Difference between revisions of "Cyber Security Competition"

From the Linux and Unix Users Group at Virginia Teck Wiki
Jump to: navigation, search
imported>Cov
imported>Cov
(Spring 2010 Information)
Line 2: Line 2:
  
 
=Spring 2010 Information=
 
=Spring 2010 Information=
The Linux and Unix Users Group at Virginia Tech will host a computer and network (in)security competition as part of the [[Student Engineers' Council]]'s [[E-Week]]. Participants should bring a computer with the necessary tools installed, power cord and Ethernet cable. Boxen to pwn will be provided. [https://secure.hosting.vt.edu/www.calendar.vt.edu/main.php?view=event&eventid=1265657761994 Calendar entry].
+
The Linux and Unix Users Group at Virginia Tech will host a computer and network (in)security competition as part of the [[Student Engineers' Council]]'s [[E-Week]]. Participants should bring a computer with several gigabytes of free space, laptop power cord, if necessary, and Ethernet cable. Boxen to pwn will be provided. [https://secure.hosting.vt.edu/www.calendar.vt.edu/main.php?view=event&eventid=1265657761994 Calendar entry].
  
 
==Format==
 
==Format==
Line 13: Line 13:
 
Messing with others' vulnerable servers, patching the existing vulnerable system, and reverse-engineering and re-implementing the not-too-complicated server will all be options.
 
Messing with others' vulnerable servers, patching the existing vulnerable system, and reverse-engineering and re-implementing the not-too-complicated server will all be options.
  
The servers will be virtual machine images.
+
The vulnerable service will be intended for a BackTrack based virtual machine image.
 +
 
 +
==Rules==
 +
* Read the university's acceptable use policy.
 +
* Obey the university's acceptable use policy.
 +
* Do not red pill or otherwise break out of virtual machines.
 +
* Technical measures may be implemented by the judges to mitigate excessive network traffic.
 +
 
 +
==Suggested Configuration==
 +
It is highly recommended to only access the wired competition with a virtual machine and not connect the virtual machine directly to the Internet.
 +
* [[VirtualBox]] running a BackTrack based virtual machine bridged to your Ethernet card.
 +
* Host machine connected via WiFi to the Internet.
 +
* Single, isolated, read-only shared folder between host machine and virtual machine for extra tools.

Revision as of 15:33, 1 March 2010

The Cyber Security Competition is a hacking competition hosted by the Linux and Unix Users Group.

Spring 2010 Information

The Linux and Unix Users Group at Virginia Tech will host a computer and network (in)security competition as part of the Student Engineers' Council's E-Week. Participants should bring a computer with several gigabytes of free space, laptop power cord, if necessary, and Ethernet cable. Boxen to pwn will be provided. Calendar entry.

Format

The structure and scoring of the event is still under development, but we have the following goals:

  • Everyone should be able to make some progress and make it onto the score board
  • Points can be scored for:
    • Pwning boxen
    • Keeping your own vulnerable server up

Messing with others' vulnerable servers, patching the existing vulnerable system, and reverse-engineering and re-implementing the not-too-complicated server will all be options.

The vulnerable service will be intended for a BackTrack based virtual machine image.

Rules

  • Read the university's acceptable use policy.
  • Obey the university's acceptable use policy.
  • Do not red pill or otherwise break out of virtual machines.
  • Technical measures may be implemented by the judges to mitigate excessive network traffic.

Suggested Configuration

It is highly recommended to only access the wired competition with a virtual machine and not connect the virtual machine directly to the Internet.

  • VirtualBox running a BackTrack based virtual machine bridged to your Ethernet card.
  • Host machine connected via WiFi to the Internet.
  • Single, isolated, read-only shared folder between host machine and virtual machine for extra tools.