preparing for DEF CON@COMROKFLT 2018
May 05, 2018
⏳ 3 min read
Problem
Well, obviously there will be a DEF CON@COMROKFLT about three weeks later. This one will be particular; it is a joint DEF CON between the U.S Navy and the ROK Navy. The paper says koreans and americans will together form several teams. But I do not even know how to use hacking/forensic tools. And I do not know about the type of questions that usually come up for this kind of conference.
Information is everything
So I first started searching on information on previous DEF CONs:
“YESS팀은 침해당한 **Window PC의 VM(가상 이미지)**에 대한 침해사고 분석을 진행해 악성코드가 실행된 시간, 동작과정 등을 분석한 후 침투 시나리오를 작성하는 부분에서 뛰어난 실력을 인정받아 수상의 영광을 안았다.” “침해당한 Window PC의 VM(가상 이미지)에 대한 침해사고 분석을 진행해 악성코드가 실행된 시간, 동작과정 등을 분석한 후 침투 시나리오를 작성하는 부분에서 뛰어난 실력을 인정받아 수상하게 됐다.”
And some other DEF CONS:
- 2013 Whitehat contest
- Codegate 2013 Forensic Write-ups
- KISA 4th DEF CON solved problems
- KISA reversing problem
- [13회 HDCON 해킹방어대회 문제풀이] 사고분석1-1
- HDCON APK problem solving
- HDCON 2014 Preliminary problems
- HDCON 2011
- 2017 Codegate
And I wanted to get some knowledge of digital forensics and hacking in reality (after a long time of.. just trying to get the right info):
- Maware analysis: how to
- Malware Analysis for the Incident Responder
- Malware analysis method by AhnLab
- Malware analysis tools by AhnLab
- A guide to intrusion analysis procedure by KISA
- Malware tracker?
- Practical Malware Analysis by BlackHat
- Intrusion Detection and Malware Analysis: Introduction to Malware
- Curated list of awesome malware analysis tools
- Build malware analysis toolkit
- Book: Practical Malware analysis
- Static analysis
- A guide to detecting software security breaches
- Building a Home Lab to Become a Malware Hunter - A Beginner’s Guide
- An introductory guide into malware analysis
- Digital forensics tools
- File signatures
How could I just learn all these tools in just three weeks…?
First I printed out all the materials I could and then just studied them.