It security cft

361 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
361
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

It security cft

  1. 1. Morten Juhl JørgensenMads Angelbo Pedersen 29/09/2011
  2. 2.  What is CFT Game Style Overview Info Alternatives Demo Questions
  3. 3. Capture The Flag
  4. 4.  The task is to maintain a server running multiple services, while simultaneously trying to get access to the other teams servers. Each successful penetration gains points, as well as keeping services up and functional during the course of the game.
  5. 5.  The exercise consists of multiple teams, each hosting a server that has multiple services running, The services contain typical security vulnerabilities that allow to compromise the server to a certain extend. The goal is to maintain the services up, functional and uncompromised for the duration of the game. Additional scores can be gained by patching the vulnerabilities of the services and exploiting the knowledge of the found weaknesses at the other teams servers.
  6. 6.  There are some alternatives to CFT like: ◦ WarGames : a Typical server program or VM the you can Download and attack without any Time pressure ◦ Crakme’s : Programs where you try to Reverse Engineer and make a Serial number generator ◦ Non safe Applikations : ” Damn vulnerable Linux” ” Web Goat ”
  7. 7. Will be non 
  8. 8.  http://www.the- playground.dk/index.php?page=wargames http://sourceforge.net/projects/ctfd/ http://prosa-ctf.the-playground.dk/ http://www.cipher- ctf.org/CaptureTheFlag.php http://mirrors.dotsrc.org/blivklogere/njlug/2 010-09-16_CTF/ctf.pdf http://inctf.in/ctf/what/

×