learning the basics and having an understanding of what cybersecurity is, it is time to start diving deeper and learning all about the different aspects of cybersecurity.<br>
# Crimson Cyber Defense Competition Team
Welcome! Everyone from begginer level to advanced are welcome and encouraged to join
the competition team. It is a great opportunity to learn more about cyber security
and really dive deep into what it takes to solve complex cyber security problems.
Here you will find resources on CTFs and other competitions. New to cyber competitions?
Check out the resources within the [Where_to_Start](/Competition_Team/0_Where_to_Start) directory.<br/>
# Before You Start!
If you are looking to start solving your own challenges and learning about how to compete,
if you do not already have a virtual machine set up to where you can solve these challenges
go ahead and checkout the [kali directory](/Kali_Linux) and follow the instructions on how to set
up your own kali linux virtual machine!
# CTF
CTF stands for Capture The Flag. If you didn't know, now you know.
# Tools
Checkout each individual CTF topic's directory and learn more about them and find out
which tools you can be using right now to help you with solving CTF challenges!<br/>
Different topics you might come across in a CTF event include:<br/>
[Forensics](/Competition_Team/CTF/Forensics)<br/>
[Cryptography](/Competition_Team/CTF/Cryptography)<br/>
[Web Exploitation](/Competition_Team/CTF/Web_Exploitation)<br/>
[Reverse Engineering](/Competition_Team/CTF/Reverse_Engineering)<br/>
[Binary Exploitation](/Competition_Team/CTF/Binary_Exploitation)<br/>

View File

@@ -5,4 +5,4 @@ Every week someone from the competition team will look into a tool used for solv
Meeting on 1/28/21 <br>
<b>Nmap</b> <br>
"Using the command ifconfig you can get the rage of your network and once you do that you can then use Nmap to discover other machines. If there is a target machine in the network range, you can use Nmap to discover the machines IP address. Similar tools include netdiscover and ARP. Using these two tools first can allow you to narrow down the target machine and you can then use Nmap along with these two commands to get the information you need about the target machine. The command sS will tell Nmap to look for open ports and services and the command AT4 looks for OS information, which can tell you a lot about your target machine." <br>
<b>Percy Knox</b>
<b>percyKnox</b>