CAPTURE THE FLAG (CTF) Maxim A. Kulakov (Vladimir State University)

Slides:



Advertisements
Similar presentations
Middleware technology and software quality issues Andrew McNab Grid Security Research Fellow University of Manchester.
Advertisements

By Hiranmayi Pai Neeraj Jain
Web Server Administration TEC 236 Securing the Web Environment.
Security & Exploitation
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
CounterMeasures: An Interactive Game for Security Training Advised by: Mark Claypool Kathi Fisler Craig Jordan (IMGD) Matt Knapp (CS) Dan Mitchell (CS)
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
CS 290C: Formal Models for Web Software Lecture 1: Introduction Instructor: Tevfik Bultan.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Chapter 6: Hostile Code Guide to Computer Network Security.
Internet Basics مهندس / محمد العنزي
Capturing Computer Evidence Extracting Information.
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
Internet.
UC Security with Microsoft Office Communication Server R1/R2 FRHACK Sept 8, 2009 Abhijeet Hatekar Vulnerability Research Engineer.
Stealthy Video Capturer: Video- based Spyware in 3G Smartphones Stefan Maurer Liz Ellis.
ISEC0511 Programming for Information System Security
EECS 354 Network Security Introduction. Why Learn To Hack Understanding how to break into computer systems allows you to better defend them Learn how.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Web Server Administration Chapter 10 Securing the Web Environment.
What is FORENSICS? Why do we need Network Forensics?
What’s Going On? This is a “Capture The Flag” hacking contest Teams from a number of Universities/Institutions compete against each other Each team has.
 International  UCSB Sponsored  Application security  ! network security  ! os security  Custom services 2.
Honeypot and Intrusion Detection System
CHAPTER FOUR COMPUTER SOFTWARE.
PicoCTF: Teaching 10,000 High School Students to Hack Peter Chapman 1/15/2014 Carnegie Mellon University This material is based upon work.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
Chapter 8 Browsing and Searching the Web. Browsing and Searching the Web FAQs: – What’s a Web page? – What’s a URL? – How does a browser work? – How do.
Network Security Section 1: Introduction to security.
CAPTURE THE FLAG Introductions beer brew man dutchrowboat.
I-Hack’08 International Hacking Competition “Details”
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
Root-Fu ; Rise of the Ninjas Introduction to Root-Fu DCX -> interz0ne -> DC11 Show me the sploitage! Rants, Raves, and Moving Forward.
Discovering Computers Fundamentals, 2010 Edition Living in a Digital World Chapter Five SOFTWARE.
 The combination of sound, animation, graphics, video, and color into a document  The combination of text with graphics, sound, video, or animation.
Investigating Sophisticated Security Breaches Digital Forensics has proven tough in the age of sophisticated Intruders.
4061 Session 26 (4/19). Today Network security Sockets: building a server.
ICOM 5995 (crypto) - Noack Crypto - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus.uprm.edu/~noack/ Make.
ISCTF 2015 Capture The Flag Competition
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
EECS 354: Network Security Group Members: Patrick Wong Eric Chan Shira Schneidman Web Attacks Project: Detecting XSS and SQL Injection Vulnerabilities.
Introduction  Program: Set of sequence instruction that tell the computer what to do.  Software: A collection of programs, data, and information. 
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Project CTF Yeganeh Safaei Arizona State University
GENI, Pen Testing, & other stories
Ilija Jovičić Sophos Consultant.
Marking the Most of the Web’s Resources
STEGANOGRAPHY.
Message Digest Cryptographic checksum One-way function Relevance
Capture The Flag: A Brief History
Security.
Cloud-based Resources for Cybersecurity Education and Training
The Internet: Encryption & Public Keys
CTFs – Not Just for Halo Ray Doyle
Intrusion.
Bethesda Cybersecurity Club
Presentation transcript:

CAPTURE THE FLAG (CTF) Maxim A. Kulakov (Vladimir State University)

Information security training/studying problems University programs on Information security Too much theory, the lack of practice DEFENSE – YES, ATTACK - NO Motivation No community

Capture the Flag? What is it? Capture the Flag (CTF) is a computer security competition. Originally a children’s game to simulate small team combat, based on defending an immobile flag while trying to capture the flag of the other team.

