Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

Penetration Testing Lab

Containers

  • VMs vs Containers
  • Ease of deployment
  • Compatibility
  • Low resource requirements
  • Scalable
  • Choice between Docker and LXD

Networking

  • Cloud Hosting
  • Pivoting
  • Various hardening methods (Port Knocking, IPv6, etc.)

Realistic

Why are we doing this?

  • Mimics what one would expect in a real world scenario
  • Up to date exploits
  • Provides hands-on experience

Altug BOZKURT, 201311010

Utku TORAMAN, 201411061

Sina Barış AYDIN, 201411007

Advisor: Nurdan SARAN

  • Increasing importance of Cyber Security
  • Not enough resources available
  • It's fun

Exploits

  • Many different fields, ex:
  • Web (sql injection)
  • Daemon misconfigurations
  • Buffer overflow
  • Kernel exploits, etc.

What is our goal?

  • Better tools
  • Challenging
  • Hardware and OS independent
  • Story Driven

Conclusion

  • Educational tool for up-and-coming cyber security professionals
  • Questions?
Learn more about creating dynamic, engaging presentations with Prezi