Hacking-Lab Remote Security Lab 15. April 2010



Similar documents
Hacking for Fun and Profit

Smart Card APDU Analysis

CyberNEXS Global Services

TEFO STUDERUS HACKING 4 FUN & PROFIT

(BDT) BDT/POL/CYB/Circular

APT Detection using Splunk

Learning and Playing: Integrating Competition Experiences Into Formal Curriculum CS Palos Hills, IL

Dr. Markus Braendle, Head of Cyber Security, ABB Group 10 Steps on the Road to a Successful Cyber Security Program Asia Pacific ICS Security SUMMIT

BEng/ BEng (Hons) Networked Systems Engineering, BSc/ BSc (Hons) Cyber Security and Networks BEng/ BEng (Hons) Digital Security, Forensics and

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

ASK PC Certified Information Systems Security Expert - CISSE

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

DoD Directive (DoDD) 8570 & GIAC Certification

Contestant Requirements:

CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE

CONSULTING IMAGE PLACEHOLDER

90% of data breaches are caused by software vulnerabilities.

CSP-4225 Cyber Security Professional Certification The Most demanding, depth and advanced of all...

Digitally Smart Enhance Your Career, or Start a New One

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Trends

Fujitsu Group s Information Security

Check Point Partner Marketing Campaign Plan

Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws

Analyze. Secure. Defend. Do you hold ECSA credential?

Paul Vlissidis Group Technical Director NCC Group plc

Train Like You Will Fight

Executive Search Coaching & Training Management Consulting

Information Security Services

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days)

Security all around. Industrial security for your plant at all levels. siemens.com/industrialsecurity. Answers for industry.

Ethical Hacking and Penetration Testing Presented by: Adam Baneth Managing director

Building the Next Generation of Computer Security Professionals. Chris Simpson

Lessons Learned from KYPO Cyber Exercise & Research Platform Project

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

NEW AND IMPROVED: HACKING ORACLE FROM WEB. Sumit sid Siddharth 7Safe Limited UK

Impact of Cybersecurity Education in High Schools and Small Businesses in Hawaii. Challenges and Opportunities NICE Conference 2015

SMALL BUSINESS PRESENTATION

BIG DATA TRIAGE & DIGITAL FORENSICS

Access FedVTE online at: fedvte.usalearning.gov

Hackers are here. Where are you?

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

How White Hat Hackers Operate. Andreas Falkenberg, Senior Security Consultant, SEC Consult Deutschland Unternehmensberatung GmbH

The fast track to top skills and top jobs in cyber. Guaranteed.

GEARS Cyber-Security Services

Course Descriptions November 2014

KEY STEPS FOLLOWING A DATA BREACH

Presented by Frederick J. Santarsiere

The SIEM Evaluator s Guide

EC-Council. Certified. Internet Marketing Practitioner. Unravel the Mystery of. Internet Marketing C IMP

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

CSCD 330 Network Programming Winter Lecture 1 - Course Details

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

Master in Management. Shape your future career in top management. Working together for better global management

of Highly Effective Security Professionals By Sondra Schneider CEO Security University

RUAG Cyber Security. More security for your data

Data Breaches, Data Leaks, Web Defacements: why secure coding is important.

CYBER SECURITY TRAINING SAFE AND SECURE

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

Security Intelligence Services. Cybersecurity training.

HackMiami Web Application Scanner 2013 PwnOff

Classify, Protect, Audit: New Approach to SAP Data Security. Aparna Jue, SECUDE

Privacy and Security Advantages of Social Login. White Paper

The Open Cyber Challenge Platform *

Web Maniac Hacking Trust. Aditya K Sood [adi_ks [at] secniche.org] SecNiche Security

MSc Cyber Security. identity. hacker. virus. network. information

Maximise the uptime and performance of your ENDOALPHA system

SELECTION // ASSESSMENT // TRAINING EXAMINATION //GRADUATION

Swiss Cyber Storm II Case: NFS Hacking

persistent security in a changing world.

Open Source Apache <WAF> Web Application Firewall

SMALL BUSINESS PRESENTATION

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

ISACA S CYBERSECURITY NEXUS (CSX) October 2015

FAQs on the Customer Security Awareness Program (CSAP)

Business Information Technology Bachelor of Science in Business Information Technology

Transcription:

Compass Security AG Glärnischstrasse 7 CH-8640 Rapperswil T +41 55 214 41 60 F +41 55 214 41 61 www.csnc.ch Hacking-Lab Remote Security Lab 15. April 2010 Name des Dokumentes: EN_Hacking_Lab_V5.0.doc Version: v5.1 Autor: Ivan Bütler, Compass Security AG Lieferungsdatum: 15. April 2010 Klassifikation:

Inhaltsverzeichnis 1 HACKING-LAB REMOTE SECURITY LABOR... 3 1.1 Intoduction... 3 1.2 Who uses Hacking-Lab?... 3 1.3 Your Remote Security Lab... 4 1.4 Advantage of Hacking-Lab... 4 1.5 Hacking-Lab Management Portal... 5 1.6 On-Site Wargame... 6 2 HACKING-LAB REFERENCES...... 7 2.1 Wargame Germany: HdM Stuttgart (2008)... 7 2.2 Wargame at the FH Furtwangen, Germany (2008)... 8 2.3 Hacking-Lab @ Cebit 2009... 11 2.4 Swiss Cyber Storm II (2009)... 12 2.5 Attack & Defense (2009)... 14 2.6 IT Underground Warsaw (2009)... 14 2.7 Speakers at Hacking-Lab Events... 15 3 SWISS CYBER STORM III...... 18 3.1 SCSIII im Mai 2011... 18 Seite: 2

1 Hacking-Lab Remote Security Labor 1.1 Intoduction Hacking-Lab is an advanced E-Learning and E-Lab infrastructure for the education of IT specialists. The target group includes security engineers, forensic investigators, software developers and IT operation staff. According the knowledge rating system from Bloom, the knowhow gains a higher level if training modules include hands-on labs. This is exactly what Hacking-Lab provides in-depth lab cases from al large variety of wargame and Hack&Learn cases. 1.2 Who uses Hacking-Lab? Universities o o o o they teach IT security subjects in their modules they teach theory and labs they want to provide leading-edge modules Hacking-Lab provides theory and lab cases to your University Software Companies o they want to educate their staff for the OWASP security guidelines o they want to make their code more robust against web hacking techniques o Hacking-Lab delivers web security cases, code snippets and Web Wargames Security Conferences o They have good talks and tracks o they want to give an added-value to their participants o Hacking-Lab delivers a complete wargame infrastructure that is testet with more than 150 concurrent participants o Hacking-Lab delivers the global ranking page, solutions and everything you need for your IT Sec conference. Fun Weekends in IT Companies o some have some sort of offsite-weekends o they have a knowledge part and some fun activities o Hacking-Lab provides the fun hacking part for your IT engineers, hacking challenges, Hacking for Fun Seite: 3

1.3 Your Remote Security Lab Do you feel like using Hacking-Lab all over the year? Please order the yearly fee to have unlimited access to all Hacking-Lab cases. 1.4 Advantage of Hacking-Lab Hacking-Lab is a remote security lab. It' is already there and you save the money of building your own educational lab for your it staff. Hacking-Lab consists of the event/learning management page (www.hackinglab.com) and a remote security lab (OpenVPN access). The portal pages gives you the lab case exercises, where the infrastructure provides the "vulnerable" systems to attack. What are your interests? Interest Live Hacking Demo Description Do you feel like a live hacking demonstration? Do you want to give your talk a special added value? Use Hacking-Lab cases to make your talk more understandable. IT Security Talks Live Hacking Talks Security Demonstrations Security Week Use Hacking-Lab for a whole week during your offsite meeting or internal IT security awareness campaign. Team event within your company Security weeks Security conferences / wargames Security Lessons Use Hacking-Lab in your all-year education programm, including theory and lab cases. IT Security lessons for your needs Universities Seite: 4

1.5 Hacking-Lab Management Portal The portal page www.hacking-lab.com provides the lab exercises, theory and control patterns. Define your own event out of a large variety of lab cases to your personal education program. Have fun with the educational cases and the ranking page high score. Die portal page provides the following funcationality: Defininition of events Linking modules to the events Linking user accounts to the event Global ranking page Per event ranking page The picture below shows a simplified network topology of the remote security lab infrastructure. Seite: 5

1.6 On-Site Wargame Do you want to give your it security conference an added-value? Ask for the Hacking-Lab wargame infrastructure that can be installed on-site in your local area network. Please contact Ivan Bütler (ivan.buetler@csnc.ch) for further assistance. Example: Discuss&Discover Germany 2009 Seite: 6

2 Hacking-Lab References Hacking-Lab is a very robust IT infrastructure that has been used in events with more than 150 concurrent participants. Here some examples: 2.1 Wargame Germany: HdM Stuttgart (2008) The HdM (Hochschule der Medien) organized a Onsite Wargame in 2008 with about 50 participants. They were challenged to solve the provided security puzzles. Seite: 7

2.2 Wargame at the FH Furtwangen, Germany (2008) Onsite Hack&Learn Event on November 7th and 8th 2008 with about 150 concurrent participants. The event was very positive. See this german blog entry. Seite: 8

Hacking-Lab was additionally used for their IT Security Awareness Campaing. Seite: 9

Seite: 10

2.3 Hacking-Lab @ Cebit 2009 Hacking-Lab @ Cebit 2009 as part of Mittelstands-WIKI. Fun game between Germany and Switzerland Seite: 11

2.4 Swiss Cyber Storm II (2009) Hacking-Lab organizes the Swiss Cyber Storm Challenge in 2007 and 2009. The next SCS will be performed in April/May 2011. Lock Picking Exercise Seite: 12

Miss Cyber Storm best hacker out of the crowd Final countdown after 2 day's of fun at SCSII Seite: 13

2.5 Attack & Defense (2009) In 2009, Hacking-Lab supported the Attack & Defense event as part of Discuss & Discover with their IT security wargame cases. The participants could choose their favorite topics out of 18 available cases, including attack schemes and defense strategies. 2.6 IT Underground Warsaw (2009) Hacking-Lab at the IT Underground Conference in Warsaw from November 16th to November 18th 2009. Seite: 14

2.7 Speakers at Hacking-Lab Events Phil Zimmermann (PGP) was a speaker at a Hacking-Lab Event. Seite: 15

Candid Wüest, Symantec Threat Team joined our Hacking-Lab Event Seite: 16

Alexander Kornbrust, Hacking-Lab Wargame contributor and speaker at the Swiss Cyber Storm II wargame. Seite: 17

3 Swiss Cyber Storm III 3.1 SCSIII im Mai 2011 The 2011 Swiss Cyber Storm III Conference on Information Security, Hacking, Wargames and Capture the Flag challenges will be held during 12-15 of May 2011 in Rapperswil (Zürich) Switzerland. SCSIII is an important event in the areas of information security, hacking and security challenges. Swiss Cyber Storm includes: Hacking-Lab Briefings 12./13. Mai 2011 Hacking-Lab Wargames & Capture the Flag (CTF) 14./15. Mai 2011 Seite: 18