YoVDO

Control-Alt-Hack - White Hat Hacking for Fun & Profit

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Network Security Courses Ethical Hacking Courses Gamification Courses Social Engineering Courses Computer Security Courses Forensics Courses Cryptanalysis Courses Hardware Hacking Courses

Course Description

Overview

Explore the world of ethical hacking through a unique card game designed to educate and entertain. Dive into a presentation from Black Hat USA 2012 that introduces "Control-Alt-Hackā„¢: White Hat Hacking for Fun & Profit," a game that simulates the work of security professionals. Learn about the game's mechanics, inspired by Steve Jackson Games' "Ninja Burger," and discover how players take on the role of white hat hackers completing missions that test their skills in hardware hacking, software wizardry, network security, social engineering, cryptanalysis, and forensics. Gain insights into the game development process, including playtesting and content creation, and understand how this innovative approach aims to raise awareness about computer security topics. The presentation covers the game's structure, mission cards, hacker skills, and the use of humor to engage players while teaching important security concepts. Discover the potential applications of security-themed games in education and awareness training, and get a chance to see a live demo of the game in action.

Syllabus

Intro
THE REST OF THE LAB
A TYPICAL DAY IN THE LAB
CONTEXT
OUR KEY QUESTIONS
STRATEGY
WHY A PHYSICAL GAME
DIFFERENT TYPES OF GAMES
DEVELOPING MECHANICS
GAME MECHANICS
DELICIOUS CONTENTS
THE HACKER CARD
HACKER SKILLS
THE MISSION CARDS
THE ENTROPY CARDS
PUBLIC RELATIONS
KEY LEARNING OBJECTIVES
SOCIAL ENGINEERING
NONSTANDARD TARGET
UNUSUAL ATTACKS
HUMOR!
REFERENCES!
SECURITY JOKES
DEVELOPMENT OVERVIEW
CARD TOPICS
THE PROCESS
PLAYTESTING
WHAT WE DID
GETTING THE GAME
FREE COPIES
FUTURE GAME CONTENT
CONTROL-ALT HACK


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube