Difference between revisions of "Cyber Security Competition"
imported>Cov (→=Potential Auralization Software) |
imported>Cov (→Potential Auralization Software) |
||
Line 36: | Line 36: | ||
===Potential Auralization Software=== | ===Potential Auralization Software=== | ||
− | None of the software suveyed sounded completely suitable. It is important that the sounds convey the right ambience--maybe one akin to Uplink. [http://peep.sourceforge.net/intro.html Peep] seems to be the best software available, perhaps changing its sounds and connecting it to Snort logs would work. | + | None of the software suveyed sounded completely suitable. It is important that the sounds convey the right ambience--maybe one akin to Uplink. [http://peep.sourceforge.net/intro.html Peep] seems to be the best software available, perhaps changing its sounds and connecting it to Snort logs would work. The original Peep paper by Gilfix and Couch is probably useful to read. [http://www.inbflat.net/ In Bb 2.0] may be a good example of man-made, nicely meshing sounds. |
Revision as of 22:28, 2 March 2010
The Cyber Security Competition is a hacking competition hosted by the Linux and Unix Users Group.
Contents
Spring 2010 Information
The Linux and Unix Users Group at Virginia Tech will host a computer and network (in)security competition as part of the Student Engineers' Council's E-Week. Participants should bring a computer with several gigabytes of free space, laptop power cord, if necessary, and Ethernet cable. Boxen to pwn will be provided. Calendar entry.
Format
The structure and scoring of the event is still under development, but we have the following goals:
- Everyone should be able to make some progress and make it onto the score board
- Points can be scored for:
- Pwning boxen
- Keeping your own vulnerable server up
Messing with others' vulnerable servers, patching the existing vulnerable system, and reverse-engineering and re-implementing the not-too-complicated server will all be options.
The vulnerable service will be intended for a BackTrack based virtual machine image.
Rules
- Read the university's acceptable use policy.
- Obey the university's acceptable use policy.
- Do not red pill or otherwise break out of virtual machines.
- Technical measures may be implemented by the judges to mitigate excessive network traffic.
Suggested Configuration
It is highly recommended to only access the wired competition with a virtual machine and not connect the virtual machine directly to the Internet.
- VirtualBox running a BackTrack based virtual machine bridged to your Ethernet card.
- Host machine connected via WiFi to the Internet.
- Single, isolated, read-only shared folder between host machine and virtual machine for extra tools.
Spectating
Anyone who is interested is encouraged to come watch. We will be attempting to provide visually and aurally appealing and relevant network traffic information on big large screens.
Potential Visualization Software
Potential Auralization Software
None of the software suveyed sounded completely suitable. It is important that the sounds convey the right ambience--maybe one akin to Uplink. Peep seems to be the best software available, perhaps changing its sounds and connecting it to Snort logs would work. The original Peep paper by Gilfix and Couch is probably useful to read. In Bb 2.0 may be a good example of man-made, nicely meshing sounds.