- 142
- 188 512
VirginiaCyberRange
United States
Приєднався 4 гру 2017
The Virginia Cyber Range is a Commonwealth of Virginia initiative with a mission to enhance cybersecurity education for students in Virginia's public high schools, colleges, and universities.
CyberPatriot: Using Using CyberRange VMs + CloudCTF for CyberPatriot Practice
Are you looking for a little more advanced VM based challenges for your high school students? CyberPatriot is a great, state and national competition that challenges students to learn how to secure and harden both Windows and Linux hosts, and then brings them together for annual state and national competitions!
The CyberPatriot is a great program, but it requires pretty beefy PCs, capable computer lab, or laptops to run VMWare based images to operate on. This puts low income/resourced schools at a disadvantage, and as more schools are moving to google chromebooks, also makes it impossible for many schools to even compete without a dedicated computer lab that can offer these types of computer resources.
This is why we created this video, and these Cyber Range based resources for teachers wanting to take their students to the next level with Cyber Patriot. This 1hr+ video shows you a Windows+Linux VM environment we created on the web-based Cyber Range, along with a competitive Capture the Flag game preloaded with CP-like challenge library, along with VM artifacts and activities to step students through the types of host discovery and hardening challenges that you will encounter in the real Cyber Patriot competition. All without messing with VMWare downloads and beefy hardware needed for the real Cyber Patriot event.
T.Weeks steps you through getting set up with this unpublished environment that's becoming more and more popular with HS teachers wanting to get their kids into CyberPatriot.. and then talks about how to make your OWN custom images with artifacts and challenges.
The CyberPatriot is a great program, but it requires pretty beefy PCs, capable computer lab, or laptops to run VMWare based images to operate on. This puts low income/resourced schools at a disadvantage, and as more schools are moving to google chromebooks, also makes it impossible for many schools to even compete without a dedicated computer lab that can offer these types of computer resources.
This is why we created this video, and these Cyber Range based resources for teachers wanting to take their students to the next level with Cyber Patriot. This 1hr+ video shows you a Windows+Linux VM environment we created on the web-based Cyber Range, along with a competitive Capture the Flag game preloaded with CP-like challenge library, along with VM artifacts and activities to step students through the types of host discovery and hardening challenges that you will encounter in the real Cyber Patriot competition. All without messing with VMWare downloads and beefy hardware needed for the real Cyber Patriot event.
T.Weeks steps you through getting set up with this unpublished environment that's becoming more and more popular with HS teachers wanting to get their kids into CyberPatriot.. and then talks about how to make your OWN custom images with artifacts and challenges.
Переглядів: 353
Відео
Cybersecurity Career Week CTF Workshop
Переглядів 653Рік тому
We introduce different types of CTF competitions, focusing on Jeopardy-style CTFs. This CTF will include challenges aligned with the categories from the NICE Workforce Framework for Cybersecurity. Challenges are appropriate for a range of participants, including introductory challenges.
Networking Interfaces
Переглядів 574Рік тому
This video lesson will demonstrate how to use Linux commands to view the network interface information.
Parsing Text Files
Переглядів 184Рік тому
In this video, learn how to use Linux commands to view a file from the command line interface.
Processing Text Files
Переглядів 63Рік тому
The purpose of this video is to introduce the basics of viewing and parsing text files on a Linux system.
Using Vi part 3
Переглядів 56Рік тому
In this lesson, learn how to use the Vi text editor on a Linux system and understand the use of vi to edit text files.
Using Vi part 2
Переглядів 41Рік тому
In this lesson, learn how to use the Vi text editor on a Linux system. We will go over the basics of moving around a file in vi.
Intro to vi text editor (continued)
Переглядів 122Рік тому
Continue to understand the basic use of the Vi text editor.
Intro to vi text editor
Переглядів 193Рік тому
In this workshop we'll show you how to use the Vi text editor on a Linux system.
Intro to Command Line Interface using Nano
Переглядів 94Рік тому
In this lesson, learn how to use the Nano text editor on a Linux system.
Network and Host Scanning using nmap on Kali Linux
Переглядів 2,6 тис.Рік тому
This week we discuss how to do Network/Host Scanning using nmap. We'll go over port scanning ethics 101; How to scoping a network size (CIDR notation); Ping scans vs port scans; Useful command line options; Integration with scripts & other tools.
