 International  UCSB Sponsored  Application security  ! network security  ! os security  Custom services 2.

Slides:



Advertisements
Similar presentations
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Advertisements

System and Network Security Practices COEN 351 E-Commerce Security.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Assessing Vulnerabilities ISA 4220 Server Systems Security James A. Edge Jr., CISSP, CISM, CISA, CPTE, MCSE Sr. Security Analyst Cincinnati Bell Technology.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
Network security policy: best practices
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Web Programming Language Dr. Ken Cosh Week 1 (Introduction)
Google AppEngine. Google App Engine enables you to build and host web apps on the same systems that power Google applications. App Engine offers fast.
Amazon EC2 Quick Start adapted from EC2_GetStarted.html.
Capture The Flag Review Fall 2003 Giovanni Vigna University of California Santa Barbara
Load Test Planning Especially with HP LoadRunner >>>>>>>>>>>>>>>>>>>>>>
CTF Mike Gerschefske Justin Gray. What is it? Came from Defcon Came from Defcon UCSB sp0nsorz – won last years Defcon UCSB sp0nsorz – won last years Defcon.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Best Practices in Moodle Administration Best Practices in Moodle Administration A variety of topics from technical to practical Jonathan Moore Vice President.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Cyber Patriot Training
Brad Baker CS526 May 7 th, /7/ Project goals 2. Test Environment 3. The Problem 4. Some Solutions 5. ModSecurity Overview 6. ModSecurity.
Demystifying Backdoor Shells and IRC Bots: The Risk … By : Jonathan.
APT29 HAMMERTOSS Jayakrishnan M.
Switch Concepts and Configuration and Configuration Part II Advanced Computer Networks.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
What’s Going On? This is a “Capture The Flag” hacking contest Teams from a number of Universities/Institutions compete against each other Each team has.
IST 210 Web Application Security. IST 210 Introduction Security is a process of authenticating users and controlling what a user can see or do.
Sri Lanka Institute of Information Technology Software Engineering Project – I Clone of Rally GROUP NO : WD-SEP-002 | PROJECT NO :25 PROJECT : CLONE OF.
Web Server Administration Chapter 7 Installing and Testing a Programming Environment.
Implementing a Port Knocking System in C Honors Thesis Defense by Matt Doyle.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
CAPTURE THE FLAG Introductions beer brew man dutchrowboat.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
I-Hack’08 International Hacking Competition “Details”
Training and Dissemination Enabling Grids for E-sciencE Jinny Chien, ASGC 1 Training and Dissemination Jinny Chien Academia Sinica Grid.
Just Because… Chat / Instant Messenging Application Multiple conversations Convenient (Away, Mobile Page, Etc.) Enhance collaboration efforts Simple –
Topics Network topology Virtual LAN Port scanners and utilities Packet sniffers Weak protocols Practical exercise.
1 Linux Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Root-Fu ; Rise of the Ninjas Introduction to Root-Fu DCX -> interz0ne -> DC11 Show me the sploitage! Rants, Raves, and Moving Forward.
CERN IT Department CH-1211 Genève 23 Switzerland t Security Overview Luca Canali, CERN Distributed Database Operations Workshop April
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
SSH Tricks for CSF Slide 1 NEbraskaCERT SSH Tricks Matthew G. Marsh 05/21/03.
1 Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise your system.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Computer Security Status C5 Meeting, 2 Nov 2001 Denise Heagerty, CERN Computer Security Officer.
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Web Server Security: Protecting Your Pages NOAA OAR WebShop 2001 August 2 nd, 2001 Jeremy Warren.
SupervisorMr. Phan Trường Lâm Group Members01446 – Trịnh Anh Đức – Nguyễn Minh Thành SE02311 –Phạm Tuấn Anh SE02425 – Vũ Hoàng Anh 1.
 Project Team: Suzana Vaserman David Fleish Moran Zafir Tzvika Stein  Academic adviser: Dr. Mayer Goldberg  Technical adviser: Mr. Guy Wiener.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Project CTF Yeganeh Safaei Arizona State University
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
100% REAL EXAM QUESTIONS ANSWERS
Introduction to Networking
Chapter 27: System Security
Lab 7 - Topics Establishing SSH Connection Install SSH Configure SSH
Linux Security.
Test 3 review FTP & Cybersecurity
6. Application Software Security
Bethesda Cybersecurity Club
Presentation transcript:

 International  UCSB Sponsored  Application security  ! network security  ! os security  Custom services 2

 About a dozen  Unknown protocol or purpose  Variety of languages  Lots of flaws  Might be  interdependent  encrypted  obfuscated  compiled 3

 Checks services each round  Sets “flags” in services  Updates status page  Receives stolen “flags” 4

5  This is a General Rule  See exact rules on the game day

 Additional tasks for points  Copious  Various difficulty levels  Enough points to count  Adds to confusion 6

7

 Tight teams around services  Responsible for  Patching  Exploiting  Monitoring **  Backing up  Reverting if broken  Challenge chasers  Administrators 8

 Learn, interpret, and explain rules  Prioritize efforts  Keep network running  Keep services up  Patch gapping holes  Submitting flags  Developing exploits **  Challenges  Direct people into groups  Obtain refreshments – GTISC 9

 Learn  Bash, Python, PHP, Perl, Java, JS, C,.Net, MySQL  Reverse engineering, Java decompilation  Build  Network  Tools for quick analysis **  Infrastructure for communication  Practice  Patching services, exploitation  Working as a team? 10

 Everyone  SSH key-based login .ssh/config  SCP or SFTP  SVN or Other VCS 11

host sniffer hostname user ctf identityfile ~/.ssh/id_rsa_sniffer host vuln hostname 10.X.1.3 user root port identityfile ~/.ssh/id_rsa_vuln  Have these keys available prior to the game (practice) 12

 From Hackerz  svn co ▪ User: ctf ▪ Password: wearethew1nningteam!  svn add  svn up  svn ci  svn st  svn diff  svn log  From Vulnerable Image  svn co  svn up  no check in except the initial version

 Service splitter (tcpflow/editcap/custom)  Process monitor/hider (htop/custom-ptrace)  Flag broker (custom)  Traffic rate-limiter (tc)  Top-talkers list (ntop/custom-libpcap)  Service monitor and reporter (custom)  Monitors when a service goes down or up and informs the responsible team  SVN, SSH, Chat room, etc.

 01:00 Receive encrypted VMware image  09:15 Arrive, Eat**, Chat  09:50 Organize into tentative groups  10:00  Receive rules, Receive decryption key  Start image  Back up services on image !!!!!!!  Assign services - reorganize teams  11:00 Start competition  No changes to services before competition

 Expect the unexpected  Some points from 2008: ▪ Key for fake image was “ucsb” ▪ Only attackers were needed ▪ More emphasis on challenges (New languages/ technologies – Haskell, PDF exploit)  Always backup patches / firewall un-patched services  Need for good co-ordination – Chat  Put in your best and keep your cool ! 16

 Who will lead?  What skills do we lack?  How do we get the skills we need?  What tools do we need?  What should we eat?  How should we communicate?  We should organize a practice session, but when, who, how?  Does this serve our primary purpose of preparing you for InfoSec work?