Small-Scale Cyber Security Competitions



Similar documents
Cyber Exercises, Small and Large

SETTING UP AND USING A CYBER SECURITY LAB FOR EDUCATION PURPOSES *

Final Exercise Let s go Shopping!

NATIONAL CYBER DEFENSE COMPETITION. Competition Scenario

Secure Software Programming and Vulnerability Analysis

The Open Cyber Challenge Platform *

Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p.

Installation and Deployment

AC : WORK-IN-PROGRESS: CREATING AN INTRUSION DE- TECTION EXPERIMENTAL ENVIRONMENT USING CLOUD-BASED VIR- TUALIZATION TECHNOLOGY

Where can I install GFI EventsManager on my network?

Small-Scale Cyber Security Competitions

Minnesota State Community and Technical College Detroit Lakes Campus

Penetration Testing Report Client: Business Solutions June 15 th 2015

Five Steps to Improve Internal Network Security. Chattanooga Information security Professionals

WA2192 Introduction to Big Data and NoSQL. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1

Five Steps to Improve Internal Network Security. Chattanooga ISSA

Outline SSS Microsoft Windows Server 2008 Hyper-V Virtualization

Deploying Ubuntu Enterprise Cloud. Training Course Overview. (Ubuntu LTS)

EZblue BusinessServer The All - In - One Server For Your Home And Business

TEACHING COMPUTER SECURITY TO UNDERGRADUATES A Hands-On Approach

Standard: Event Monitoring

User Manual of the Pre-built Ubuntu 9 Virutal Machine

CyberNEXS Global Services

Using Virtualization to Create and Deploy Computer Security Lab Exercises

Ubuntu Sever Administration

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

A Laboratory Based Capstone Course in Computer Security for Undergraduates

Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008

Metasploit Pro Getting Started Guide

EZblue BusinessServer The All - In - One Server For Your Home And Business

SMART Classroom Suite 2011

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

Exploring a National Cyber Security Exercise for Community Colleges

User Manual of the Pre-built Ubuntu Virutal Machine

Upgrade to Webtrends Analytics 8.7: Best Practices

information security and its Describe what drives the need for information security.

Linux Operating System Security

ADDITIONAL SOFTWARE AND HARDWARE REQUIREMENTS

Mitigating Information Security Risks of Virtualization Technologies

Open Source Security Tools for Information Technology Professionals

C h a r l e s C a s e y W. O B r i e n

Check Point and Security Best Practices. December 2013 Presented by David Rawle

GFI Product Manual. Administrator Guide

GFI Product Manual. Administrator Guide

Cloud Homework instructions for AWS default instance (Red Hat based)

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Verax Service Desk Installation Guide for UNIX and Windows

Technology Fee Proposal

Delphi+ System Requirements

How to Test Out Backup & Replication 6.5 for Hyper-V

This Deployment Guide is intended for administrators in charge of planning, implementing and

Contestant Requirements:

How To Set Up A Firewall Enterprise, Multi Firewall Edition And Virtual Firewall

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Remote Unix Lab Environment (RULE)

Sage Grant Management System Requirements

Remote PC Guide Series - Volume 1

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Parallels Plesk Panel 11 for your Linux server

USM IT Security Council Guide for Security Event Logging. Version 1.1

Payment Card Industry (PCI) Data Security Standard

A New Era. A New Edge. Phishing within your company

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

All Information is derived from Mandiant consulting in a non-classified environment.

Acronis Backup & Recovery 11

URL:

Active Directory - User, group, and computer account management in active directory on a domain controller. - User and group access and permissions.