Linux Command Line tricks & tips using regular expressions & POSIX tools
Переглядів 278Рік тому
Linux Command Line tricks & tips using regular expressions & POSIX tools
Introduction to reverse engineering CTF challenges
Переглядів 14 тис.Рік тому
Introduction to reverse engineering CTF challenges
Introduction to Reconnaissance Challenges
Переглядів 1 тис.Рік тому
Introduction to Reconnaissance Challenges
Introduction to Cryptography Challenges
Переглядів 1,1 тис.Рік тому
Introduction to Cryptography Challenges
Basic tips for solving CTF challenges
Переглядів 3,4 тис.Рік тому
Basic tips for solving CTF challenges
Hosting capture-the-flag events with CloudCTF
Переглядів 323Рік тому
Hosting capture-the-flag events with CloudCTF
Introduction to capture-the-flag and the CloudCTF platform
Переглядів 307Рік тому
Introduction to capture-the-flag and the CloudCTF platform
2022 Virginia Cyber Signing Day Highlights
Переглядів 722 роки тому
2022 Virginia Cyber Signing Day Highlights
Tell Your Story Series #4: Michael Onda
Переглядів 912 роки тому
Tell Your Story Series #4: Michael Onda
Tell Your Story Series #3: Gerald "Gerry" Martin
Переглядів 1242 роки тому
Tell Your Story Series #3: Gerald "Gerry" Martin
Tell Your Story Series #2: Dana Painter
Переглядів 893 роки тому
Tell Your Story Series #2: Dana Painter
Come on, such an off-topic tutorial!
Tolong di artikan dalam bahasa indo pak supaya mudah di mengerti
Amazing series.
Very impresive video
The follow up on solving challenges related to: "Linux Command Line tricks & tips using regular expressions & POSIX tools" - ua-cam.com/video/tz9GOLFbhig/v-deo.html "Network and Host Scanning using nmap on Kali Linux" - ua-cam.com/video/69emRb7Jvm0/v-deo.html
Great talk
Can I please get an invitation code. Am interested in the program
Invitation/registration codes are for specific courses (offered by specific teachers) and only last for a couple of weeks. This is just a demo video. If you live in Virginia and a part of a public school, then talk to your school/instructor about getting your class a free account on the Cyber Range. If you're outside of Virginia, then reach out to usCyberRnage.org about setting up a paid account with us.
Code isn't working mam
how to register sir ? i need a code from trainer/facilitators to fill registration form. please let me know, thank you
If you do not live in Virginia.. then contact the USCyberRange.org on purchasing services.
If the program is python based exe, and which function should I find first for find password checking function sir ?
Much of the computer architectures knowledge can be obtained by specific UA-cam videos. However there was no playlist so it took a while to learn. Also, it’s recommended to do an assembly course.
do you have any recomendation about some asm course for free? thanks
@ I learnt from UA-cam videos and reading textbooks. Practical Malware Analysis textbook, and Ghidra book textbook. But I think I would recommend to find some course on Udemy too. Also, before starting this make sure you know C programming.
@@anntakamaki1960 yes right now i'm still learing cpp from yt channel Bro Code, next ill read those text book, thanks man appreciate it😁
But this is not 'vi', it's 'vim', right?
vi IS vim... $ which vi /usr/bin/vi $ ls -la /usr/bin/vi lrwxrwxrwx 1 root root 20 Sep 15 2022 /usr/bin/vi -> /etc/alternatives/vi $ ls -la /etc/alternatives/vi lrwxrwxrwx 1 root root 17 Sep 15 2022 /etc/alternatives/vi -> /usr/bin/vim.tiny
OK, got it@@VirginiaCyberRange 🙂 I always thought that 'vi' meant the original 'ex' editor in visual mode. But fully understand your point. It's more that all trainings nowadays seems to use the name 'vim' and not 'vi'. Thanks for answering me and best of luck. /ben
@@benarcher372 Yeah.. vi is still a real (separate) project on other UN*Xes.. but on all modern UN*X clones.. vim/vi/nvim is the standard. There's a deep and confusion hisotry of vim/nvim, vi and ex though.. see here: vi.stackexchange.com/questions/341/what-is-the-relation-between-vi-nvi-and-vim Short of it.. if you're an IT professional who works on Linux/UN*X systems, you need to know basic vi syntax. If you paid to ressurect dead system or fix off line systems with failed RAID arrays or the like.. or even cloud VMs in console single user mode.. and all you have the default system editor (vi/vim).. then you better be ableto do your job and not have to have some easy or convenient tool like nano, pico or <gag> EMACS.
