Difference between revisions of "Wargame"
imported>Ramblurr |
imported>Ramblurr |
||
Line 1: | Line 1: | ||
The VTLUUG's wargame is an opportunity for students interested in network security to learn and develop their skills in a safe and legal hacking environment. The wargame network is completely isolated from the Internet, and has a myriad of vulnerable and misconfigured machines on it at any time. | The VTLUUG's wargame is an opportunity for students interested in network security to learn and develop their skills in a safe and legal hacking environment. The wargame network is completely isolated from the Internet, and has a myriad of vulnerable and misconfigured machines on it at any time. | ||
− | Virginia Tech | + | Any Virginia Tech student can log on to the network by [http://wargame.vtluug.org/play.html following these instructions] using their PID credentials. |
− | Due to the open | + | Due to the open nature of the network, students can practice their network penetration skills in a real life environment. As players exploit the targets and attempt to lock down the computer, the dynamics of the environment will change requiring students to adapt and keep an open mind. Furthermore, when a player successfully attacks a machine, he/she will have to switch hats and begin defending the target from others. Due to this game dynamic, students will develop offensive and defensive network security skills. |
== Current Round == | == Current Round == |
Revision as of 04:40, 31 January 2011
The VTLUUG's wargame is an opportunity for students interested in network security to learn and develop their skills in a safe and legal hacking environment. The wargame network is completely isolated from the Internet, and has a myriad of vulnerable and misconfigured machines on it at any time.
Any Virginia Tech student can log on to the network by following these instructions using their PID credentials.
Due to the open nature of the network, students can practice their network penetration skills in a real life environment. As players exploit the targets and attempt to lock down the computer, the dynamics of the environment will change requiring students to adapt and keep an open mind. Furthermore, when a player successfully attacks a machine, he/she will have to switch hats and begin defending the target from others. Due to this game dynamic, students will develop offensive and defensive network security skills.
Current Round
Targets in the current round:
Name | IP | Hint |
---|---|---|
Brute | 10.10.3.20 | I hope you have a dictionary. |
Sploitable | 10.10.3.22 | Ever used metasploit? |