Your SlideShare is downloading. ×
  • Like
It security cft
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

It security cft

  • 170 views
Published

 

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
170
On SlideShare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
0
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Morten Juhl JørgensenMads Angelbo Pedersen 29/09/2011
  • 2.  What is CFT Game Style Overview Info Alternatives Demo Questions
  • 3. Capture The Flag
  • 4.  The task is to maintain a server running multiple services, while simultaneously trying to get access to the other teams servers. Each successful penetration gains points, as well as keeping services up and functional during the course of the game.
  • 5.  The exercise consists of multiple teams, each hosting a server that has multiple services running, The services contain typical security vulnerabilities that allow to compromise the server to a certain extend. The goal is to maintain the services up, functional and uncompromised for the duration of the game. Additional scores can be gained by patching the vulnerabilities of the services and exploiting the knowledge of the found weaknesses at the other teams servers.
  • 6.  There are some alternatives to CFT like: ◦ WarGames : a Typical server program or VM the you can Download and attack without any Time pressure ◦ Crakme’s : Programs where you try to Reverse Engineer and make a Serial number generator ◦ Non safe Applikations : ” Damn vulnerable Linux” ” Web Goat ”
  • 7. Will be non 
  • 8.  http://www.the- playground.dk/index.php?page=wargames http://sourceforge.net/projects/ctfd/ http://prosa-ctf.the-playground.dk/ http://www.cipher- ctf.org/CaptureTheFlag.php http://mirrors.dotsrc.org/blivklogere/njlug/2 010-09-16_CTF/ctf.pdf http://inctf.in/ctf/what/