just like one minute yep gotcha uh may i ask how many participants are there in the conference or like online okay so currently here we've got like 80 people here. no pressure okay just a little bit of pressure but okay gotcha no worries about that okay you're a co-host and should be able to share my screen yep okay does that work uh yep we can see it all right and it's full screen right yeah all right thank you for confirmation cool all right the floor is yours man go ahead oh i can start right away all right sounds good okay

#whoami - choi

hello everyone my name is seungguan choi and this is the presentation for introduction to offensive security. so before we start i would like to briefly introduce myself i just go by choi i'm currently a penetration tester at ibm x-force red first red is a offensive security oriented team at ibm but i'm originally from south korea i've been born and raised in south korea for about you know seven until the age of 17 or 18 came to the us to study computer science and cyber security and i graduated got a job about four months ago. so i'm just like fresh out of college and i'm currently doing internal pentesting, external and application pentesting as well i have a great interest in active directory defensive and red teaming as well down below we have some handles for my twitter and linkedin so if you have any kind of lingering questions or if you want to network feel free to message me.

Disclamer

so quick disclaimer here probably not the most appropriate disclaimer but i have no idea what i'm doing you know more accurately.

i'm not like some kind of a super senior who has been in the industry for like 20 years or i'm not like a magic hacker that can hack everything in the world. you know i'm just a normal guy in offensive security who just graduate out of college and i want to help other beginners and other students to get involved and to be introduced to cyber security in general.

TL;DR

so a tldr for this presentation is this presentation is a type of the offensive introduction to offensive security type of presentation so it is geared towards beginners and students and it will be mostly non-technical.

there won't be like technical demos in this presentation and there will be a lot of keywords right because you're getting introduced to the concept that you haven't seen before. right?

maybe you don't know what offensive security is, maybe you don't know what penetration testing is so there will be a lot of keywords throwing out during this presentation so what i want you to do as students or beginners what i want you to do is it's okay if you don't understand like half of the keywords thrown in this presentation that's perfectly fine. what i want you to do is be proactive and research those kind of keywords if you don't know what they mean,

you know, this presentation is an introduction to offsec so this is your starting point to cyber security or more specifically offensive security so go out there do your research and dive in.

so i usually give this talk um in-person and i just realized that i can't really ask you guys to put your hands up if you have to if you heard the term penetration testing or offensive security?

um it's pretty sad okay so i can't really ask you to do that so i'm going to move on.

Penetration Testing? Offensive Security?

Things Have Changed - 1

so before we talk about anything related with uh security let's go back in time you know history time so when the internet first went full public on in the day of 1983.

i believe that 38 years ago you know when the internet first came out in the world what was the internet or what was people what were people using computers for mostly we just shared text you know the internet itself was just a bunch of shared text with hyperlinks we linked text we shared text in some cases we shared images but that was about it really simple good old days.

now if you look on the right side this is actually a diagram of the colonial pipeline that happened may this year like six months ago if you look on the right side we have different computers servers applications gateways nodes all mangled into each other things have vastly changed from just like 30~40 years ago compared to today,