Download presentation
Presentation is loading. Please wait.
Published byJustin Baker Modified over 9 years ago
1
Mark Shtern
2
Secure your infrastructure using IDS, application firewalls, or honeypots Plant your flag on opponent’s machine Prevent intruders from planting their flag Remove your opponents’ flag Identify intrusions Discover your opponents’ password hashes and brute force them
3
You are not allowed to configure any network firewalls (yours or an opponent’s) You are not allowed to configure intrusion prevention You are allowed to kill any process that belongs to an intruder You are allowed to change your opponent’s passwords
4
Deploy IT services Telnet Domain controller DHCP Web Server Network File Sharing Open at least 3 ports on each Linux workstations Create at least 3 user accounts in each Linux/Windows workstation
5
Plant/Find Backdoor 5 Plant a flag 20 Catch intrusion 10 Change an opponent’s password 10 Take ownership of an opponent’s complete infrastructure 40 Lose control of a Windows workstation -5 Lose control of a Linux workstation -10 Lose control of a DC -20
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.