Cyber Security Challenge Australia. cyberchallenge.com.au CyberChallenge@pmc.gov.au @CySCAExCon



Similar documents
University Road Show 2015

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

INTERNATIONAL CYBEREX 2015

Symantec Cyber Readiness Challenge Player s Manual

June 2014 WMLUG Meeting Kali Linux

Media Shuttle s Defense-in- Depth Security Strategy

Penetration Testing with Kali Linux

Contestant Requirements:

Ty Miller. Director, Threat Intelligence Pty Ltd

CYBERTRON NETWORK SOLUTIONS

HackMiami Web Application Scanner 2013 PwnOff

The Open Cyber Challenge Platform *

Additional Security Considerations and Controls for Virtual Private Networks

ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications

CyberNEXS Global Services

How We're Getting Creamed

The purpose of this Unit is to develop an awareness of the knowledge and skills used by ethical and malicious hackers.

Multi-factor authentication

An New Approach to Security. Chris Ellis McAfee Senior System Engineer

Our Customer Relationship Agreement HOSTED LYNC SERVICE DESCRIPTION

Protecting Your Organisation from Targeted Cyber Intrusion

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

Specific recommendations

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Penetration Testing Using The Kill Chain Methodology

Talented People to Secure Our Future. Judy Baker, Director Cyber Security Challenge UK

Penetration Testing. Types Black Box. Methods Automated Manual Hybrid. oless productive, more difficult White Box

Living Arts College AMERICA S CREATIVITY COLLEGE. Essential Guide for the International Student

A HELPING HAND TO PROTECT YOUR REPUTATION

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

VeilMail Penetration Test Executive Summary PRESENTED TO: GREG ROAKE, CEO.TURNER TECHNOLOGIES LTD - VEILMAIL STEVE BYRNE, DIRECTOR.

Effective Methods to Detect Current Security Threats

Cyber Security Challenge Australia 2014

Targeted attacks: Tools and techniques

Certification Programs

Enumerating and Breaking VoIP

Effective Methods to Detect Current Security Threats

Guide for Designing Cyber Security Exercises

James Stanger, PhD Senior Director, Products - CompTIA 18 November, 2015

Risk Management Policy

Postgraduate. eforensics. swinburne.edu.au/postgrad

Information Security Threats and Strategies. Ted Ericson Product Marketing - ASI

Control Systems Security: Australian Government Activities. Dr. Jason Smith Asst. Director, Operations CERT Australia Attorney-General s Department

Information Systems Security Certificate Program

Connect Smart for Business SME TOOLKIT

Certification Programs

ANTI-HACKER TOOL KIT. ourth Edition

LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS

Testing for Security

INTRODUCTION: SQL SERVER ACCESS / LOGIN ACCOUNT INFO:

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s

Careers in Cyber Operations. Defence Signals Directorate

Penetration Testing: Advanced Oracle Exploitation Page 1

Vulnerability management lifecycle: defining vulnerability management

FMCS SECURE HOSTING GUIDE

Paul Vlissidis Group Technical Director NCC Group plc

Deciphering The Prominent Security Tools Ofkali Linux

Data Access Request Service

NORTH DAKOTA STATE BOARD OF COSMETOLOGY COSMETOLOGY WRITTEN EXAMINATION INFORMATION

Modern Binary Exploitation Course Syllabus

The Incident Response Playbook for Android and ios

RXP SERVICES LIMITED ABN Release to Australian Stock Exchange

Guidance Regarding Skype and Other P2P VoIP Solutions

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

What is CRM and why use it in Education? 7 April 2014

When you have read through the step-by-step guide and have all your paperwork ready to be uploaded to the applicant portal, you can apply online.

Salesforce Certified Pardot Consultant Study Guide

FortyCloud Installation Guide. Installing FortyCloud Gateways Using AMIs (AWS Billing)

Security Intelligence Services. Cybersecurity training.

Westpac Asian Exchange Scholarship Funding Guidelines Semester

PowerShell for Penetration Testers

PROJECT MANAGEMENT FOR EXECUTIVE ASSISTANTS AND PERSONAL ASSISTANTS

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

Secure Configuration Guide

Bachelor of Information Technology (Network Security)

User Behavior Analytics: A New Approach to Detection and Response

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

ASL IT SECURITY XTREME XPLOIT DEVELOPMENT

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES

Project Management Certification Options within Australia

Marble & MobileIron Mobile App Risk Mitigation

Transcription:

Cyber Security Challenge Australia 2014 cyberchallenge.com.au CyberChallenge@pmc.gov.au @CySCAExCon

Introductions

CySCA Supporters Australian Government Australian Signals Directorate The Department of the Prime Minister and Cabinet Attorney-General s Department (CERT Australia) Telstra PwC Australia NBNCo Microsoft

What is CySCA? A cyber security competition for Australian university undergraduate and TAFE students Promote cyber security as an interesting and challenging career option Highlight the key skills required in a cyber security career Ensure students are developing the skills we are seeking

