I joined GCC last month, this is my writing on joining this awesome camp
GCC stands for Global Cybersecurity Camp (not C compiler)
It is an annual 1-week international cybersecurity training programme. Each participating country takes responsibility to host each annual edition.
This year camp run virtually using ZOOM, due to COVID-19.
First GCC is organised in South Korea, second in Tokyo, then this year in Taiwan. We suppose have to travel to the country which organize the event, but this year they decided to run online so we can also meet virtually
Thanks for NanoSec for let me joining this year. NanoSec Asia is a community in Malaysia, it also one of the orginazer in GCC.
I represent from Malaysia joining this camp, total 6 people from MY. In GCC, we split into groups randomly. Every teams need to do some group work every week. Each group also need to choose a topic to discuss and present to all students in the last week.
We learned many things in this camp, like a honeypot platform called “T-POT” shared in lecture:
T-Pot 20.06 runs on Debian (Stable), is based heavily on and includes dockerized versions of the following honeypots…
Also we are given a challenge called “Robust Protocol”, basically we need to implement a protocol for Raspberry Pi to communicate but through a faulty LAN cable (some packet will loss).
The challenge is to send 1000 files in 60 seconds, the more the file sent the more the score gains. More details about the challenge at here:
Michihiro Imaoka (Hiro) JP @imaoca firstname.lastname@example.org https://www.facebook.com/imaoka.micihihiro/ Yuya Tsuru Naoki…
One group with highest score can get a robust protocol certificate!
Our group only manage to get 100+ files transferred, got 1 team wins with 600+ files! They shared their Python source code:
We also get to know a CTF learning platform from Korea called Dreamhack, that’s a awesome nice CTF platform!
해커들의 놀이터, Dreamhack
해킹과 보안에 대한 공부를 하고 싶은 학생, 안전한 코드를 작성하고 싶은 개발자, 보안 지식과 실력을 업그레이드 시키고 싶은 보안 전문가까지 함께 공부하고 연습하며 지식을 나누고 실력 향상을 할 수 있는…
It provided various lesson from beginner to advance on many categories like Web, Reverse, Crypto etc. I think the only thing to improve is the supported language haha
We also learn how to use some advance technique in Ghidra, it will help us to speed up the process of reverse engineering.
Thank you to all of the lectures and speakers from Korea, Malaysia, Japan, Singapore and Taiwan for sharing all the knowledge to us!
At the end of the GCC, we are invited to join a CTF in AIS3, top CTF team in Taiwan
AIS3 EOF CTF 2020
AIS3 EOF 資安搶旗競賽透過邀請各領域資安專家協助建立高水準的資訊安全實戰演練平台， 並期能透過競賽的方式提供 AIS3 學員與國內資安學子相互切磋資安實務能力的機會。
It was a nice and challenging CTF, we only solved 2 challenges, I will share the writeup in my github soon.
Special shout out to the NanoSec members that help us to get into GCC:
- Mr. Khoo Li Jing
- Mr. Jin Fu
- Mr Tommy Wong
- Mr Hafez Kamal
- Mr. Jaan Yeh
Photo of the closing ceremony
Thanks for students and lectures from Malaysia, Japan, Singapore, South Korea, Taiwan, Thailand, Vietnam and Australia that join this camp. I learned many things in this camp. Hopefully we can meet physically next time.