From c906b7f246cab84b893e97cad1c9efaa00f59e9d Mon Sep 17 00:00:00 2001 From: stephensottosanti Date: Fri, 5 Feb 2021 17:48:06 -0600 Subject: [PATCH] changes to stuff --- .../318feea7cf1545feb4dcfd711f64b263.png | Bin .../CTF => CTF}/Binary_Exploitation/README.md | 0 .../CTF => CTF}/Cryptography/README.md | 0 .../CTF => CTF}/Forensics/README.md | 0 {Competition_Team/CTF => CTF}/README.md | 0 .../CTF => CTF}/Reverse_Engineering/README.md | 0 .../CTF => CTF}/Web_Exploitation/README.md | 0 Competition_Team/0_Where_To_Start/README.md | 1 - Competition_Team/README.md | 26 -------------- Crimson_Defense_H@ckers/README.md | 22 ++++++++++++ Dark Web/README.md | 0 Dark_Web/README.md | 26 ++++++++++++++ {Dark Web => Dark_Web}/darkweb.txt | 0 README.md | 34 ++++++++++++++++-- .../2020 SECCDQC TeamPack_DRAFT.pdf | Bin .../Palo_Alto_Training_Materials.pdf | Bin .../Preparing_for_the_CCDC.pdf | Bin .../SECCDC_Prep => SECCDC}/pan-os-admin.pdf | Bin TOTW/README.md | 2 +- 19 files changed, 81 insertions(+), 30 deletions(-) rename {Archive => 00_Archive}/images/318feea7cf1545feb4dcfd711f64b263.png (100%) rename {Competition_Team/CTF => CTF}/Binary_Exploitation/README.md (100%) rename {Competition_Team/CTF => CTF}/Cryptography/README.md (100%) rename {Competition_Team/CTF => CTF}/Forensics/README.md (100%) rename {Competition_Team/CTF => CTF}/README.md (100%) rename {Competition_Team/CTF => CTF}/Reverse_Engineering/README.md (100%) rename {Competition_Team/CTF => CTF}/Web_Exploitation/README.md (100%) delete mode 100644 Competition_Team/0_Where_To_Start/README.md delete mode 100644 Competition_Team/README.md create mode 100644 Crimson_Defense_H@ckers/README.md delete mode 100644 Dark Web/README.md create mode 100644 Dark_Web/README.md rename {Dark Web => Dark_Web}/darkweb.txt (100%) rename {Competition_Team/SECCDC_Prep => SECCDC}/2020 SECCDQC TeamPack_DRAFT.pdf (100%) rename {Competition_Team/SECCDC_Prep => SECCDC}/Palo_Alto_Training_Materials.pdf (100%) rename {Competition_Team/SECCDC_Prep => SECCDC}/Preparing_for_the_CCDC.pdf (100%) rename {Competition_Team/SECCDC_Prep => SECCDC}/pan-os-admin.pdf (100%) diff --git a/Archive/images/318feea7cf1545feb4dcfd711f64b263.png b/00_Archive/images/318feea7cf1545feb4dcfd711f64b263.png similarity index 100% rename from Archive/images/318feea7cf1545feb4dcfd711f64b263.png rename to 00_Archive/images/318feea7cf1545feb4dcfd711f64b263.png diff --git a/Competition_Team/CTF/Binary_Exploitation/README.md b/CTF/Binary_Exploitation/README.md similarity index 100% rename from Competition_Team/CTF/Binary_Exploitation/README.md rename to CTF/Binary_Exploitation/README.md diff --git a/Competition_Team/CTF/Cryptography/README.md b/CTF/Cryptography/README.md similarity index 100% rename from Competition_Team/CTF/Cryptography/README.md rename to CTF/Cryptography/README.md diff --git a/Competition_Team/CTF/Forensics/README.md b/CTF/Forensics/README.md similarity index 100% rename from Competition_Team/CTF/Forensics/README.md rename to CTF/Forensics/README.md diff --git a/Competition_Team/CTF/README.md b/CTF/README.md similarity index 100% rename from Competition_Team/CTF/README.md rename to CTF/README.md diff --git a/Competition_Team/CTF/Reverse_Engineering/README.md b/CTF/Reverse_Engineering/README.md similarity index 100% rename from Competition_Team/CTF/Reverse_Engineering/README.md rename to CTF/Reverse_Engineering/README.md diff --git a/Competition_Team/CTF/Web_Exploitation/README.md b/CTF/Web_Exploitation/README.md similarity index 100% rename from Competition_Team/CTF/Web_Exploitation/README.md rename to CTF/Web_Exploitation/README.md diff --git a/Competition_Team/0_Where_To_Start/README.md b/Competition_Team/0_Where_To_Start/README.md deleted file mode 100644 index f82f58e..0000000 --- a/Competition_Team/0_Where_To_Start/README.md +++ /dev/null @@ -1 +0,0 @@ -# Welcome diff --git a/Competition_Team/README.md b/Competition_Team/README.md deleted file mode 100644 index 29785f3..0000000 --- a/Competition_Team/README.md +++ /dev/null @@ -1,26 +0,0 @@ -# Crimson Cyber Defense Competition Team -Welcome! Everyone from begginer level to advanced are welcome and encouraged to join -the competition team. It is a great opportunity to learn more about cyber security -and really dive deep into what it takes to solve complex cyber security problems. -Here you will find resources on CTFs and other competitions. New to cyber competitions? -Check out the resources within the [Where_to_Start](/Competition_Team/0_Where_to_Start) directory.
