Presentation is loading. Please wait.

Presentation is loading. Please wait.

Mark Shtern.  Secure your infrastructure using IDS, application firewalls, or honeypots  Plant your flag on opponent’s machine  Prevent intruders from.

Similar presentations


Presentation on theme: "Mark Shtern.  Secure your infrastructure using IDS, application firewalls, or honeypots  Plant your flag on opponent’s machine  Prevent intruders from."— Presentation transcript:

1 Mark Shtern

2  Secure your infrastructure using IDS, application firewalls, or honeypots  Plant your flag on opponent’s machine  Prevent intruders from planting their flag  Remove your opponents’ flag  Identify intrusions  Discover your opponents’ password hashes and brute force them

3  You are not allowed to configure any network firewalls (yours or an opponent’s)  You are not allowed to configure intrusion prevention  You are allowed to kill any process that belongs to an intruder  You are allowed to change your opponent’s passwords

4  Deploy IT services  Telnet  Domain controller  DHCP  Web Server  Network File Sharing  Open at least 3 ports on each Linux workstations  Create at least 3 user accounts in each Linux/Windows workstation

5  Plant/Find Backdoor 5  Plant a flag 20  Catch intrusion 10  Change an opponent’s password 10  Take ownership of an opponent’s complete infrastructure 40  Lose control of a Windows workstation -5  Lose control of a Linux workstation -10  Lose control of a DC -20


Download ppt "Mark Shtern.  Secure your infrastructure using IDS, application firewalls, or honeypots  Plant your flag on opponent’s machine  Prevent intruders from."

Similar presentations


Ads by Google