Download presentation
Presentation is loading. Please wait.
Published byMarylou Clark Modified over 9 years ago
1
CAPTURE THE FLAG Introductions beer brew man dutchrowboat
3
Teams Firewall IDS/IPS Services – Attack and Defense PHP, Perl, Ruby, Python, Java Analysis Wireshark, etc. C/ASM Operating System Apache, OS Configuration, etc.
4
iCTF Came from Defcon iCTF ran by UCSB No test required – just edu “Largest existing live security exercise” Test Skills of understanding security
5
What is it? A variety of Internet enabled services Services comprised of: PHP Perl Shell Scripts C++ MySQL Apache/lighttpd SSH XML RPC FTP
6
What to do All services should be protected Patch IPS/IDS All services should be attacked
8
Blender SNAT with weights? Is it real?
9
Rules No DOS All traffic is penalized Must stay on internal network Don't prevent legitimate traffic Don't break rules If attack service, don't launch DOS from compromised machine 2005 Defcon – hack the scorebot
10
Attack Techniques Buffer overflows Format string attacks Shell attacks Race conditions Misconfigurations Authentication attacks Web-based attacks Directory traversal Cookie-based services Cross-site scripting Server-side applications Lack of parameter validation (e.g., SQL injection)
11
Skills Scanning Firewalling Intrusion Detection Vulnerability analysis For each type of vulnerability How to identify a vulnerability How to exploit a vulnerability How to patch a vulnerability (without disrupting the get/set flag methods) How to detect a vulnerability For each service How to monitor the requests to a service How to monitor the execution of a request Protocol security analysis Application security analysis
12
Vigna's Suggestions Have a structured team with clear responsibilities The Perl/Python/PHP group The SQL/database group The flaw-finder group The firewall group The IDS group The C-based exploit group Have a leader responsible for coordination and integration Have a way to intercept socket connections and apply regexes/substitutions Have vulnerability analysis tools handy Have a “human IDS” Remember: the game lasts only a few hours
13
Not the first time…
14
2009
16
Questions ? http://athena.uccs.edu/ictf
17
Backups…
18
Test Network Real Network Image 10.10.1.2 10.10.1.3 Vuln 10.10.1.4 Team Hub Team Box 10.10.1.1 Mon Box 10.10.1.x Attack Boxes Console for Fixes Image Test Box Vuln Patch Test Vuln Attack Box UCCS Boxes UCCS Boxes
19
Some Examples echo GET / | nc 10.110.134.123 80 >./myoutput.txt http://10.100.134.77/users/url3@l. php?command=nc -lp 1337 -e /bin/bash http://10.100.134.77/users/url3@l. php?command=nmap -p 1-65535 10.120.134.222 > port.txt
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.