- -# Before You Start! -If you are looking to start solving your own challenges and learning about how to compete, -if you do not already have a virtual machine set up to where you can solve these challenges -go ahead and checkout the [kali directory](/Kali_Linux) and follow the instructions on how to set -up your own kali linux virtual machine! - -# CTF -CTF stands for Capture The Flag. If you didn't know, now you know. - -# Tools -Checkout each individual CTF topic's directory and learn more about them and find out -which tools you can be using right now to help you with solving CTF challenges!
- -Different topics you might come across in a CTF event include:
-[Forensics](/Competition_Team/CTF/Forensics)
-[Cryptography](/Competition_Team/CTF/Cryptography)
-[Web Exploitation](/Competition_Team/CTF/Web_Exploitation)
-[Reverse Engineering](/Competition_Team/CTF/Reverse_Engineering)
-[Binary Exploitation](/Competition_Team/CTF/Binary_Exploitation)
diff --git a/Crimson_Defense_H@ckers/README.md b/Crimson_Defense_H@ckers/README.md new file mode 100644 index 0000000..7c4ceb0 --- /dev/null +++ b/Crimson_Defense_H@ckers/README.md @@ -0,0 +1,22 @@ +# Meet the Crimson Defense H@ckers +For a team that lives in the deep dark corners of the dark web, The Crimson Defense H@ckers really do know how to hide. After quite a long time of tracking them down I got them all to give a description of who they are and how they got into hacking. They keep their true identity sacred, so the following information might not be accurate. There is a risk to putting your personal information out on the surface web, especially for an elite security team such as this one. There might be some truth to these but since I can't be certain of it, I'll leave that up for you to decide.
+ +## The Team + +percyKnox
+ + +inspectElement
+I live, laugh, love the web. + +guiltyRemnant
+ +ACHME
+ +AlluringPanda
+ +LOR + +cryptoKiller
+ +pandasPo
\ No newline at end of file diff --git a/Dark Web/README.md b/Dark Web/README.md deleted file mode 100644 index e69de29..0000000 diff --git a/Dark_Web/README.md b/Dark_Web/README.md new file mode 100644 index 0000000..3b0a14b --- /dev/null +++ b/Dark_Web/README.md @@ -0,0 +1,26 @@ +# The Dark Web + +If you were able to attend the meeting in which we talked all about the internet ans the dark web then go ahead and download the resources here that will get you on to the dark web. There is also a text file with .onion URLs that we discussed during the meeting. If you did not attend the meeting then I reccommend you read what is below to get a decent understanding of how all of this works and what it means to access the dark web.
+ +## Resources +Link to download TOR browser:
+[TOR Browser](https://www.torproject.org/)
+
+Link to download TAILS. Follow the instructions on how to verify your downlaod:
+[TAILS](https://tails.boum.org/install/)
+
+For those curious, TAILS will help you become more anonymous if you are trying to be extra careful when on the dark web. I have TOR on my mac and I use it to access the dark web when I'm bored or want to access a specific site with a little more anonymity.
+ +## Google as a Browser +Google sells ads not only on their search engine, but also on over 2.2 million other websites and over 1 million apps. Every time you visit one of these sites or apps, Google is storing that information and using it to target ads at you. A quick alternative can be to switch to Firefox. Firefox keeps very little data on you and blocks third-partie's tracking cookies by default. Firefox is not watching you.
+ +## Google as a Search Engine +Search engines are your second gate keepers to the internet, right after your ISP. Google tweaks what and how results appear on the page, which changes how you think. Average users don't understand just how much google knows about them. It goes against what search engines are made for, providing organic search results. Organic search result is refferring to how all pages are indexed based on the search term and the content of the website alone and they are ranked according to how well these two parameters match.
+ +See for yourself. Go ahead and google "is google manipulating search results" on google.com and then search it again on another search engine such as duckduckgo.com and take a look at the difference. Google places content they want above the organic search results, making you scroll and making it more difficult to get to the organic results.
+ +## Incognito Mode +If you were wondering why ads still follow you around when you are in incognito mode it is because incognito mode only deletes your local search and browsing history, just the content on your computer. Websites, search engines, internet service providers, and governments can still easily track you accross the web.
+ +## Virtual Private Network +VPNs, do you know what they really do? diff --git a/Dark Web/darkweb.txt b/Dark_Web/darkweb.txt similarity index 100% rename from Dark Web/darkweb.txt rename to Dark_Web/darkweb.txt diff --git a/README.md b/README.md index e51bae4..26f016e 100644 --- a/README.md +++ b/README.md @@ -5,7 +5,7 @@ up to advanced individuals who are looking to learn more and advance their skill in every repository as they all contain important information that could help with finding certain resources and getting things set up properly!