Scholastic Reading Inventory Installation Guide

PLATO Learning Environment System and Configuration Requirements. for workstations. April 14, 2008

Acronis Backup & Recovery 11.5 Quick Start Guide

Jumpstarting Your Security Awareness Program

QuickStart Guide for Managing Computers. Version 9.2

CYCLOPE let s talk productivity

Computer Lab Policies & Procedures

DTR Business Systems, Inc. Rene Beltran

VMware vshield Zones R E V I E W E R S G U I D E

Footprinting and Reconnaissance Tools

Background ( )

Table of Contents. FleetSoft Installation Guide

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Enterprise Network Deployment, 10,000 25,000 Users

Server Configuration and Deployment (part 1) Lotus Foundations Essentials

Kaspersky Endpoint Security 10 for Windows. Deployment guide

New Lab Upgrading Vista to Windows 7 Brought to you by RMRoberts.com

Extending Remote Desktop for Large Installations. Distributed Package Installs

CYBER DEFENSE COMPETITION: A TALE OF TWO TEAMS *

LAMP [Linux. Apache. MySQL. PHP] Industrial Implementations Module Description

Installation Notes for Outpost Network Security (ONS) version 3.2

Acronis Backup & Recovery 10 Workstation. Installation Guide

Top 20 Critical Security Controls

Course Title: ITAP 3471: Web Server Management

WA2256 Responsive Mobile Web Development with HTML5, CSS3, JavaScript, and jquery Mobile. Classroom Setup Guide. Web Age Solutions Inc.

The Future Is SECURITY THAT MAKES A DIFFERENCE. Overview of the 20 Critical Controls. Dr. Eric Cole

Implementing and Managing Windows Server 2008 Hyper-V

Understand Troubleshooting Methodology

Blended Security Assessments

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Detailed Revision History: Advanced Internet System Management (v5.07)

Ovation Security Center Data Sheet

Transcription:

Small-Scale Cyber Security Competitions Mike O Leary Towson University 16th Colloquium for Information Systems Security Education Orlando, FL June 11-13, 2012 M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE 2012 1 / 25

Regional & National Competitions National Collegiate Cyber Defense Competition (NCCDC) Regional Collegiate Cyber Defense Competitions UCSB Capture the Flag Competition Military Academies CDX National Cyber League (NCL) DC3 Digital Forensic Challenge MITRE Cyber Challenge Maryland Cyber Challenge Utah Cyber Challenge CANVAS MIT Lincoln Laboratory / CSAIL Capture the Flag Competition M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE 2012 2 / 25

Introduction M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE 2012 3 / 25

Introduction Source: http://commons.wikimedia.org/wiki/file:duke_unc_basketball_game_at_chapel_hill.jpg M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE 2012 4 / 25

Introduction M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE 2012 5 / 25

Introduction Source: http://www.arteyfotografia.com.ar/3544/fotos/180721/ M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE 2012 6 / 25

Introduction M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE 2012 7 / 25

Introduction M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE 2012 8 / 25

Introduction M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE 2012 9 / 25

Introduction M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE 2012 10 / 25

Our Experiences Long running hands-on capstone course in computer security Club level competitions Informal competitions with as many as five different schools Long time coach of the Towson Cyber Defense team Mid-Atlantic Collegiate Cyber Defense Competition National Collegiate Cyber Defense Competition Maryland Cyber Challenge CSC Cyb3r Battl3ground Competition M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE 2012 11 / 25

Our Environment Four tables with six computers per table. Hosts run VMWare Workstation Each computer has 16 GB of memory enabling us to run as many as eight virtual machines comfortably on a single host. The computers live on an isolated private network with only a file server containing software and installation discs. Students do not have privileged access to the host, and do not have access to the network infrastructure. We can (and do) use the lab for a class at 3:00, run a short 75 minute competition at 5:00, and then use the lab for another class at 7:00. M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE 2012 12 / 25

Our Environment A competition can be run by simply developing the necessary virtual machines and deploying them through the classroom. This is well within the capability of a single faculty member. Restricting work solely to virtual machines reduces complexity means students do not experiment with hardware firewalls, routers, and switches. Student participants all have a solid background in networking, operating systems, and databases. Our competitions are aimed at students of comparable skill levels. M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE 2012 13 / 25

Competition Types We have run three types of competitions: Class-based competitions Competitions with pre-built systems Competitions where student teams build their own systems. M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE 2012 14 / 25

