User Tools

Site Tools


cyberconquest

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
cyberconquest [2021/11/10 18:19] Gaelincyberconquest [2023/08/23 04:44] (current) Gaelin
Line 1: Line 1:
-===== CyberConquest =====+====== CyberConquest ======
  
-Cyber Conquest is a purple team competition! This means that each team can attack other teams while they are defending their environment using their offensive skills along side their defensive skills+Cyber Conquest is a purple-team cybersecurity competition (that is, it combines both offensive and defensive skillsets) into one king-of-the-hill contest. Teams are tasked with defending their own infrastructure while attacking other team’s infrastructure to gain points. Defensive points are gained by keeping your services up and keeping other teams off your systems, and offensive points are gained by planting your flag on opponent’s systems
-Teams of around 4 people are be given 5-10 systems and work together to secure them from the other teamsTeams gain points for their scored services being functional and for gaining access to other teamssystems.+ 
 +Successful teams will consist of both attackers and defenders. Teams must communicate and work together to as effective as possibleWhile good offense informs defense, good defense also informs offense. 
 + 
 +==== Defense (Blue) ==== 
 + 
 +Each team will be given console access to systems that they are responsible for. Similar to defensive competitions like CCDC, each of these systems will be running a set of services that must be maintained in order to gain defender points. Defenders are tasked with securing these systems while maintaining service uptime. A large part of securing these systems will consist of seeking out and destroying enemy persistence. All teams will start with nearly identical systems, so as a secondary objective, defenders should look for vulnerabilities in their systems which their attacker teammates can exploit on other teams. 
 + 
 +==== Attack (Red) ==== 
 + 
 +Each team will be given a token. To earn attacker points, the team must hit the scoring engine with that token (via curl, wget, etc). The goal is not to destroy systems but rather to stealthily gain access and plant persistence. Therefore, offensive and defensive points are only awarded if a system’s services are online and functioning. 
 + 
 +=== Persistence Points === 
 + 
 +Hit the scoring engine with an HTTP GET request at where here TOKEN is your team token that we've given to you, and that IP is the scoring engine. <code>http://10.30.0.100/persist/TOKEN</code> You must request that URL from the machine that you've hacked. The engine determines what machine you're on based on its IP address. For example, if your token was soup, you'd prove persistence like this: 
 + 
 +<code> 
 +curl http://10.30.0.100/persist/soup 
 +</code> 
 + 
 +Or on Windows (powershell): 
 +<code> 
 +Invoke-WebRequest -Uri http://10.30.0.100/persist/soup 
 +</code> 
 + 
 +See the [[https://scoring.defsec.club|scoring engine]] for more competition-specific information. 
 + 
 + 
 +=== DakotaCon 10.1 Cyber Conquest === 
 +    * [[https://blog.gael.in/cyberconquest|Infrastructure write up by Gaelin]]
cyberconquest.1636568345.txt.gz · Last modified: 2021/11/10 18:19 by Gaelin

Except where otherwise noted, content on this wiki is licensed under the following license: Public Domain
Public Domain Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki