The Art of CTF

{elysiumsecurity}
THE ART OF CTF
Version: 1.2a
Date: 28/08/2018
Author: Sylvain Martinez
Reference: ESC10-MUSCL
Classification: Public
cyber protection & response
{elysiumsecurity}
cyber protection & response
2
EXAMPLESBENEFITSCONCEPTCONTEXT
• What is a CTF? • Find the image!
• Look at this sound!
CONTENTS
Public
• Skills Challenges;
• Resources Challenges;
• Learning Challenges;
• Learn;
• Practice;
• Win;
{elysiumsecurity}
cyber protection & response
3
EXAMPLESBENEFITSCONCEPTCONTEXT
SKILLS CHALLENGES
Public
62% HAVE NOT INCREASED
SECURITY TRAINING BUDGET
1 OUT OF 3 SECURITY PROS NOT
FAMILIAR WITH NEW THREATS
Icons from the noun project unless specified otherwise, SOURCE: Business Wire 2014
83% OF ENTERPRISES LACK THE
RIGHT SKILLS AND RESOURCES TO
PROTECT THEIR IT ASSETS
{elysiumsecurity}
cyber protection & response
4
EXAMPLESBENEFITSCONCEPTCONTEXT
RESOURCES CHALLENGES
Public
1 MILLION UNFILLED SECURITY
JOBS WORDWIDE
92% OF HIRING MANAGER SEEKS
PAST EXPERIENCE IN SECURITY
SOURCE: Business Wire 2014 and CBR ONLINE 2017
<2.4% GRADUATING STUDENTS
HAVE SECURITY DEGREES
{elysiumsecurity}
cyber protection & response
5
EXAMPLESBENEFITSCONCEPTCONTEXT
LEARNING CHALLENGES
Public
EXPERIMENTATION DANGER
TRAINING CREATIVITY
{elysiumsecurity}
cyber protection & response
6
WHAT IS A CTF?
Public
EXAMPLESBENEFITSCONCEPTCONTEXT
A SAFE HACKING ENVIRONMENT
A GUIDED JOURNEY OF HACKING
CHALLENGES
CAPTURE THE FLAG
IS A LEARNING GAME
{elysiumsecurity}
cyber protection & response
7
WHAT IS A CTF?
Public
EXAMPLESBENEFITSCONCEPTCONTEXT
MOST CTF ARE FREE
MANY ARE AVAILABLE ONLINE
SOME REQUIRE PHYSICAL ACCESS
{elysiumsecurity}
cyber protection & response
8
WHAT IS A CTF?
Public
EXAMPLESBENEFITSCONCEPTCONTEXT
ACCESSIBLE TO ALL SKILL LEVELS
USUALLY FIND AN MD5 HASH
bac2e4a7dab0d89df5f672972910b8c4
MOST CTF OFFENSIVE
SOME DEFENSIVE
{elysiumsecurity}
cyber protection & response
9
LEARN
Public
EXAMPLESBENEFITSCONCEPTCONTEXT
YOU LEARN THE REAL IMPACT OF
KNOWN VULNERABILITIES
YOU LEARN THE REAL IMPACT OF
MISCONFIGURATION AND
PATCHING
YOU LEARN WHILST PLAYING A
GAME
{elysiumsecurity}
cyber protection & response
10
PRACTICE
Public
EXAMPLESBENEFITSCONCEPTCONTEXT
YOU PRACTISE REAL ATTACKS
YOU PRACTISE OUTSIDE THE BOX
THINKING
YOU PRACTISE OTHER IT SKILLS
{elysiumsecurity}
cyber protection & response
11
WIN!
Public
EXAMPLESBENEFITSCONCEPTCONTEXT
YOU GET A FREE TRAINING
GROUND
YOU MAY EVEN GET MONEY/GIFT
YOU GET PEERS RECOGNITION
{elysiumsecurity}
cyber protection & response
12
FIND THE IMAGE!
Public
EXAMPLESBENEFITSCONCEPTCONTEXT
SANS XMAS CHALLENGE 2015
PART 1, QUESTION 2
FIND THE IMAGE IN THE PCAP FILE
DNS
TRAFFIC
ONLY
{elysiumsecurity}
cyber protection & response
13
FIND THE IMAGE!
Public
EXAMPLESBENEFITSCONCEPTCONTEXT
ANYTHING STRANGE WITH THESE DNS QUERIES?
{elysiumsecurity}
cyber protection & response
14
FIND THE IMAGE!
Public
EXAMPLESBENEFITSCONCEPTCONTEXT
“1337” IS HACKING REFERENCE!
FOLLOW THE UDP STREAM
{elysiumsecurity}
cyber protection & response
15
FIND THE IMAGE!
Public
EXAMPLESBENEFITSCONCEPTCONTEXT
SAVE TEXT INTO A FILE AND EXTRACT THE ”EXTRA DNS
INFORMATION”
{elysiumsecurity}
cyber protection & response
16
FIND THE IMAGE!
Public
EXAMPLESBENEFITSCONCEPTCONTEXT
YOU GET THE IMAGE WHICH WAS TRANSMITTED OVER DNS
QUERIES
SANS XMAS CHALLENGE 2015
WRITE
https://www.elysiumsecurity.com/blog/Challenges/post6.html#two
{elysiumsecurity}
cyber protection & response
17
FIND THE IMAGE!
Public
EXAMPLESBENEFITSCONCEPTCONTEXT
YOU LEARNT HOW TO USE WIRESHARK AND INVESTIGATE
TRAFFIC FLOW
YOU LEARNT HOW TO EXTRACT DATA FROM A PACKET CAPTURE
YOU LEARNT OF A HACKING TECHNICS TO EXFILTRATE
INFORMATION FROM A LOCKED DOWN ENVIRONMENT
YOU LEARNT THAT GNOMES ARE EVIL!
{elysiumsecurity}
cyber protection & response
18
LOOK AT THIS SOUND!
Public
EXAMPLESBENEFITSCONCEPTCONTEXT
SANS BROCHURE CHALLENGE 2014
CHALLENGE 3, LEVEL 2
“LOOK AT AN AUDIO FILE”
REFERENCE TO AN SVN
COPYING REPO PRODUCES FILES BUT NO AUDIO FILE
LOOKING AT COMMAND OUTPUT
DONOTOPEN.MP3 GETS DELETED
EDIT THE REPO.SVN AND REMOVE DELETE INSTRUCTION
YOU HAVE A WAVE FILE!
{elysiumsecurity}
cyber protection & response
19
LOOK AT THIS SOUND!
Public
WHAT TO DO WITH THAT FILE?
EXAMPLESBENEFITSCONCEPTCONTEXT
“Which of the following would you most prefer? A) a puppy B) a
pretty flower from your sweetie or C) a large properly formed
data file? You have failed this reverse Turing test, now suffer the
consequences.. “
{elysiumsecurity}
cyber protection & response
20
LOOK AT THIS SOUND!
Public
EXAMPLESBENEFITSCONCEPTCONTEXT
SANS BROCHURE CHALLENGE 2015
WRITE UP:
https://www.elysiumsecurity.com/blog/Challenges/post2.html
SPECTROGRAM!
{elysiumsecurity}
cyber protection & response
21
LOOK AT THIS SOUND!
Public
EXAMPLESBENEFITSCONCEPTCONTEXT
YOU LEARNT TO PAY ATTENTION ABOUT WHAT IS BEING ASKED
YOU LEARNT HOW TO USE A REPOSITORY ENVIRONMENT
YOU LEARNT TO THINK OUTSIDE THE BOX AND… PERSEVERE!
YOU LEARNT A STEGANOGRAPHY TECHNIC
{elysiumsecurity}
cyber protection & response
© 2018 ELYSIUMSECURITY LTD.
All Rights Reserved
www.elysiumsecurity.com
ELYSIUMSECURITY provides practical expertise to identify
vulnerabilities, assess their risks and impact, remediate those
risks, prepare and respond to incidents as well as raise security
awareness through an organization.
ELYSIUMSECURITY provides high level expertise gathered
through years of best practices experience in large
international companies allowing us to provide advice best
suited to your business operational model and priorities.
ABOUT ELYSIUMSECURITY LTD.
ELYSIUMSECURITY provides a portfolio of Strategic and Tactical
Services to help companies protect and respond against Cyber
Security Threats. We differentiate ourselves by offering
discreet, tailored and specialized engagements.
ELYSIUMSECURITY operates in Mauritius and in Europe,
a boutique style approach means we can easily adapt to your
business operational model and requirements to provide a
personalized service that fits your working environment.
1 of 22

Recommended

Talk1 esc7 muscl-dataprotection_v1_2 by
Talk1 esc7 muscl-dataprotection_v1_2Talk1 esc7 muscl-dataprotection_v1_2
Talk1 esc7 muscl-dataprotection_v1_2Sylvain Martinez
183 views15 slides
OFFENSIVE IDS by
OFFENSIVE IDSOFFENSIVE IDS
OFFENSIVE IDSSylvain Martinez
286 views17 slides
Mobile Security Assessment by
Mobile Security AssessmentMobile Security Assessment
Mobile Security AssessmentSylvain Martinez
206 views16 slides
VIRTUAL CISO AND OTHER KEY CYBER ROLES by
VIRTUAL CISO AND OTHER KEY CYBER ROLESVIRTUAL CISO AND OTHER KEY CYBER ROLES
VIRTUAL CISO AND OTHER KEY CYBER ROLESSylvain Martinez
418 views10 slides
INCIDENT RESPONSE OVERVIEW by
INCIDENT RESPONSE OVERVIEWINCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEWSylvain Martinez
619 views15 slides
INCIDENT RESPONSE CONCEPTS by
INCIDENT RESPONSE CONCEPTSINCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTSSylvain Martinez
1.3K views39 slides

More Related Content

What's hot

OFFICE 365 SECURITY by
OFFICE 365 SECURITYOFFICE 365 SECURITY
OFFICE 365 SECURITYSylvain Martinez
457 views26 slides
Talk1 esc3 muscl-standards and regulation_v1_1 by
Talk1 esc3 muscl-standards and regulation_v1_1Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1Sylvain Martinez
196 views18 slides
2019 CYBER SECURITY TRENDS REPORT REVIEW by
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEWSylvain Martinez
1.8K views18 slides
INCIDENT RESPONSE NIST IMPLEMENTATION by
INCIDENT RESPONSE NIST IMPLEMENTATIONINCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATIONSylvain Martinez
5.5K views27 slides
2015 ISA Calgary Show: IACS Cyber Incident Preparation by
2015 ISA Calgary Show: IACS Cyber Incident Preparation2015 ISA Calgary Show: IACS Cyber Incident Preparation
2015 ISA Calgary Show: IACS Cyber Incident PreparationCimation
841 views15 slides
Ict conf td-evs_pcidss-final by
Ict conf td-evs_pcidss-finalIct conf td-evs_pcidss-final
Ict conf td-evs_pcidss-finalDejan Jeremic
659 views21 slides

What's hot(20)

