[Workshop Speakers]
Adversary Village at
DEF CON 32

Alaric Becker

SOC Analyst and Threat Hunter at Sopra Steria

WOCS'HACK Project Leader for WOCSA France. Security Operation Center Analyst at Sopra Steria Cybersecurity.
3rd dan Judo Jujitsu

Hands-on workshop: Cyberjutsu Path to a Digital Martial Art

| Aug 10th 2024 | Adversary Village Area | Las Vegas Convention Center.
Adversary Tactics

Cyberjūtsu is a new way to teach cybersecurity inspired from martial arts trainings. It is an educational way which allows everyone (novice to expert) to practice together and improve themselves in cybersecurity through confrontation. It follows budō (judo, jujitsu, karate...) principles and ethical code. The goal is to reach "maximum-efficient use of computer" in a "mutual benefit" of a human confrontation. It's a digital martial art fight e-sport using linux shell.

No matter your technical background—from 10-year-olds to technical experts like pentesters and red/blue teamers—this workshop is designed for you. The only prerequisite is basic reading, writing, and counting knowledge. Experience real live adversary sparring and see how even those with less knowledge can outmaneuver more experienced participants. Join us for an interactive session with 14 players participating and others welcome to watch. Enhance your cybersecurity skills through collaborative and practical exercises.

Part 1: Martial Arts Components
This workshop integrates traditional martial arts principles with cybersecurity techniques. Participants will explore:
Kihon (Basics): Fundamental concepts of Cyberjutsu, including digital discipline and ethical behavior.
Uchikomi (Repetitive Drilling):Structured sequences focusing on repetitive cyber attack and defense drills to build proficiency.
Randori (Free Practice): Practice through controlled, live cyber engagement exercises.
Moral Philosophy: Applying mutual aid and respect in digital interactions.

Part 2: Technical Details
The workshop will feature:
Network Service Discovery (T1046): Conducting network scans using tools like Nmap.
Command and Scripting Interpreter (T1059): Using scripting environments for automating tasks.
Privilege Escalation (T1068): Gaining higher-level permissions on target systems.
Lateral Movement (T1078): Simulating techniques for moving across networks.
MITRE D3FEND Techniques:
Connection Attempt Analysis (D3-CAA): Analyzing connection attempts to detect scanning activities.
Administrative Network Activity Analysis (D3-ANAA): Monitoring network activities for administrative actions.
Remote Terminal Session Detection (D3-RTSD): Identifying remote terminal sessions.
Process Termination (D3-PT): Identifying and terminating malicious processes.

We Engage.


Join Adversary Village Discord Server.

Join Adversary Village official Discord server to connect with our amazing community of adversary simulation experts and offensive security researchers!