{"id":1360,"date":"2024-12-03T09:34:46","date_gmt":"2024-12-03T14:34:46","guid":{"rendered":"https:\/\/studentorgs.syr.edu\/isc\/?p=1360"},"modified":"2024-12-03T09:34:46","modified_gmt":"2024-12-03T14:34:46","slug":"november-19-meeting-recap","status":"publish","type":"post","link":"https:\/\/studentorgs.syr.edu\/isc\/2024\/12\/03\/november-19-meeting-recap\/","title":{"rendered":"November 19 Meeting Recap"},"content":{"rendered":"<p><strong>Written by Jason Riek<\/strong><\/p>\n<p><span style=\"font-weight: 400\">The Syracuse Information Security Club held a workshop on November 19, led by Vice President Gianna Voce. The meeting focused on a hands-on cybersecurity challenge called &#8220;World of Bills&#8221; from the NCAE Cyber Games. Here&#8217;s a recap of the key points covered:<\/span><\/p>\n<h2><span style=\"font-weight: 400\">Announcements<\/span><\/h2>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">No meeting scheduled for the following week due to Thanksgiving break<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Brief recap of the CNY Hackathon<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400\">Challenge Overview<\/span><\/h2>\n<p><span style=\"font-weight: 400\">Objective: Participants were tasked with taking over Bill&#8217;s server and fixing various issues. This exercise aimed to develop Linux administration and command-line skills, which are fundamental for more advanced cybersecurity concepts and NCAE preparation.<\/span><\/p>\n<h2><span style=\"font-weight: 400\">Challenge Access and Setup<\/span><\/h2>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Participants accessed the challenge through the NCAE Cyber Games website<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">They were instructed to use the BILL-Client-v2-PRQD virtual machine<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Login credentials: username &#8220;bill&#8221; and password &#8220;password&#8221;<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400\">Initial Tasks<\/span><\/h2>\n<ol>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Locate the cyberuser#.txt file in the home directory (possibly hidden)<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Find the assigned IP address using the &#8220;ip a&#8221; command<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ping 172.19.0.1 to verify server connectivity<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Use curl to access the challenge instructions webpage<\/span><\/li>\n<\/ol>\n<h2><span style=\"font-weight: 400\">Additional Activities<\/span><\/h2>\n<p><span style=\"font-weight: 400\">The workshop included multiple activities focusing on:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Changing IP addresses in Linux<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Adding sudo users<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Working with Linux nologin<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Potential bash scripting for efficiency<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400\">Resources Provided<\/span><\/h2>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Background video for context<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Instructions for accessing activity details<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Subnet Mask Reference Sheet for IP-related tasks<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400\">Conclusion<\/span><\/h2>\n<p><span style=\"font-weight: 400\">The workshop provided hands-on experience with Linux systems and network configurations, emphasizing the importance of foundational skills in cybersecurity. Participants were encouraged to complete as many tasks as possible during the meeting.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Written by Jason Riek The Syracuse Information Security Club held a workshop on November 19, led by Vice President Gianna Voce. The meeting focused on a hands-on cybersecurity challenge called &#8220;World of Bills&#8221; from the NCAE Cyber Games. Here&#8217;s a recap of the key points covered: Announcements No meeting scheduled for the following week due&hellip;<\/p>\n","protected":false},"author":301,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1360","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"_links":{"self":[{"href":"https:\/\/studentorgs.syr.edu\/isc\/wp-json\/wp\/v2\/posts\/1360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/studentorgs.syr.edu\/isc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/studentorgs.syr.edu\/isc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/studentorgs.syr.edu\/isc\/wp-json\/wp\/v2\/users\/301"}],"replies":[{"embeddable":true,"href":"https:\/\/studentorgs.syr.edu\/isc\/wp-json\/wp\/v2\/comments?post=1360"}],"version-history":[{"count":1,"href":"https:\/\/studentorgs.syr.edu\/isc\/wp-json\/wp\/v2\/posts\/1360\/revisions"}],"predecessor-version":[{"id":1361,"href":"https:\/\/studentorgs.syr.edu\/isc\/wp-json\/wp\/v2\/posts\/1360\/revisions\/1361"}],"wp:attachment":[{"href":"https:\/\/studentorgs.syr.edu\/isc\/wp-json\/wp\/v2\/media?parent=1360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/studentorgs.syr.edu\/isc\/wp-json\/wp\/v2\/categories?post=1360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/studentorgs.syr.edu\/isc\/wp-json\/wp\/v2\/tags?post=1360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}