Difference between revisions of "Cyber Security Competition 2011"
imported>Mutantmonkey |
imported>Mutantmonkey |
||
Line 1: | Line 1: | ||
We will host a week-long online Cyber Security Competition with a brick-and-mortar component for the events fair. We will have different tiers of competition and demonstrations. Competition will be open to anyone able to participate and network activities will be vetted by the uhm IT Security Office. | We will host a week-long online Cyber Security Competition with a brick-and-mortar component for the events fair. We will have different tiers of competition and demonstrations. Competition will be open to anyone able to participate and network activities will be vetted by the uhm IT Security Office. | ||
+ | == Ideas == | ||
* Wireless component? | * Wireless component? | ||
** [[User:Mutantmonkey|mutantmonkey]] wants to use his Wifi Pineapple | ** [[User:Mutantmonkey|mutantmonkey]] wants to use his Wifi Pineapple | ||
Line 6: | Line 7: | ||
* Web application | * Web application | ||
** Something like last year, but maybe a little more complex and more difficult to harden | ** Something like last year, but maybe a little more complex and more difficult to harden | ||
− | * Damn Vulnerable Linux? | + | * Machines to own |
+ | ** Windows VMs | ||
+ | ** Damn Vulnerable Linux? |
Revision as of 21:11, 5 November 2010
We will host a week-long online Cyber Security Competition with a brick-and-mortar component for the events fair. We will have different tiers of competition and demonstrations. Competition will be open to anyone able to participate and network activities will be vetted by the uhm IT Security Office.
Ideas
- Wireless component?
- mutantmonkey wants to use his Wifi Pineapple
- Firesheep
- Web application
- Something like last year, but maybe a little more complex and more difficult to harden
- Machines to own
- Windows VMs
- Damn Vulnerable Linux?