yall are probably not gonna read this, but i appreciate the videos, im going through and watching the CTF series
Thank you😍
How we know gold number for deep seeker 3d which number gold or diamond
😞 *Promo SM*
am shocked with views count 💀 this video deserves over a million views & likes 🤷♂🤷♂ but I think there are very less people in digital forensics
"Program seems to be broken and illogical and we forgot the missing number. Can you find the missing number for us".... This is the challenge in ctf. What is the flag for it??
HELLO, Sir please i would like to join your course. I have sent you an emails but to no reply. thank you
Hey Diana! So if you're a student in the state of VA, then speak with your instructor or faculty member who has a Cyber Range account and they can invite you to a course. The course above was just a demo course from 2019. If you're in VA, and none of your faculty have access to the Cyber Range, just apply for a free account here, and click "Sign Up": www.virginiacyberrange.org/ If you're not a VA faculty educator, then all other states and orgs need to apply through the US Cyber Range here: www.uscyberrange.org/ Either system, schools and educators apply, and send course invites out to students. Students never directly "sign up" at the Range without an educator inviting them. More information on this is here: kb.uscyberrange.org/faq/us-what-is-cyber-range.html Cheers! T.Weeks Cyber Range Engineer
I've learnt cybersecurity from a lot of courses and obtained few certifications too. But still ain't getting job
@15:40 IMAP is not used to send, only to check and retrieve email. The Email Sender is always using SMTP to send email to the MTA
Traditionally... yes.. SMTP is for "Transferring" email.. and POP/IMAP is for accessing/reading email (though I hope no one is still using POP), though there are some IMAP-sending custom services out there (www.courier-mta.org/imap/INSTALL.html#imapsend).. But yes.. looking at email headers, you're going to be diagnosing SMTP servers, DNS, filtering, etc.
Ahh.. I see the confusion. His network diagram is not the greatest. It shows the client accessing the email via webmail, and he has it listed as "IMAP/HTTP" (or webmail).. which is mainly talking IMAP (between the webclient and the mail server) and mainly HTTP to the physical client/browser. Sending email (from a web client) is using HTTP to compose and click send), and then it goes out by SMTP. I think he's also confused bc he's mixing IMAP and Outlook/Exchange, which uses MAPI over HTTP (docs.microsoft.com/en-us/Exchange/clients/mapi-over-http/mapi-over-http?view=exchserver-2019) which CAN both send and receive messages.. but still sends outside itself via SMTP (unless talking to other systems in its own Exchange site).
She must be such an awesome teacher to have! The energy, enthusiasm and humor she is giving this lecture with is really engaging and captivating. It's not often that I watch a 45 min lecture on something in one go, without my mind wandering off! Some of my university teachers could learn a thing or two from her!
bravo
Video starts at 28:50
Very simplified and helpful explanation, thank you Mr. David !
Hello How are you Good Information you delivered
Crack me if you can! Reverse engineering answer pls
❤️
Thank you for uploading this!
We have tons more content.. Let us know if there's anything you would like covered.
Challenge begins at 42:58
lol
@@luizandre12345 the presenter is a massive time waster. If he called the UA-cam video "lecture on..." would have at least been more accurate (i.e know what to expect). So glad he is not my university lecturer, seriously would not watch any of his lectures, after seeing how he conducts the first one.
😂😂 LOL.. Thanks bro, You saved my night...😑❤
thanks man lol
For more info on our new Cloud CTF offering, see here: kb.virginiacyberrange.org/cloud-ctf.html
What's the link for this CTF?
Each CTF is different.. and they usually have a specific start and stop date (like a hack-a-thon). After a CTF ends.. we usually keep the final scoreboard up so teachers and participants can show bragging rights. Fore more info on getting your own CTF set up.. see: kb.virginiacyberrange.org/cloud-ctf.html
This is AWESOME!!!!
Fist one to see and like😎
Tq sir
I love your Data Encapsulation slide Dave.. that's the best, functional diagram of http flowing through the stack I've ever seen. :) Tweeks