CTF Styles CTF Styles: Attack/defense style (classic) Jeopardy-style (task-based) CTF network types: Online (Internet) Offline (Local) Participating style: Team Individual

Attack/defense CTF multi-site, multi-team hacking contest in which a number of teams compete independently against each other

Attack/defense CTF Rules TEAMS ARE ALLOWED TO Do whatever they want within their network segment. Most likely the team wouldlike to patch vulnerabilities in their services or block exploitation of vulnerabilities; Attack other teams. TEAMS ARE PROHIBITED TO Filter out other teams' traffic; Generate large amount of traffic that poses a threat to network stability of organizers facilities; Generate large amount of traffic that poses a threat to network stability of any other team; Attack teams outside of the VPN; Attack the game infrastructure facilities operated by organizers.

Attack/defense CTF Network example

Task-based CTF involve multiple categories of problems, each of which contains a variety of questions of different point values.

Jeopardy CTF Categories Main: PWN Web Security Cryptography Reverse engineering Digital Forensic Steganography Additional: Miscellaneous PPC Admin Trivia

Jeopardy CTF – Categories PWN Remote system/service X86-32, x86-64, ARM Sources - NO, compiled binary file - YES Discover vulnerability and create exploit Hard for newcomers! (require special knowledge and experience) Example: find buffer overflow vulnerability in the Linux binary, exploit the remote training system and get the flag

Jeopardy CTF – Categories Web Security Remote web application CGI, PHP, Python, Ruby, Perl, etc. Sources – SOMETIME Discover vulnerability and hack the site Complex and “exotic” vulnerabilities Example: find SQL-injection vulnerability at the training site and get the flag from the site’s database

Jeopardy CTF – Categories Cryptography Cipher text Symmetric/assymmetric, historical, special cryptosystems Crypto algorithm/application – SOMETIME Decrypt cipher text, find weakness in crypto algorithm Example: analyze cryptosystem and decrypt the cipher text

Jeopardy CTF – Categories Reverse engineering Binary file X86-32, x86-64, ARM, VMs Windows, Linux, Android, iPhone, etc. Analyze binary and get the flag Hard for newcomers! (require special knowledge and experience) Example: analyze and get registration code (flag) for Windows binary

Jeopardy CTF – Categories Digital Forensic Network dump, memory dump, hard disk image, etc. File systems, network protocols, file formats, forensic software, etc. Information gathering, data recovering, computer criminalistic expertise, etc. NOT hard for newcomers! Example: analyze the hard disk image and recover the deleted file with flag

Jeopardy CTF – Categories Steganography Media file (graphic image, sound file, video file), network dump, etc. Classical or special steganography algorithms Analyze the source data/container and extract the hidden message NOT hard for newcomers! Example: detect the LSB steganography in the BMP image and extract the flag

CTF Competitions DEFCON (Las Vegas, USA) iCTF (Internet, Santa Barbara, USA) CODEGATE (Seul, South Korea) RuCTFE (Internet, Yekaterinburg, Russia) CSAW (New York, USA) rwthCTF (Internet, Aachen, Germany) PHDays (Moscow, Russia) Hack.Lu CTF (Internet, Luxembourg) RuCTF (Yekaterinburg, Russia)

Want to try? Task-based – CSAW CTF (19-21 September) – Hack.Lu CTF (21-23 October) Attack/Defense style – RuCTFE (November-December) – iCTF (November-December) – rwthCTF (November-December) Honeypot CTF – – Hackquest

Honeypot CTF Team (Vladimir State University) WWW: H0N3YP0T.RU

What CTF can give? Knowledge Practice Research area Motivation Friends Fun

Conclusions CTF is KNOWLEDGE CTF is INTERESTING CTF is USEFUL CTF is FUN

Hackquest Tomorrow (13.00 – 16.00) Simple tasks from all CTF categories You need notebook + Internet One team or multiple teams? Storyline is a paranoid delusion of the author (me )