Our antifa tech collective is committed to ensuring the highest levels of cybersecurity competence for individuals and initiatives with whom we ally. We accomplish this using the following approach:
- Identify relevant skills amongst our comrades (the ones who "train").
- Develop a repeatable process for transferring those skills to a subset of self-selecting, motivated individuals (the "trainers").
- Support the newly-skilled individuals in further distributing their knowledge/utilizing their skills in the service of their personal communities.
Files in this directory are materials for the second and third items, above. These include cybersecurity exercises, demos, and supplemental information (beyond that which can be easily/appropriately added to relevant wiki pages like InfoSec) generalized to the point that they become a "repeatable process." Also included are generic or templatized material for promoting events or distributing the exercise material.
The resources that make up this project can be categorized into one of several different overarching subjects. While there is a great deal of necessary overlap, this coarse categorization scheme is useful when browsing the material. Each subject has a subproject contained here.
This directory contains the following subprojects:
- Black Hat Bash Back - Stand-alone exercises focusing on "the three D's" of computer network operations: degrade, disrupt, and deceive.
- Blue Feather Book - TK-TODO
- Mr. Robot's Netflix 'n' Hack - Cybersecurity exercises and suggested demos that you can use to supplement "Mr. Robot's Netflix 'n' Hack" events, now part of Tech Learning Collective's SEC101 course.
- Practice Labs - Stand-alone workshop materials focusing on hands-on experience and skill building for foundational topics or subjects not yet grouped into another project.
🔰 Read this section first, especially if you are a novice.
All educational resources in all of the subprojects above expect a certain level of dexterity with fundamental computer tools such as a command-line interface (CLI) or terminal. Moreover, the executable labs are provided in virtual machine environments (isolated, sandboxed computers), so learners must also be familiar with or take the time to learn the basics of administering virtual machines and virtual networks. If these topics are new to you, we strongly advise you to pause here and take the necessary time to learn these basics before you return.
To get started, we recommend taking the following route to prepare for and then navigate through our educational materials:
- Tech Learning Collective's "Foundations: Command Line Basics" course is our recommended introduction to CLI/terminal use. Do not skip this if a command line environment is new to you.
- Introduction to Virtual Machine Management with Vagrant introduces you to using Vagrant to create, control, and destroy the rest of the lab environments. Do not skip this if virtual machines or the Vagrant automation utility are new to you.
- Securing a Shell Account on a Shared Server fleshes out many critical but vastly underappreciated elements of secure computer use, building up foundations using historical context.
Once you have completed these basics, feel free to browse the rest of the educational material presented here at your discretion.
Punch up. ⒶCAB forever.