I-Hack’08 International Hacking Competition “Details”

Slides:



Advertisements
Similar presentations
Cybersecurity Training in a Virtual Environment By Chinedum Irrechukwu.
Advertisements

1 Reading Log Files. 2 Segment Format
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 5 Port Scanning.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning Last updated
Sniffing, Spoofing, Hijacking This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
Barracuda Web Application Firewall
Case Studies for Projects. Network Audit A brief description of the systems (via fingerprinting, if black box is used) Network perimeter should be described.
System and Network Security Practices COEN 351 E-Commerce Security.
CounterMeasures: An Interactive Game for Security Training Advised by: Mark Claypool Kathi Fisler Craig Jordan (IMGD) Matt Knapp (CS) Dan Mitchell (CS)
Welcome to EECS 354 Network Penetration and Security.
Demonstrating HTTP Session Hijacking through ARP Cache Poisoning and Man-in-the-Middle Attack and exploring HTTPS and VOIP session vulnerabilities Mainuddin.
CAPTURE THE FLAG (CTF) Maxim A. Kulakov (Vladimir State University)
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
A Virtual Environment for Investigating Counter Measures for MITM Attacks on Home Area Networks Lionel Morgan 1, Sindhuri Juturu 2, Justin Talavera 3,
PicoCTF: Inspiring Tomorrow’s Cyber Security Workforce and Leaders Jonathan Burket
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Capture The Flag Review Fall 2003 Giovanni Vigna University of California Santa Barbara
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
The Operator Neutral Access At KistaIP. KistaIP ? Is a student dorm with 144 apartments.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
April 14, 2008 Secure Coding Faculty Workshop Web Application Security: Exercise Development Approaches James Walden
What’s Going On? This is a “Capture The Flag” hacking contest Teams from a number of Universities/Institutions compete against each other Each team has.
Security Services Agenda Overview of HEAnet security services HEAnet CERT (Computer Emergency Response) Anti-Spam RBL (Real time blacklist service) HEAnet.
Computer & Network Security
Honeypot and Intrusion Detection System
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Software Security Testing Vinay Srinivasan cell:
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
1 CHAPTER 2 LAWS OF SECURITY. 2 What Are the Laws of Security Client side security doesn’t work Client side security doesn’t work You can’t exchange encryption.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
IT Essentials 1 Chapter 9 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
 Jaden Terry.  To obtain privacy and protect data from other people. o Businesses Customer/Employee information Credit card numbers To gain a competitive.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
CANVAS REPORT/rvispute 16/4/2016 CANVAS Report for CTF Event at USAFA on 4/25/2007 Subject :Penetration Tools for Front Range Pen Test Exercise By Rajshri.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
ISCTF 2015 Capture The Flag Competition
7200 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/4- OfficeServ 7200 Enterprise IP Solutions - Data Server –
Hands-On Ethical Hacking and Network Defense
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
Education – Partnership – Solutions Information Security Office of Budget and Finance Christopher Giles Governance Risk Compliance Specialist The Internet.
Information Security tools for records managers Frank Rankin.
.  User groups o Cisco, SQL, Virtualization  Conferences o GrrCON, SQL Saturday  Hands-On o Capture the Flag o Forensics  RSS  Exploit-DB updates.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
The Victorian Games & Apps Challenge Design Brief (PowerPoint)
Network security Vlasov Illia
Web Application Protection Against Hackers and Vulnerabilities
Critical Security Controls
Chapter 7: Identifying Advanced Attacks
Backdoor Attacks.
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Get thinking: What is the problem, issue or challenge you want to take on? 
CANVAS Report for CTF Event at USAFA on 4/25/2007
PT0-001 Dumps PDF CompTIA PenTest+ Exam Exam Code Exam Name.
CS4622: Computer Networking
Information Security Session October 24, 2005
Intro to Ethical Hacking
Bethesda Cybersecurity Club
Presentation transcript:

i-Hack’08 International Hacking Competition “Details”

1. International Hacking Competition Student Computer Security Project Presentation 3. Computer Security Exhibition 4. Computer Security Seminar 5. Computer Security Awareness Talk 6. Hack And Defense Workshop 7. PC Modification Competition 8. Hacking Demonstration EVENTS

Hacking Competition Category 1st Category – Capture The Flag (CTF) The CTF game will be similar to the War game in pulltheplug.org website. Eg. “blacksun.labs.pulltheplug.org” Players log in to the web server (https) The web server has the instructions on how to obtain these flags. All players will get the same number of questions, but questions will be slightly difference.

