President of NPO multi-country WOCSA, Director of Managed Detection & Response at Sopra Steria, Teacher at French University Cyber Master
President of WOCSA France, Cyberjutsu Project Leader for WOCSA Head of Managed Detection and Response Services at Sopra Steria Cybersecurity External Professor at Cybersecurity Master (SSIR) for Science University of Toulouse, France. 1st dan Judo Jujitsu
| Aug 10th 2024 | Adversary Village Area | Las Vegas Convention Center. Adversary Tactics
Cyberjūtsu is a new way to teach cybersecurity inspired from martial arts trainings. It is an educational way which allows everyone (novice to expert) to practice together and improve themselves in cybersecurity through confrontation. It follows budō (judo, jujitsu, karate...) principles and ethical code. The goal is to reach "maximum-efficient use of computer" in a "mutual benefit" of a human confrontation. It's a digital martial art fight e-sport using linux shell.
No matter your technical background—from 10-year-olds to technical experts like pentesters and red/blue teamers—this workshop is designed for you. The only prerequisite is basic reading, writing, and counting knowledge. Experience real live adversary sparring and see how even those with less knowledge can outmaneuver more experienced participants. Join us for an interactive session with 14 players participating and others welcome to watch. Enhance your cybersecurity skills through collaborative and practical exercises.
Part 1: Martial Arts Components
This workshop integrates traditional martial arts principles with cybersecurity techniques. Participants
will explore:
Kihon (Basics): Fundamental concepts of Cyberjutsu, including digital discipline and ethical behavior.
Uchikomi (Repetitive Drilling):Structured sequences focusing on repetitive cyber attack and defense drills to build proficiency.
Randori (Free Practice): Practice through controlled, live cyber engagement exercises.
Moral Philosophy: Applying mutual aid and respect in digital interactions.
Part 2: Technical Details
The workshop will feature:
Network Service Discovery (T1046): Conducting network scans using tools like Nmap.
Command and Scripting Interpreter (T1059): Using scripting environments for automating tasks.
Privilege Escalation (T1068): Gaining higher-level permissions on target systems.
Lateral Movement (T1078): Simulating techniques for moving across networks.
MITRE D3FEND Techniques:
Connection Attempt Analysis (D3-CAA): Analyzing connection attempts to detect scanning activities.
Administrative Network Activity Analysis (D3-ANAA): Monitoring network activities for administrative actions.
Remote Terminal Session Detection (D3-RTSD): Identifying remote terminal sessions.
Process Termination (D3-PT): Identifying and terminating malicious processes.
We Engage.
Join Adversary Village official Discord server to connect with our amazing community of adversary simulation experts and offensive security researchers!