-Logo +Logo


Email: crimsonCyberDefense@gmail.com
@@ -13,8 +13,38 @@ in every repository as they all contain important information that could help wi Website: uacrimsondefense.github.io

+## [Meet the Crimson Defense H@ckers](/Crimson_Defense_H@ckers) +The competition team is comprised of individuals motivated and driven to protect the world from any potential exploit or vulnerability. While both focused on hardening systems and pen-testing systems to make sure they are as secure as they can be, the Crimson Defense H@ckers work tirelessly day in and day out. They are an elite security group and there isn't a problem too difficult for them to solve. Head over to the Crimson Defense H@ckers directory and meet the team! + ## [Where do I even start?](/0_Where_To_Start) One of most puzzling things to figure out, especially when trying to start learning about cybersecurity. There is so much to learn, which is one of the reasons why it is so great. But with there being so much information out there it can be hard to figure out where to even begin. This folder will help those brand new to cybersecurity. Individuals who have little to no experience and want to get started but don't know where to go. Hopefully the resources here will help you understand what cybersecurity is all about.

## [I'm new but I'm not brand new, you know?](/1_Beginner) -After learning the basics and having an understanding of what cybersecurity is, it is time to start diving deeper and learning all about the different aspects of cybersecurity. \ No newline at end of file +After learning the basics and having an understanding of what cybersecurity is, it is time to start diving deeper and learning all about the different aspects of cybersecurity.
+ +# Crimson Cyber Defense Competition Team +Welcome! Everyone from begginer level to advanced are welcome and encouraged to join +the competition team. It is a great opportunity to learn more about cyber security +and really dive deep into what it takes to solve complex cyber security problems. +Here you will find resources on CTFs and other competitions. New to cyber competitions? +Check out the resources within the [Where_to_Start](/Competition_Team/0_Where_to_Start) directory.
+ +# Before You Start! +If you are looking to start solving your own challenges and learning about how to compete, +if you do not already have a virtual machine set up to where you can solve these challenges +go ahead and checkout the [kali directory](/Kali_Linux) and follow the instructions on how to set +up your own kali linux virtual machine! + +# CTF +CTF stands for Capture The Flag. If you didn't know, now you know. + +# Tools +Checkout each individual CTF topic's directory and learn more about them and find out +which tools you can be using right now to help you with solving CTF challenges!
+ +Different topics you might come across in a CTF event include:
+[Forensics](/Competition_Team/CTF/Forensics)
+[Cryptography](/Competition_Team/CTF/Cryptography)
+[Web Exploitation](/Competition_Team/CTF/Web_Exploitation)
+[Reverse Engineering](/Competition_Team/CTF/Reverse_Engineering)
+[Binary Exploitation](/Competition_Team/CTF/Binary_Exploitation)
\ No newline at end of file diff --git a/Competition_Team/SECCDC_Prep/2020 SECCDQC TeamPack_DRAFT.pdf b/SECCDC/2020 SECCDQC TeamPack_DRAFT.pdf similarity index 100% rename from Competition_Team/SECCDC_Prep/2020 SECCDQC TeamPack_DRAFT.pdf rename to SECCDC/2020 SECCDQC TeamPack_DRAFT.pdf diff --git a/Competition_Team/SECCDC_Prep/Palo_Alto_Training_Materials.pdf b/SECCDC/Palo_Alto_Training_Materials.pdf similarity index 100% rename from Competition_Team/SECCDC_Prep/Palo_Alto_Training_Materials.pdf rename to SECCDC/Palo_Alto_Training_Materials.pdf diff --git a/Competition_Team/SECCDC_Prep/Preparing_for_the_CCDC.pdf b/SECCDC/Preparing_for_the_CCDC.pdf similarity index 100% rename from Competition_Team/SECCDC_Prep/Preparing_for_the_CCDC.pdf rename to SECCDC/Preparing_for_the_CCDC.pdf diff --git a/Competition_Team/SECCDC_Prep/pan-os-admin.pdf b/SECCDC/pan-os-admin.pdf similarity index 100% rename from Competition_Team/SECCDC_Prep/pan-os-admin.pdf rename to SECCDC/pan-os-admin.pdf diff --git a/TOTW/README.md b/TOTW/README.md index 7b4fe80..2192134 100644 --- a/TOTW/README.md +++ b/TOTW/README.md @@ -5,4 +5,4 @@ Every week someone from the competition team will look into a tool used for solv Meeting on 1/28/21
Nmap
"Using the command ifconfig you can get the rage of your network and once you do that you can then use Nmap to discover other machines. If there is a target machine in the network range, you can use Nmap to discover the machine’s IP address. Similar tools include netdiscover and ARP. Using these two tools first can allow you to narrow down the target machine and you can then use Nmap along with these two commands to get the information you need about the target machine. The command –sS will tell Nmap to look for open ports and services and the command –AT4 looks for OS information, which can tell you a lot about your target machine."
-Percy Knox +percyKnox