Changes

Jump to: navigation, search

Cyber Security Competition

744 bytes added, 15:33, 1 March 2010
Spring 2010 Information
=Spring 2010 Information=
The Linux and Unix Users Group at Virginia Tech will host a computer and network (in)security competition as part of the [[Student Engineers' Council]]'s [[E-Week]]. Participants should bring a computer with the necessary tools installedseveral gigabytes of free space, laptop power cord , if necessary, and Ethernet cable. Boxen to pwn will be provided. [https://secure.hosting.vt.edu/www.calendar.vt.edu/main.php?view=event&eventid=1265657761994 Calendar entry].
==Format==
Messing with others' vulnerable servers, patching the existing vulnerable system, and reverse-engineering and re-implementing the not-too-complicated server will all be options.
The servers vulnerable service will be intended for a BackTrack based virtual machine imagesimage. ==Rules==* Read the university's acceptable use policy.* Obey the university's acceptable use policy.* Do not red pill or otherwise break out of virtual machines.* Technical measures may be implemented by the judges to mitigate excessive network traffic. ==Suggested Configuration==It is highly recommended to only access the wired competition with a virtual machine and not connect the virtual machine directly to the Internet.* [[VirtualBox]] running a BackTrack based virtual machine bridged to your Ethernet card.* Host machine connected via WiFi to the Internet.* Single, isolated, read-only shared folder between host machine and virtual machine for extra tools.
Anonymous user

Navigation menu