Material educativo de la mano de la Agencia Europea de Redes y Seguridad de la Información (ENISA)
- January 2, 2014
- tuxotron

ENISA (European Network and Information Security Agency), desde el 2008 ha ido publicando una serie de ejercicios prácticos para ayudar a aquellos que quieran adquirir los conocimientos de un buen CERT (Computer Emergency Respond Team).
El material está dividido en 29 ejercicios que se corresponden a distintas fases de la respuesta a una incidencia. El material está compuesto por dos documentos: Handbook (documento para el profesor) y el Toolset (documento para el alumno). Además de estos, dispones de varias máquinas virtuales en las que tienes el sistema ya preparado para llevar a cabo las prácticas.
A continuación copio y pego el índice de la web original:
No. | Exercise title | Handbook | Toolset | Virtual Image | Other material supporting the exercise |
---|---|---|---|---|---|
1 | Triage & basic incident handling | Download | Download | Download | Online version of Exercise 1 |
2 | Incident handling procedure testing | Download | Download | Online version of Exercise 2 | |
3 | Recruitment of CERT staff | Download | Download | Online version of Exercise 3 | |
4 | Developing CERT infrastructure | Download | Download | Online version of Exercise 4 | |
5 | Vulnerability handling | Download | Download | Online version of Exercise 5 | |
6 | Writing security advisories | Download | Download | Online version of Exercise 6 | |
7 | Network forensics | Download | Download | Online version of Exercise 7 | |
8 | Establishing external contacts | Download | Download | Online version of Exercise 8 | |
9 | Large scale incident handling | Download | Download | Online version of Exercise 9 | |
10 | Automation in incident handling | Download | Download | Online version of Exercise 10 | |
11 | Incident handling in live role playing | Download | Download | Online version of Exercise 11 | |
12 | Cooperation with Law Enforcement agencies | Download | Download | Online version of Exercise 12 | |
13 | Incident handling during an attack on Critical Information Infrastructure | Download | Download | ||
14 | Proactive incident detection | Download | Download | ||
15 | Cost of ICT incident | Download | Download | Download MS Excel workbook, Download workbook in open format | |
16 | Mobile threats incident handling | Download | Download | ||
17 | Incident handling in the cloud | Download | Download | ||
18 | Advanced Persistent Threat incident handling | Download | Download | ||
19 | CERT participation in incident handling related to the Article 13a obligations | Download | Download | Download data_ddos.pcap | |
20 | CERT participation in incident handling related to the Article 4 obligations | Download | Download | ||
21 | Assessing and Testing Communication Channels with CERTs and all their stakeholders | Download | Download | ||
22 | Social networks used as an attack vector for targeted attacks | Download | Download | ||
23 | Honeypots | Download | Download | Download | |
24 | Digital forensics | Download | Download | Download
|
|
25 | Identification and handling of electronic evidence | Download | Download | ||
26 | Identifying and handling cyber-crime traces | Download | Download | ||
27 | Presenting, correlating and filtering various feeds | Download | Download | Download | |
28 | Incident handling and cooperation during phishing campaign | Download | Download | ||
29 | Cooperation in the Area of Cybercrime | Download | Download |
Si lo prefieres, desde este enlace (PDF) te puedes descargar los documentos del profesor (handbook) y desde aquí (PDF) los del alumno (toolset) en español para los 12 primeros ejercicios.
