Use security engineering tools to understand how hackers gain access to computers.
Did you know that you should never put an untrusted flash drive in your computer? Just by plugging one in, a hacker can gain access to an entire computer! That's why companies are paying a lot of money to employ Security Engineers that constantly try to hack their own co-workers to find vulnerabilities before an evil hacker does.
This brand new camp explores the tools and techniques that security engineers use to execute hacks in the wild. Campers will explore how some of the most infamous hacks in recent history were carried out and how they were stopped. They will learn how phishing and man-in-the-middle attacks are used to capture sensitive information and how brute-force password cracking can be combined with social engineering to gain access to encrypted data.
Lastly, campers will learn how malicious 'payloads' are created and then used to gain access to a computer by delivering them through a website, application, or even a compromised flash drive!
Campers will leave with the skills to recognize and defend themselves against malicious attacks, along with a USB toolkit to continue pthe internet from home!
*Safety Note: Although campers will be using real hacking tools, all of the specific hacks covered utilize well-know vulnerabilities that will not work on up-to-date computers (thanks to the work of security engineers)!