Classroom Competitions: Setup Four teams of three to six students. Students are given functional requirements for a network. Students design, build, and implement their own network. Typical exercise tasks require DNS infrastructure Domain controllers File servers Remote access (e.g. SSH, RDP) Logging infrastructure More complex exercise tasks include Web servers (IIS and/or Apache) Databases Intrusion detection systems (Snort) E-Commerce solutions (e.g. Zen Cart) IPFire firewall solutions M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE 2012 15 / 25

Classroom Competitions: Structure Students provide the instructor with credentials for their network. Some credentials are secretly provided to other teams, who verify that the required services are running. Student teams without credentials are free to attack using any available tools. Student teams with credentials are free to attempt to escalate privileges. Student teams cannot know in advance if connections are legitimate (service verifications) or attacks. Some attacks are prohibited for pedagogical reasons- e.g. resource exhaustion DoS or log deletions. Students are graded on the basis of a written report Example: http://pages.towson.edu/moleary/docs/classes/ Cosc481-S12/Exercise3.pdf M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE 2012 16 / 25

Classroom Competitions: Lessons The instructor does not need to build all of the machines for the network. The instructor does not know the true state of the network. Course material is now available at cyberoperations.wordpress.com M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE 2012 17 / 25

Prebuilt Competitions: Environment Local competition used to prepare student teams for regional and national competitions. Two to four teams of four to eight students. Organizer provides each team with 6-10 prebuilt machines These are identical, save for names and addresses. They cover a range of services and operating systems. The systems are deliberately misconfigured to contain security holes. Students can play offense by playing defense. Students are awarded points for Detecting and remediating holes in their own network Successfully attacking other teams Style Why style? M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE 2012 18 / 25

Student Cyber Defense Teams Source: http://lolcats.icanhascheezburger.com/2012/06/06/funny-cat-pictures-there-was-a-fly-the-point-is-i-got-it/ M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE 2012 19 / 25

Prebuilt Competitions: Holes What kinds of holes can be put on systems? Pre-shared SSH keys Trojaning Metasploit Configuring VNC to silently start on boot Modifying path variables to allow other programs (e.g. netstat) to be trojaned Misconfiguring FTP servers- allowing anonymous read/write, or running as root Putting tools like PHPShell on the web server Adding privileged users to the system This is particularly fun via cron jobs or at tasks to occur later Using xinetd to bind a root shell Changing permissions on key system files Trojaning startup documentation M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE 2012 20 / 25

Prebuilt Competitions: Lessons Setup time is formidable 4 teams 6-10 systems 2-3 hours per system = a long week. Systems are less recyclable than might be expected Student interaction with the systems is limited to competition time Students enjoy the puzzle nature of the event M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE 2012 21 / 25

Build-A-Net Competitions: Design Student teams are provided with precise network specifications, which they then build on their own as virtual machines. Windows 2003 Server (Not R2), DC, DNS, RDP Windows 2008 Server (Not R2), DC, RDP, Exchange Fedora Core 4, DNS, SSH, MySQL (4.1.1) Ubuntu 8.04, SSH, Apache, PHP, MySQL, Joomla 1.5.12 Fedora 6, SSH, vsftpd 2.0.5 Windows XP (No SP) joined to the domain Windows Vista SP1, joined to the domain Precise required version numbers of other software (browsers, mail clients,.pdf readers, Adobe Flash) are provided. Version numbers are selected with known vulnerabilities in mind Software can be found at MSDNAA or at various open source repositories. The site http://oldapps.com is quite valuable for older Windows software. M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE 2012 22 / 25

Build-A-Net Competition: Timing & Lessons The amount of lead time provided to the students depends on their ability level. For newer students, one to two weeks. For advanced students or multi-school competitions, 48-72 hours. Students mis-estimate (badly) the amount of work necessary to set up such a network. Students learn much in this format. Significantly less work for the organizer. M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE 2012 23 / 25

Red Team All of these competitions have been run both with and without an external Red Team. Recruiting Red Team has been much simpler than expected. Approaching Red Team from the regional CCDC led to many volunteers, and to many recommendations. After running these competitions for many years, graduating seniors and other former students regularly volunteer to serve. M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE 2012 24 / 25

Questions? Mike O Leary School of Emerging Technologies Towson University moleary@towson.edu M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE 2012 25 / 25