Vídeos de la 30c3
- December 31, 2013
- tuxotron
- http://cdn.media.ccc.de/congress/2013 (multiple hosts, CDN)
- ftp://mirror.fem-net.de/CCC/30C3/
- http://30c3.mirror.speedpartner.de/ (1Gbit, IPv4/IPv6, SpeedPartner GmbH)
- http://ftp.halifax.rwth-aachen.de/ccc/30C3/ (10 GBit/sec, DFN, also offers ftp and rsync)
- http://mirror.netcologne.de/CCC/congress/2013/ (2Gbit/s, IPv4/IPv6, also part of cdn.media.ccc.de)
- http://ftp.snt.utwente.nl/pub/misc/30c3/ (10Gbit/s, IPv4/IPv6, http/ftp/rsync)
- 30c3_Keynote_h264-hd.mp4
- Monitoring_the_Spectrum_Building_Your_Own_Distributed_RF_Scanner_Array_h264-hq.mp4
- FPGA_101_h264-hq.mp4
- Programming_FPGAs_with_PSHDL_h264-hq.mp4
- Android_DDI_h264-hq.mp4
- en-Bullshit_made_in_Germany_h264-hq.mp4
- The_GNU_Name_System_h264-hq.mp4
- The_Gospel_of_IRMA__h264-hq.mp4
- WarGames_in_memory_h264-hq.mp4
- Triggering_Deep_Vulnerabilities_Using_Symbolic_Execution_h264-hq.mp4
- de-Through_a_PRISM_Darkly_h264-hq.mp4
- The_philosophy_of_hacking_h264-hq.mp4
- en-Keine_Anhaltspunkte_fuer_flaechendeckende_UEberwachung_h264-hq.mp4
- Coding_your_body_h264-hq.mp4
- Console_Hacking_2013_h264-hq.mp4
- en-Dead_Man_Edition_h264-hq.mp4
- de-Dead_Man_Edition_h264-hq.mp4
- de-Rock_em_Graphic_Cards_h264-hq.mp4
- Breaking_Baryons_h264-hq.mp4
- Reverse_engineering_of_CHIASMUS_from_GSTOOL_h264-hq.mp4
- lasers_in_space_h264-hq.mp4
- Technomonopolies_h264-hq.mp4
- Reverse_engineering_the_Wii_U_Gamepad_h264-hq.mp4
- RFID_Treehouse_of_Horror_h264-hq.mp4
- en-Kryptographie_nach_Snowden_h264-hq.mp4
- en-Der_Kampf_um_Netzneutralitaet_h264-hq.mp4
- Firmware_Fat_Camp_h264-hq.mp4
- Script_Your_Car__h264-hq.mp4
- Disclosure_DOs_Disclosure_DON_Ts_h264-hq.mp4
- en-UEberwachen_und_Sprache_h264-hq.mp4
- Toward_a_Cognitive_Quantified_Self__h264-hq.mp4
- de-Y_U_NO_ISP_taking_back_the_Net_h264-hq.mp4
- Towards_an_affordable_brain-computer-interface_h264-hq.mp4
- HbbTV_Security_h264-hq.mp4
- Data_Mining_for_Good_h264-hq.mp4
- Drones_h264-hq.mp4
- Bug_class_genocide_h264-hq.mp4
- en-Der_tiefe_Staat_h264-hq.mp4
- de-Desperately_Seeking_Susy_h264-hq.mp4
- Extracting_keys_from_FPGAs_OTP_Tokens_and_Door_Locks_h264-hq.mp4
- en-calcpw_h264-hq.mp4
- THE_DATABASE_NATION_aka_THE_STATE_OF_SURVEILLANCE_h264-hq.mp4
- The_Tor_Network_h264-hq.mp4
- Hacking_as_Artistic_Practice_h264-hq.mp4
- en-Das_FlipDot-Projekt_h264-hq.mp4
- en-Recht_auf_Remix_h264-hq.mp4
- Plants_Machines_h264-hq.mp4
- de-Art_of_the_Exploit_An_Introduction_to_Critical_Engineering_h264-hq.mp4
- Introduction_to_Processor_Design_h264-hq.mp4
- Attacking_HomeMatic_h264-hq.mp4
- Virtually_Impossible_The_Reality_Of_Virtualization_Security_h264-hq.mp4
- The_good_the_bad_and_the_ugly_-_Linux_Kernel_patches_h264-hq.mp4
- Policing_the_Romantic_Crowd_h264-hq.mp4
- Mobile_network_attack_evolution_h264-hq.mp4
- Against_Metadata_h264-hq.mp4
- Hillbilly_Tracking_of_Low_Earth_Orbit_h264-hq.mp4
- en-Warum_die_Digitale_Revolution_des_Lernens_gescheitert_ist_h264-hq.mp4
- We_only_have_one_earth_h264-hq.mp4
- en-2_Takte_spaeter_h264-hq.mp4