Participation : Open to public and students Group : Must consists of 3 persons per group Fees : RM per group for students (attachment of student card is required) RM per group for non students Limitation : 2 groups only per organization / university

CTF Participants should be expected to be able to: Familiar with most common OS commands (windows and linux) Understand all basic hacking skills such as port scanning, information gathering, enumeration of user account, etc. Know how to find and use exploit when necessary. Familiar with web based attack such as SQL injection, PHP attacks, etc. Have the ability to reverse engineer binary and find vulnerabilities. Write buffer overflow exploit

2nd Category – Computer Forensic Challenges It will include both the basic and the code audit skills. The participants will be given source code to look for simple bug and write an exploit. given some log files from the server and participants need to analyze these logs in order to know what is happening to this server. then need to explain the scenario in written form. Winner will be judged based on how many attacks that they have analyzed on the log files. If there is a tie, the group with the highest level of attack difficulty analyzed, will be declared as the winner.

Participant : Open to public and students Group : Must consists of 3 persons per group Fees : RM per group for students (please attach student card) RM per group for non student Limitation : 2 groups only per organization / university

Forensic participants are expected to be able to: Apply most common OS commands (windows and Linux) Capture, read and understand most network packet/protocol Know where to find log files that are needed for forensic Apply common hacking techniques/exploits (as a guide to identify attackers trace) Use snort rules reverse engineer binary

Rules and Regulation 1.You need to attend the briefing session before the competition. 2. Flood Network, DOS, DDOS by any means are not allowed (a penalty will be imposed). 3. Social Engineering is not allowed (a penalty will be imposed). 4. No discussion with other group (the penalty will be charged). 5. The result from jury cannot be argued. 6. No attacking or exploiting of network infrastructure devices, such as switches, routers, etc (e.g. ARP cache poisoning, switch MAC table flooding and traffic rerouting are NOT allowed). 7. No attacking or exploiting other participant's systems. 8. No shutting down, disabling or patching of vulnerable systems. 9. No changing, spoofing of MAC address allowed. 10. No removal of flag. 11. No physical attacks, drugs and guns are allowed. 12. Participants must follow Rules and Regulations from number 1 until number 12.

~PRIZES~ 1 ST PLACE : RM certificate + hamper 2 nd PLACE : RM certificate + hamper 3 rd PLACE : RM certificate + hamper

Student Computer Security Project Presentation Students will be presenting about their computer security project. Students will join the exhibition from day 1 till day 3. Fees : None Participant : Open to all public or private education institutes students. (limited to first 30 groups only) Group : 2 or 3 persons per group Project : Any computer security related project. It is recommended you show some new idea / solution in solving computer security problem.

Exhibition Computer Security Exhibition is a platform and opportunity for student and computer security organization to promote their new solution and idea to public about computer security. From here, people will be updated with the new computer security product such as firewall, antivirus, and others. Exhibition time : 8.30 am pm for 3 continuous days.

Computer Security Seminar Computer Security Seminar will discuss issues that rapidly happening in computer security field. There will be 3 sessions: 1.Computer Security Seminar 1 2.Computer Security Seminar 2 3.Computer Security Seminar 3 Fee : FREE Admission Attendee : Student - unlimited Organization - 5 persons max

Hack and Defense Workshop a program with a purpose to teach student how to defense their machine from becoming an attacker’s victim. The workshop aims to give practical hands-on training related to computer defense Fees : RM Participant : Students only

PC Modification Competition This competition is about personal computer modification and adjustment both in the performance and security aspects. Participant : Students from public or private higher education institutions Number of participant : 1 person per PC Fees : RM Rules and Regulation : PCs are NOT provided.

PC Modification Competition Elements/ criteria that will be evaluated : 1. Performance 2. Stability 3. Reliability 4. Temperature 5. Security 6. Physical design

PRIZES!! 1 ST PLACE : RM certificate + hamper 2 nd PLACE : RM certificate + hamper 3 rd PLACE : RM certificate + hamper

website Online registration: End of June ~ End of July