Talk1 esc3 muscl-standards and regulation_v1_1 by Sylvain Martinez
Talk1 esc3 muscl-standards and regulation_v1_1Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1
Sylvain Martinez196 views
2019 CYBER SECURITY TRENDS REPORT REVIEW by Sylvain Martinez
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW
Sylvain Martinez1.8K views
INCIDENT RESPONSE NIST IMPLEMENTATION by Sylvain Martinez
INCIDENT RESPONSE NIST IMPLEMENTATIONINCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATION
Sylvain Martinez5.5K views
2015 ISA Calgary Show: IACS Cyber Incident Preparation by Cimation
2015 ISA Calgary Show: IACS Cyber Incident Preparation2015 ISA Calgary Show: IACS Cyber Incident Preparation
2015 ISA Calgary Show: IACS Cyber Incident Preparation
Cimation841 views
Ict conf td-evs_pcidss-final by Dejan Jeremic
Ict conf td-evs_pcidss-finalIct conf td-evs_pcidss-final
Ict conf td-evs_pcidss-final
Dejan Jeremic659 views
Ivan dragas get ahead of cybercrime by Dejan Jeremic
Ivan dragas   get ahead of cybercrimeIvan dragas   get ahead of cybercrime
Ivan dragas get ahead of cybercrime
Dejan Jeremic943 views
Hands on Security, Disrupting the Kill Chain, SplunkLive! Austin by Splunk
Hands on Security, Disrupting the Kill Chain, SplunkLive! AustinHands on Security, Disrupting the Kill Chain, SplunkLive! Austin
Hands on Security, Disrupting the Kill Chain, SplunkLive! Austin
Splunk1.1K views
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool by Sylvain Martinez
Open Source IDS - How to use them as a powerful fee Defensive and Offensive toolOpen Source IDS - How to use them as a powerful fee Defensive and Offensive tool
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool
Sylvain Martinez474 views
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av... by Cristian Garcia G.
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Cristian Garcia G.222 views
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga by Dejan Jeremic
Ict 2015   saga - cisco cybersecurity rešenja- Viktor VargaIct 2015   saga - cisco cybersecurity rešenja- Viktor Varga
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga
Dejan Jeremic852 views
Tomorrow Starts Here - Security Everywhere by Cisco Canada
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
Cisco Canada2.3K views
Mobile Security: 2016 Wrap-Up and 2017 Predictions by Skycure
Mobile Security: 2016 Wrap-Up and 2017 PredictionsMobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Skycure614 views
Critical Infrastructure Protection from Terrorist Attacks by BGA Cyber Security
Critical Infrastructure Protection from Terrorist AttacksCritical Infrastructure Protection from Terrorist Attacks
Critical Infrastructure Protection from Terrorist Attacks
BGA Cyber Security3.3K views
Exploring the Capabilities and Economics of Cybercrime by Cylance
Exploring the Capabilities and Economics of CybercrimeExploring the Capabilities and Economics of Cybercrime
Exploring the Capabilities and Economics of Cybercrime
Cylance832 views
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2... by Kaspersky
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky3.4K views
Debunking the Hacker Hype: The Reality of Widespread Blackouts by Dragos, Inc.
Debunking the Hacker Hype: The Reality of Widespread BlackoutsDebunking the Hacker Hype: The Reality of Widespread Blackouts
Debunking the Hacker Hype: The Reality of Widespread Blackouts
Dragos, Inc.985 views
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la... by Cristian Garcia G.
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Cristian Garcia G.194 views

Similar to The Art of CTF

INTRODUCTION TO CYBER FORENSICS by
INTRODUCTION TO CYBER FORENSICSINTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICSSylvain Martinez
1.1K views18 slides
Scaling DevOps Adoption by
Scaling DevOps AdoptionScaling DevOps Adoption
Scaling DevOps AdoptionMark Rendell
368 views38 slides
DevOps Days Tel Aviv 2013: What exactly is anti-fragile in DevOps? - Asher St... by
DevOps Days Tel Aviv 2013: What exactly is anti-fragile in DevOps? - Asher St...DevOps Days Tel Aviv 2013: What exactly is anti-fragile in DevOps? - Asher St...
DevOps Days Tel Aviv 2013: What exactly is anti-fragile in DevOps? - Asher St...DevOpsDays Tel Aviv
1.2K views47 slides
Application Of A Penetration Testing Against `` My House... by
Application Of A Penetration Testing Against `` My House...Application Of A Penetration Testing Against `` My House...
Application Of A Penetration Testing Against `` My House...Brittney Simmons
2 views49 slides
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04 by
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Kyle Lai
1.3K views21 slides
CyberSecurity - UH IEEE Presentation 2015-04 by
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04Kyle Lai
972 views21 slides

Similar to The Art of CTF(20)

Scaling DevOps Adoption by Mark Rendell
Scaling DevOps AdoptionScaling DevOps Adoption
Scaling DevOps Adoption
Mark Rendell368 views
DevOps Days Tel Aviv 2013: What exactly is anti-fragile in DevOps? - Asher St... by DevOpsDays Tel Aviv
DevOps Days Tel Aviv 2013: What exactly is anti-fragile in DevOps? - Asher St...DevOps Days Tel Aviv 2013: What exactly is anti-fragile in DevOps? - Asher St...
DevOps Days Tel Aviv 2013: What exactly is anti-fragile in DevOps? - Asher St...
DevOpsDays Tel Aviv1.2K views
Application Of A Penetration Testing Against `` My House... by Brittney Simmons
Application Of A Penetration Testing Against `` My House...Application Of A Penetration Testing Against `` My House...
Application Of A Penetration Testing Against `` My House...
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04 by Kyle Lai
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Kyle Lai1.3K views
CyberSecurity - UH IEEE Presentation 2015-04 by Kyle Lai
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
Kyle Lai972 views
Behind the Curtain: Exposing Advanced Threats by Cisco Canada
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
Cisco Canada1.1K views
The Importance Of Cloud Computing by Pawpaw Tran
The Importance Of Cloud ComputingThe Importance Of Cloud Computing
The Importance Of Cloud Computing
Pawpaw Tran2 views
Cyber Security integration by Carlo Dapino
Cyber Security integrationCyber Security integration
Cyber Security integration
Carlo Dapino253 views
Nsc42 - is the cloud secure - is easy if you do it smart ECC Conference by NSC42 Ltd
Nsc42 - is the cloud secure - is easy if you do it smart ECC ConferenceNsc42 - is the cloud secure - is easy if you do it smart ECC Conference
Nsc42 - is the cloud secure - is easy if you do it smart ECC Conference
NSC42 Ltd78 views
Enterprise Cloud Risk And Security by Mark Masterson
Enterprise Cloud Risk And SecurityEnterprise Cloud Risk And Security
Enterprise Cloud Risk And Security
Mark Masterson49.9K views
"Evolving cybersecurity strategies" - Seizing the Opportunity by Dean Iacovelli
"Evolving cybersecurity strategies" - Seizing the Opportunity"Evolving cybersecurity strategies" - Seizing the Opportunity
"Evolving cybersecurity strategies" - Seizing the Opportunity
Dean Iacovelli130 views
Cloud, DevOps and the New Security Practitioner by Adrian Sanabria
Cloud, DevOps and the New Security PractitionerCloud, DevOps and the New Security Practitioner
Cloud, DevOps and the New Security Practitioner
Adrian Sanabria1.2K views
State of Cyber: Views from an Industry Insider by Ben Johnson
State of Cyber: Views from an Industry InsiderState of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry Insider
Ben Johnson88 views
Mere Paas Teensy Hai (Nikhil Mittal) by ClubHack
Mere Paas Teensy Hai (Nikhil Mittal)Mere Paas Teensy Hai (Nikhil Mittal)
Mere Paas Teensy Hai (Nikhil Mittal)
ClubHack780 views
Effective Prioritization Through Exploit Prediction by Jonathan Cran
Effective Prioritization Through Exploit Prediction Effective Prioritization Through Exploit Prediction
Effective Prioritization Through Exploit Prediction
Jonathan Cran168 views
What is exactly anti fragile in dev ops - v3 by Asher Sterkin
What is exactly anti fragile in dev ops - v3What is exactly anti fragile in dev ops - v3
What is exactly anti fragile in dev ops - v3
Asher Sterkin1.3K views
Learning Security Strategies through Game Play and Optimal Stopping by Kim Hammar
Learning Security Strategies through Game Play and Optimal StoppingLearning Security Strategies through Game Play and Optimal Stopping
Learning Security Strategies through Game Play and Optimal Stopping
Kim Hammar24 views

More from Sylvain Martinez

INTRODUCTION TO CRYPTOGRAPHY by
INTRODUCTION TO CRYPTOGRAPHYINTRODUCTION TO CRYPTOGRAPHY
INTRODUCTION TO CRYPTOGRAPHYSylvain Martinez
1.2K views21 slides
PHISHING PROTECTION by
PHISHING PROTECTIONPHISHING PROTECTION
PHISHING PROTECTIONSylvain Martinez
2.3K views30 slides
IOT Security by
IOT SecurityIOT Security
IOT SecuritySylvain Martinez
893 views27 slides
ARE YOU RED TEAM READY? by
ARE YOU RED TEAM READY?ARE YOU RED TEAM READY?
ARE YOU RED TEAM READY?Sylvain Martinez
255 views24 slides
GDPR SECURITY ISSUES by
GDPR SECURITY ISSUESGDPR SECURITY ISSUES
GDPR SECURITY ISSUESSylvain Martinez
180 views9 slides
Risk on Crypto Currencies by
Risk on Crypto CurrenciesRisk on Crypto Currencies
Risk on Crypto CurrenciesSylvain Martinez
660 views15 slides

Recently uploaded

Democratising digital commerce in India-Report by
Democratising digital commerce in India-ReportDemocratising digital commerce in India-Report
Democratising digital commerce in India-ReportKapil Khandelwal (KK)
18 views161 slides
PharoJS - Zürich Smalltalk Group Meetup November 2023 by
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023Noury Bouraqadi
132 views17 slides
Special_edition_innovator_2023.pdf by
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdfWillDavies22
18 views6 slides
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...James Anderson
92 views32 slides
NET Conf 2023 Recap by
NET Conf 2023 RecapNET Conf 2023 Recap
NET Conf 2023 RecapLee Richardson
10 views71 slides
SUPPLIER SOURCING.pptx by
SUPPLIER SOURCING.pptxSUPPLIER SOURCING.pptx
SUPPLIER SOURCING.pptxangelicacueva6
16 views1 slide

Recently uploaded(20)

PharoJS - Zürich Smalltalk Group Meetup November 2023 by Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi132 views
Special_edition_innovator_2023.pdf by WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2218 views
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson92 views
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf by Dr. Jimmy Schwarzkopf
STKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdfSTKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdf
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf
Future of AR - Facebook Presentation by ssuserb54b561
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
ssuserb54b56115 views
"Running students' code in isolation. The hard way", Yurii Holiuk by Fwdays
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk
Fwdays17 views
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software280 views
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
STPI OctaNE CoE Brochure.pdf by madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb14 views
6g - REPORT.pdf by Liveplex
6g - REPORT.pdf6g - REPORT.pdf
6g - REPORT.pdf
Liveplex10 views
Unit 1_Lecture 2_Physical Design of IoT.pdf by StephenTec
Unit 1_Lecture 2_Physical Design of IoT.pdfUnit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdf
StephenTec12 views

The Art of CTF

  • 1. {elysiumsecurity} THE ART OF CTF Version: 1.2a Date: 28/08/2018 Author: Sylvain Martinez Reference: ESC10-MUSCL Classification: Public cyber protection & response
  • 2. {elysiumsecurity} cyber protection & response 2 EXAMPLESBENEFITSCONCEPTCONTEXT • What is a CTF? • Find the image! • Look at this sound! CONTENTS Public • Skills Challenges; • Resources Challenges; • Learning Challenges; • Learn; • Practice; • Win;
  • 3. {elysiumsecurity} cyber protection & response 3 EXAMPLESBENEFITSCONCEPTCONTEXT SKILLS CHALLENGES Public 62% HAVE NOT INCREASED SECURITY TRAINING BUDGET 1 OUT OF 3 SECURITY PROS NOT FAMILIAR WITH NEW THREATS Icons from the noun project unless specified otherwise, SOURCE: Business Wire 2014 83% OF ENTERPRISES LACK THE RIGHT SKILLS AND RESOURCES TO PROTECT THEIR IT ASSETS
  • 4. {elysiumsecurity} cyber protection & response 4 EXAMPLESBENEFITSCONCEPTCONTEXT RESOURCES CHALLENGES Public 1 MILLION UNFILLED SECURITY JOBS WORDWIDE 92% OF HIRING MANAGER SEEKS PAST EXPERIENCE IN SECURITY SOURCE: Business Wire 2014 and CBR ONLINE 2017 <2.4% GRADUATING STUDENTS HAVE SECURITY DEGREES
  • 5. {elysiumsecurity} cyber protection & response 5 EXAMPLESBENEFITSCONCEPTCONTEXT LEARNING CHALLENGES Public EXPERIMENTATION DANGER TRAINING CREATIVITY
  • 6. {elysiumsecurity} cyber protection & response 6 WHAT IS A CTF? Public EXAMPLESBENEFITSCONCEPTCONTEXT A SAFE HACKING ENVIRONMENT A GUIDED JOURNEY OF HACKING CHALLENGES CAPTURE THE FLAG IS A LEARNING GAME
  • 7. {elysiumsecurity} cyber protection & response 7 WHAT IS A CTF? Public EXAMPLESBENEFITSCONCEPTCONTEXT MOST CTF ARE FREE MANY ARE AVAILABLE ONLINE SOME REQUIRE PHYSICAL ACCESS
  • 8. {elysiumsecurity} cyber protection & response 8 WHAT IS A CTF? Public EXAMPLESBENEFITSCONCEPTCONTEXT ACCESSIBLE TO ALL SKILL LEVELS USUALLY FIND AN MD5 HASH bac2e4a7dab0d89df5f672972910b8c4 MOST CTF OFFENSIVE SOME DEFENSIVE
  • 9. {elysiumsecurity} cyber protection & response 9 LEARN Public EXAMPLESBENEFITSCONCEPTCONTEXT YOU LEARN THE REAL IMPACT OF KNOWN VULNERABILITIES YOU LEARN THE REAL IMPACT OF MISCONFIGURATION AND PATCHING YOU LEARN WHILST PLAYING A GAME
  • 10. {elysiumsecurity} cyber protection & response 10 PRACTICE Public EXAMPLESBENEFITSCONCEPTCONTEXT YOU PRACTISE REAL ATTACKS YOU PRACTISE OUTSIDE THE BOX THINKING YOU PRACTISE OTHER IT SKILLS
  • 11. {elysiumsecurity} cyber protection & response 11 WIN! Public EXAMPLESBENEFITSCONCEPTCONTEXT YOU GET A FREE TRAINING GROUND YOU MAY EVEN GET MONEY/GIFT YOU GET PEERS RECOGNITION
  • 12. {elysiumsecurity} cyber protection & response 12 FIND THE IMAGE! Public EXAMPLESBENEFITSCONCEPTCONTEXT SANS XMAS CHALLENGE 2015 PART 1, QUESTION 2 FIND THE IMAGE IN THE PCAP FILE DNS TRAFFIC ONLY
  • 13. {elysiumsecurity} cyber protection & response 13 FIND THE IMAGE! Public EXAMPLESBENEFITSCONCEPTCONTEXT ANYTHING STRANGE WITH THESE DNS QUERIES?
  • 14. {elysiumsecurity} cyber protection & response 14 FIND THE IMAGE! Public EXAMPLESBENEFITSCONCEPTCONTEXT “1337” IS HACKING REFERENCE! FOLLOW THE UDP STREAM
