HackingAway.org Simulations and Hacker Competitions
Our events are geared at one of two audiences:
- CAMS events (less technical) are aimed at Consultants, Auditors, Managers and Students.
- SNAP events (more technical) are geared for System and Network Administrators or Programmers
1.) Prerequisites for CAMS Events – Less Technical
Consultants, Auditors, Managers and Students
Most of our events are for people in non-technical roles such consultants, auditors, managers and students in non-technical programs. All the people who register for our events would consider themselves at least “tech-savvy” meaning they enjoy learning about computing, networking and IT Security. They are comfortable with a keyboard.
Not Qualified
If any one of the following applies to you, you may not be a good candidate for any of our events:
- Hate computers. Can’t type. Never heard of TCP/IP.
- Can’t imagine what these commands might do:
- cd /home/smith; rm *.doc; echo “gotcha!” > anonymous_was_here.txt
- Even using hand-outs and hints during the session, you would not be comfortable trying to understand such commands, and applying them immediately to meet short, specific objectives.
Well Qualified
If any of these applies to you, you’re going to fit right in and really enjoy the event:
- You work in IT security in a non-technical role and are anxious to try some hands-on. You are not afraid to learn a few simple command-line tools. You know exactly what a TCP/IP addresses looks like. Using short hand-outs and hints, you could put together a command line accurately.
- Worked in a technical role in the past and not afraid to get a refresh on a few simple command-line tools. Plus, you know what a TCP/IP address looks like.
- Currently or recently worked as system or network admin, or maybe as a software developer, but you are not a security expert.
Over Qualified
If any of these applies to you, you should consider one of our more advanced SNAP events:
- You are already a super Ninja hacker dude/dudette.
- You are already a master of several of the following: Nmap, Nessus, Metasploit, ssh keygen, ifconfig, route add, bind files, SQL injection, XSS
- You are personal friends with HD Moore.
- NOTE: On the other hand, if you have only touched on one or two of the above and are anxious to try the others in a realistic, hands-on environment then you’re going to love this event. (Automatic friendship with HD not guaranteed, but your chances will improve.)
Edge Cases
Some attendees in past events have been highly experienced system or network administrators who are wizards at the keyboard and can install Windows and Linux software in their sleep. They came our session to learn how hackers operate so they could better defend their assets. We found:
- These tech experts did get a lot out of the event if they enjoyed working in a team and mentoring others. The session leader and some of their team members were able to teach them IT security, and in return these tech experts patiently explained some of the technical commands they were using.
If that type of interaction does not appeal to you, then you should register instead at one of our more technical SNAP events geared specifically for system and network admins.
Students: while most students fit well with the Consultants, Auditors and Managers, if you are a student who already excels in Linux, networking, and some IT security tools, then you may prefer our more advanced system and network administrator sessions instead.
2.) Prerequisites for SNAP Events –More Technical
System and Network Administrators or Programmers
Under Qualified
If you have never worked as a system or network administrator, or as a software developer – whether professionally or in your spare time – then you should register for one of our CAMS events instead. They are very similar, but geared to a less technically experienced audience.
Well Qualified
If any of these applies to you, you’re going to fit right in and really enjoy the event:
- You are comfortable typing at the CLI (Linux, PowerShell, IOS, or even DOS) and you understand what an IP, netmask and gateway address are for on Windows, Linux, or other systems.
- You might have tried using Metasploit or other security tools on your own, but are not an expert and would like to understand them better.
- You are a software developer, maybe a web developer, but not a sys admin. Still you are confident you can manage a few command-line tools and understand enough networking to keep up with the sys admins at the event.
NOTE: These events focus on operating system, network and some web app attacks. We do not do application software inspection or modification, nor reverse engineering.
Over Qualified
If you are already a super Ninja hacker dude/dudette then you will still not find this event challenging.
- It is not a rootin’ tootin’ six-gun-shootin’ wild west capture-the-flag event. Instead, participants are led through specific steps in a guided fashion and we pause to make sure no team is left behind. We even take a moment here-and-there to talk about real-world scenarios and defences.
- We’ll be learning only basic command options in Metasploit, nmap, dig, ncrack, sql select, net use, route add, Meterpreter, etc.
If you’ve already done a lot of penetration testing or CTF events then you will find this pace too slow and the concepts too familiar. Maybe even totally lame.