Scenario Fortress Certifications Pty Ltd Small start up specialising in Cyber assurance solutions High risk of business failure if reputation is damaged by a compromise

Your Mission Perform a penetration test of the FortCerts web site Perform a penetration test of the FortCerts corporate network Conduct an analysis of a cyber incident involving a mobile phone running Android Analyse a number of products certified by FortCerts and confirm the validity of certification process

Challenge Components Four sub-challenges Corporate Penetration Testing Web Penetration Testing Forensics Certification Validation Random Reverse Engineering Shellcoding Software Code Review Network Forensics Crypto Programming

Scoring Submit flags to score points and unlock mitigation questions for extra points Real time display of teams scores and progress Exercise control will review responses, in case of misuse or difficult questions Tie-breaker first to score final flag wins

Team and Player Access Each team will be given access to their own sandbox network hosted by Telstra VPN access (OpenVPN) from your university to your sandbox network Default routes will be pushed to disallow access to the internet. Plan for this. Flags and Answers are submitted through scoreboard website Each team will get a login account to submit flags Read the terms and conditions you have been provided. You will be required to accept them when you first login to the scoring site

Event details CySCA 2014 will be held from (AEST) 12:00pm 7 May to 12:00pm 8 May 2014 Exercise Control will be available for the 24 hours on IRC Telstra s technical support team will be available via phone or IRC

Prizes Provided by Telstra 1st place Trip to 2014 Black Hat Security Conference in Las Vegas USA includes travel, accommodation and conference fees Passports and US Visas are your responsibility Sponsorship to attend award ceremony during 2014 Cyber Security Awareness Week 2nd and 3rd place Players choice of a new tablet or phone

Registration Information Up to 60 teams competing Four people per team Allowing up to 4 teams per institution to register Registrations close 30 March 2014 University/TAFE reps can apply at cyberchallenge.com.au Teams will receive an information pack with support contacts, login credentials, etc

Preparation

Toolkit (Part 1) Get comfortable using these tools! Kali 1.0.6 (32bit) Corporate Pen Test Metasploit Sysinternals tools Web Pen Test Burp suite SQLmap Forensics Volatility

Toolkit (Part 2) Certification Validation Native disassembler (IDA or objdump) Java decompiler (Jad) X86 assembler (nasm, Online Assembler) Debugger (GDB) Wireshark Scapy Text editor (vim, emacs, cat) The Sleuthkit command line tools

Practice makes perfect Best way to prepare is to participate in other CTF events Last years official CySCA writeups https://cyberchallenge.com.au/cysca2013_solutions_writeup.pdf ctftime.org Upcoming CTF schedule Previous CTF event write-ups CSAW, PlaidCTF, CodeGate picoctf.com Almost perpetual CTF Challenges still available Includes introductory resources

Day in the life Internships available this summer 2014 2015 Defence Intelligence and Security Development Program closes 7 April 2014 Apply at the website asd.gov.au/careers

Link Spam Corporate Penetration Testing Links http://www.offensive-security.com/metasploit-unleashed/main_page http://www.irongeek.com/ Encyclopaedia Of Windows Privilege Escalation - http://www.youtube.com/watch?v=kmg8iscohha https://cyberchallenge.com.au/cysca2013_solutions_writeup.pdf https://github.com/pwnies/pwntools Web Penetration Testing Links http://www.amanhardikar.com/mindmaps/practice.html http://sourceforge.net/projects/mutillidae/ https://www.owasp.org/index.php/category:owasp_webgoat_project https://cyberchallenge.com.au/cysca2013_solutions_writeup.pdf Forensics Challenge Links http://code.google.com/p/volatility/wiki/androidmemoryforensics https://tzworks.net/prototypes.php https://digital-forensics.sans.org/summit-archives/2012/android-mind-reading-memoryacquisition-and-analysis-with-lime-and-volatility.pdf http://stackoverflow.com/questions/2451384/creating-an-image-of-an-android-phone http://www.utdallas.edu/~anf061000/digital%20forensics%20and%20file%20carving%20on%20th e%20android%20platform.pdf

Link Spam (The Rest) http://myne-us.blogspot.com/2010/08/from-0x90-to-0x4c454554-journey-into.html http://code.google.com/p/it-sec-catalog/wiki/exploitation http://www.overthewire.org https://cyberchallenge.com.au/cysca2013_solutions_writeup.pdf https://code.google.com/p/bletchley/wiki/overview http://ppp.cylab.cmu.edu/wordpress/ https://isisblogs.poly.edu/ http://eindbazen.net/ http://security.stackexchange.com/questions/3592/what-hacking-competitions-challenges-exist http://fumalwareanalysis.blogspot.com.au/p/malware-analysis-tutorials-reverse.html http://www.webantix.net/2009/08/war-games-current-and-past-hacking.html