- World_War_II_Hackers_h264-hq.mp4
- _SOPA_NSA_and_the_New_Internet_Lobby_h264-hq.mp4
- Electronic_Bank_Robberies_h264-hq.mp4
- de-Backdoors_Government_Hacking_and_The_Next_Crypto_Wars_h264-hq.mp4
- Building_a_safe_NFC_ticketing_system_h264-hq.mp4
- Europe_the_USA_and_Identity_Ecosystems_h264-hq.mp4
- de-No_Neutral_Ground_in_a_Burning_World_h264-hq.mp4
- Nerds_in_the_news_h264-hq.mp4
- Concepts_for_global_TSCM_h264-hq.mp4
- 10_Years_of_Fun_with_Embedded_Devices_h264-hq.mp4
- X_Security_h264-hq.mp4
- Anonymity_and_Privacy_in_Public_Space_and_on_the_Internet_h264-hq.mp4
- en-Zwischen_supersicherer_Verschluesselung_und_Klartext_liegt_nur_ein_falsches_Bit__h264-hq.mp4
- en-IFGINT_h264-hq.mp4
- How_to_Build_a_Mind_h264-hq.mp4
- Basics_of_Digital_Wireless_Communication_h264-hq.mp4
- Hardening_hardware_and_choosing_a_goodBIOS_h264-hq.mp4
- Fast_Internet-wide_Scanning_and_its_Security_Applications_h264-hq.mp4
- Long_Distance_Quantum_Communication_h264-hq.mp4
- Human_Rights_and_Technology_h264-hq.mp4
- Revisiting_Trusting_Trust_for_binary_toolchains_h264-hq.mp4
- de-ID_Cards_in_China_Your_Worst_Nightmare_h264-hq.mp4
- en-Sim_Gishel_h264-hq.mp4
- Trezor_Bitcoin_hardware_wallet_h264-hq.mp4
- Turing_Complete_User_h264-hq.mp4
- Beyond_the_Tech_Building_Internet_Freedom_Tools_for_Real_People_h264-hq.mp4
- India_s_Surveillance_State_h264-hq.mp4
- Magic_Lantern_h264-hq.mp4
- de-Lightning_Talks_Day_2_h264-hq.mp4
- de-Lightning_Talks_Day_3_h264-hq.mp4
- de-Lightning_Talks_Day_4_h264-hq.mp4
- Open_source_experimental_incubator_build_up_h264-hq.mp4
- Calafou_postcapitalist_ecoindustrial_community_h264-hq.mp4
- SCADA_StrangeLove_2_h264-hq.mp4
- Making_machines_that_make_h264-hq.mp4
- de-My_journey_into_FM-RDS_h264-hq.mp4
- White-Box_Cryptography_h264-hq.mp4
- Hacking_the_Czech_Parliament_via_SMS_h264-hq.mp4
- Structuring_open_hardware_projects_h264-hq.mp4
- The_ArduGuitar_h264-hq.mp4
- de-EUDataP_State_of_the_Union_h264-hq.mp4
- Opening_Event_h264-hq.mp4
- The_Pirate_Cinema_h264-hq.mp4
- en-Jahresrueckblick_des_CCC_h264-hq.mp4
- Infrastructure_Review_h264-hq.mp4
- Seidenstrasse_h264-hq.mp4
- Hello_World__h264-hq.mp4
- Forbidden_Fruit_h264-hq.mp4
- Perfect_Paul_h264-hq.mp4
- en-Mind-Hacking_mit_Psychedelika_h264-hq.mp4
- de-30c3_Keynote_h264-hq.mp4
- en-Amtliche_Datenschuetzer_Kontrolleure_oder_Papiertiger__h264-hq.mp4
- de-To_Protect_And_Infect_Part_2_h264-hq.mp4

Durante el pasado fin de semana (viernes a lunes) se celebró en Alemania, Hamburgo la ya veterana CCC, Chaos Communication Congress, que celebraba su 30 edición. Como viene ocurriendo desde hace unos años, todas las charlas se emitían en vivo a través de internet e incluso podías seguirla por teléfono.
Si te perdiste alguna de las charlas o simplemente quieres volver a ver alguna de las que seguiste, ya puedes descargarte los vídeos. Además del sitio oficial, tienes otras alternativas como:
Aquí os dejo un listado con los enlaces al FTP oficial de todas las charlas publicadas:
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec