Skip to content

Commit ff6975e

Browse files
committed
create post: PyLadies Ghana Offensive Security Workshop: HackHerWay24
1 parent b8e178e commit ff6975e

File tree

1 file changed

+139
-0
lines changed

1 file changed

+139
-0
lines changed

cly4c62pb00000al5cun238un.md

Lines changed: 139 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,139 @@
1+
---
2+
title: "PyLadies Ghana Offensive Security Workshop: HackHerWay24"
3+
datePublished: Sat Jun 29 2024 00:00:00 GMT+0000 (Coordinated Universal Time)
4+
cuid: cly4c62pb00000al5cun238un
5+
slug: pyladies-ghana-offensive-security-workshop-hackherway24
6+
cover: https://cdn.hashnode.com/res/hashnode/image/upload/v1719906182170/d4078684-c9f9-4b6c-a581-f4704ea2cf58.jpeg
7+
tags: python, ghana, cybersecurity-1, pyladiesghana
8+
9+
---
10+
11+
## Overview
12+
13+
PyLadies Ghana organized a one-month cybersecurity workshop on Offensive Security, held both in-person and virtually. The workshop ran from May 25th to June 22nd, 2024. Sessions began at 12:30 PM at SB Incubator on the first day, continued from 10 AM to 2 PM virtually via Zoom on subsequent days, and concluded with an in-person session from 9 AM to 5 PM at SB Incubator, Accra, on the final day.
14+
15+
## Workshop Details
16+
17+
**Facilitators:**
18+
19+
[Derick Brown](https://www.linkedin.com/in/derick-brown-ceh-b28855164/)**:** Cybersecurity Trainer
20+
21+
![Derick tutoring](https://cdn.hashnode.com/res/hashnode/image/upload/v1719906892003/0db69ea8-4c0d-47d2-95fe-4f8af27a1b1a.jpeg align="center")
22+
23+
[**Faiza Seidu-Adam**](https://www.linkedin.com/in/faiza-seidu-adam-591261132/)**:** Information Security and Privacy Analyst
24+
25+
![Faiza tutoring](https://cdn.hashnode.com/res/hashnode/image/upload/v1719906814355/8e356666-58d6-46e7-811b-26e7c767774a.jpeg align="left")
26+
27+
**Organizers:**
28+
29+
[**Joyce Lokko**](https://www.linkedin.com/in/joyce-dzifa-lokko/?originalSubdomain=gh)**:** PyLadies Ghana Communications Lead
30+
31+
[**Theresa Seyram Agbenyegah**](https://www.linkedin.com/in/theresa-seyram-agbenyegah-455642173/?originalSubdomain=gh)**:** PyLadies Ghana Programs and Events Lead
32+
33+
[**Yaa Nuamah**](https://www.linkedin.com/in/yaanuamah/)**:** PyLadies Ghana Lead
34+
35+
![](https://cdn.hashnode.com/res/hashnode/image/upload/v1719907790207/0f097bd0-7aa6-4c54-8e30-e73255c278fd.jpeg align="center")
36+
37+
**Participants:**
38+
39+
**Media:** 2 members
40+
41+
**Trainees:** 15 participants
42+
43+
**Professionals:** 4 additional professionals
44+
45+
## Day-by-Day Breakdown
46+
47+
### Day 1: Inaugural/Boarding Session
48+
49+
The workshop kicked off with a welcome address by Theresa Seyram Agbenyegah, followed by an icebreaker session where participants introduced themselves and shared two truths and one lie. An onboarding session and installation party followed, where participants downloaded VirtualBox, Kali Linux, and PicoCTF for practice. Facilitator, Derick Brown and Faiza Seidu-Adam covered the following topics:
50+
51+
<mark>• Introduction to cybersecurity concepts: confidentiality, integrity, and availability</mark>
52+
53+
<mark>• Basics of Kali Linux: dual booting, using VMware, file and directory management</mark>
54+
55+
<mark>• First scripting lesson in Kali Linux</mark>
56+
57+
![](https://cdn.hashnode.com/res/hashnode/image/upload/v1719911317985/71a91208-a5ef-49e5-94ee-3971a01b80f4.png align="center")
58+
59+
### Example Commands:
60+
61+
`• ls - list files`
62+
63+
`• mkdir - create directory`
64+
65+
`• cat - display file contents`
66+
67+
`• touch - add file to a folder`
68+
69+
`• ifconfig - find IP address`
70+
71+
`• nmap - network scanning`
72+
73+
`• echo - add text to files`
74+
75+
![](https://cdn.hashnode.com/res/hashnode/image/upload/v1719906941035/04c255d5-79f9-487d-aaae-60d4a35fd68f.jpeg align="center")
76+
77+
### Day 2: Ethical Hacking
78+
79+
Facilitator Derick Brown provided an overview of ethical hacking and steps to penetration testing. Topics covered included footprinting, email and password vulnerabilities, and reading Google Maps for location data.
80+
81+
![](https://cdn.hashnode.com/res/hashnode/image/upload/v1719907078985/f7e69a4e-7c2d-4ad7-bd72-ed5ff873d742.jpeg align="center")
82+
83+
### Day 3: Network Topology and Scanning
84+
85+
Participants learned about network topology, using nmap for network scanning, and specific commands to scan particular ports.
86+
87+
#### Example Commands:
88+
89+
`• nmap - general network scanning`
90+
91+
`• nmap -p 21-30 - scan a specific range of ports`
92+
93+
![](https://cdn.hashnode.com/res/hashnode/image/upload/v1719907823180/18e5e371-2fb4-46e0-8eb5-3516609b9a6a.jpeg align="center")
94+
95+
### Day 4: Metasploit and Password Cracking
96+
97+
The session focused on setting up Metasploitable, hacking into vsFTP, and password cracking techniques.
98+
99+
![](https://cdn.hashnode.com/res/hashnode/image/upload/v1719907860831/200a86ee-bfd7-4288-a65e-2f428b01fa4f.jpeg align="center")
100+
101+
### Day 5: Closing Ceremony
102+
103+
The final day began with re-introductions and a recap of the cybersecurity journey. An icebreaker session, led by Theresa Seyram Agbenyegah, had participants share the craziest and most interesting things they’ve done and sing a song by their favorite artist. Facilitators Derick and Faiza then led a recap of the Capture the Flag (CTF) activities, highlighted assignments, and conducted a practical session. This was followed by lunch and the distribution of swag.
104+
105+
![](https://cdn.hashnode.com/res/hashnode/image/upload/v1719906968579/81a1273a-fea7-4a20-89d8-f503447a4331.jpeg align="center")
106+
107+
A panel discussion featured six tech professionals from diverse backgrounds:
108+
109+
![](https://cdn.hashnode.com/res/hashnode/image/upload/v1719906469984/59ab363a-6fb9-495b-8222-215ec3b14e9d.jpeg align="center")
110+
111+
[**Joyce Dzifa Lokko**](https://www.linkedin.com/in/joyce-dzifa-lokko/)**:** Software Engineer
112+
113+
[**Abigail Afi Gbadago**](https://www.linkedin.com/in/abigail-afi-gbadago/)**:** Software Engineer and Proposal Writer
114+
115+
[**Faiza Seidu-Adam**](https://www.linkedin.com/in/faiza-seidu-adam-591261132/)**:** Security Analyst
116+
117+
[**Dorothy Ewuah**](https://www.linkedin.com/in/dorothyewuah/)**:** Software Engineer
118+
119+
[**Derick Brown**](https://www.linkedin.com/in/derick-brown-ceh-b28855164/)**:** Cybersecurity Instructor
120+
121+
The discussion, moderated by Theresa Seyram Agbenyegah, covered topics such as reasons for choosing tech careers, interesting and challenging moments, the importance of tech communities, and final words of advice.
122+
123+
![](https://cdn.hashnode.com/res/hashnode/image/upload/v1719907947248/1e349a8c-bac3-4a80-8932-54823f8dca3c.jpeg align="center")
124+
125+
## Conclusion
126+
127+
The facilitators emphasized hands-on and practical demonstrations, ensuring active participation from all attendees. The workshop concluded with the presentation of awards to the top five participants and closing remarks by Theresa Seyram Agbenyegah.
128+
129+
## Key Highlights:
130+
131+
• Interactive and practical sessions
132+
133+
• Engaging and informative discussions
134+
135+
• Recognition and awards for outstanding participants
136+
137+
This workshop was a valuable experience for all participants, providing deep insights into offensive security and practical skills that will benefit their future endeavours in tech.
138+
139+
![](https://cdn.hashnode.com/res/hashnode/image/upload/v1719907965895/017e0c60-f8e4-4fe4-9d7a-ab8fc54d77d9.jpeg align="center")

0 commit comments

Comments
 (0)