  • 15. {elysiumsecurity} cyber protection & response 15 FIND THE IMAGE! Public EXAMPLESBENEFITSCONCEPTCONTEXT SAVE TEXT INTO A FILE AND EXTRACT THE ”EXTRA DNS INFORMATION”
  • 16. {elysiumsecurity} cyber protection & response 16 FIND THE IMAGE! Public EXAMPLESBENEFITSCONCEPTCONTEXT YOU GET THE IMAGE WHICH WAS TRANSMITTED OVER DNS QUERIES SANS XMAS CHALLENGE 2015 WRITE https://www.elysiumsecurity.com/blog/Challenges/post6.html#two
  • 17. {elysiumsecurity} cyber protection & response 17 FIND THE IMAGE! Public EXAMPLESBENEFITSCONCEPTCONTEXT YOU LEARNT HOW TO USE WIRESHARK AND INVESTIGATE TRAFFIC FLOW YOU LEARNT HOW TO EXTRACT DATA FROM A PACKET CAPTURE YOU LEARNT OF A HACKING TECHNICS TO EXFILTRATE INFORMATION FROM A LOCKED DOWN ENVIRONMENT YOU LEARNT THAT GNOMES ARE EVIL!
  • 18. {elysiumsecurity} cyber protection & response 18 LOOK AT THIS SOUND! Public EXAMPLESBENEFITSCONCEPTCONTEXT SANS BROCHURE CHALLENGE 2014 CHALLENGE 3, LEVEL 2 “LOOK AT AN AUDIO FILE” REFERENCE TO AN SVN COPYING REPO PRODUCES FILES BUT NO AUDIO FILE LOOKING AT COMMAND OUTPUT DONOTOPEN.MP3 GETS DELETED EDIT THE REPO.SVN AND REMOVE DELETE INSTRUCTION YOU HAVE A WAVE FILE!
  • 19. {elysiumsecurity} cyber protection & response 19 LOOK AT THIS SOUND! Public WHAT TO DO WITH THAT FILE? EXAMPLESBENEFITSCONCEPTCONTEXT “Which of the following would you most prefer? A) a puppy B) a pretty flower from your sweetie or C) a large properly formed data file? You have failed this reverse Turing test, now suffer the consequences.. “
  • 20. {elysiumsecurity} cyber protection & response 20 LOOK AT THIS SOUND! Public EXAMPLESBENEFITSCONCEPTCONTEXT SANS BROCHURE CHALLENGE 2015 WRITE UP: https://www.elysiumsecurity.com/blog/Challenges/post2.html SPECTROGRAM!
  • 21. {elysiumsecurity} cyber protection & response 21 LOOK AT THIS SOUND! Public EXAMPLESBENEFITSCONCEPTCONTEXT YOU LEARNT TO PAY ATTENTION ABOUT WHAT IS BEING ASKED YOU LEARNT HOW TO USE A REPOSITORY ENVIRONMENT YOU LEARNT TO THINK OUTSIDE THE BOX AND… PERSEVERE! YOU LEARNT A STEGANOGRAPHY TECHNIC
  • 22. {elysiumsecurity} cyber protection & response © 2018 ELYSIUMSECURITY LTD. All Rights Reserved www.elysiumsecurity.com ELYSIUMSECURITY provides practical expertise to identify vulnerabilities, assess their risks and impact, remediate those risks, prepare and respond to incidents as well as raise security awareness through an organization. ELYSIUMSECURITY provides high level expertise gathered through years of best practices experience in large international companies allowing us to provide advice best suited to your business operational model and priorities. ABOUT ELYSIUMSECURITY LTD. ELYSIUMSECURITY provides a portfolio of Strategic and Tactical Services to help companies protect and respond against Cyber Security Threats. We differentiate ourselves by offering discreet, tailored and specialized engagements. ELYSIUMSECURITY operates in Mauritius and in Europe, a boutique style approach means we can easily adapt to your business operational model and requirements to provide a personalized service that fits your working environment.