Presentation is loading. Please wait.

Presentation is loading. Please wait.

Game Mark Shtern.

Similar presentations


Presentation on theme: "Game Mark Shtern."— Presentation transcript:

1 Game Mark Shtern

2 Game Objectives Secure your infrastructure using IDS, application firewalls, or honeypots Plant your flag on opponent’s machine Prevent intruders from planting their flag Remove your opponents’ flag Identify intrusions Discover your opponents’ password hashes and brute force them The flag is signed file. Students cannot recreate flag.

3 Game Rules You are not allowed to configure any network firewalls (yours or an opponent’s) You are not allowed to configure intrusion prevention You are allowed to kill any process that belongs to an intruder You are allowed to change your opponent’s passwords

4 Environment Deploy IT services
Telnet Domain controller DHCP Web Server Network File Sharing Open at least 3 ports on each Linux workstations Create at least 3 user accounts in each Linux/Windows workstation

5 Scoring Plant/Find Backdoor 5 Plant a flag 20 Catch intrusion 10
Change an opponent’s password 10 Take ownership of an opponent’s complete infrastructure 40 Lose control of a Windows workstation -5 Lose control of a Linux workstation -10 Lose control of a DC -20

6 PROJECT PENETRATION TESTING
Mark Shtern

7 Project penetration testing
Project presentation (10 minutes) on Wednesday, March 26 5 question for presenter Review other projects’ design Find security design flaws and vulnerabilities in other projects Post discovered flaws on the course forum Confirm / deny posted flaws of your project

8 Scoring Presentation -10 (10) QA phase
Discover security problem in Q&A session 10 (-10) Unanswered/Unprepared/Irrelevant questions -10 (10) QA phase Discover vulnerability 5 (-5) Discover vulnerability and exploit it 10 (-10) Discover design flaws 20 (-20) Deny posted flaws 10 (-10) Unanswered post -5 (5)


Download ppt "Game Mark Shtern."

Similar presentations


Ads by Google