Download presentation
Presentation is loading. Please wait.
1
Game Mark Shtern
2
Game Objectives Secure your infrastructure using IDS, application firewalls, or honeypots Hide your flag Prevent intruders from copying/deleting your flag Copy your opponents’ flag Identify intrusions Discover your opponents’ password hashes and brute force them The flag is signed file. Students cannot recreate flag.
3
Game Rules You are not allowed to configure any network firewalls (yours or an opponent’s) You are not allowed to configure intrusion prevention You are allowed to kill any process that belongs to an intruder You are allowed to move your flag between your computers You are allowed to change your opponent’s passwords
4
Scoring Plant (Find) Trojan 5 Collect (Lose) flag 20 (-20)
Catch intrusion 10 Change an opponent’s password 10 Take ownership of an opponent’s complete infrastructure 40 Lose control of a computer -10
5
PROJECT PENETRATION TESTING
Mark Shtern
6
Project penetration testing
Project presentation on Tuesday, November 30 Review other projects’ design Find security design flaws and vulnerabilities in other projects Post discovered flaws on the course forum Confirm / deny posted flaws of your project Final design presentation on Friday, December 10
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.