Cyber Defense Competition Has A New Champion 66
lisah writes "Several colleges across the country went head-to-head in San Antonio, Texas last weekend at the National Collegiate Cyber Defense Competition to see which team could best protect their networks against attacks. In a modern day version of Steal the Flag, the teams duked it out using identical network setups that included a Cisco router and five servers. In the end, Baker College took the champion's title from last year's winner, Texas A & M University."
Cyber war-gaming (Score:5, Interesting)
Exercises such as these are critically important to war-game any networked system, particularly when that system is using commercial off the shelf solutions and commodity hardware that is accessible and easy to explore outside the realm of cyber warfare. i.e. war-gaming your attacks before going live...
Re: (Score:3, Insightful)
Re: (Score:2)
Baker college?!? (Score:1)
Re: (Score:2)
Re: (Score:2)
On your marks, get set... (Score:3, Funny)
Re:On your marks, get set... (Score:4, Funny)
7:00 - Co-ed full contact bash programming
8:00 - PHP fantasy team preview
9:00 - X-Treme PERL recital!
10:00 - World's Strongest Stench competition
11:00 - Geekcenter
Re:On your marks, get set... (Score:4, Funny)
Re: (Score:2)
Re: (Score:1)
When I was in high school we travelled to another school for a chess match. They actually had cheerleaders. But since there were no fans, and the cheerleaders of course had to be quiet, it was rather strange.
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Oh, it certainly feels like Comcast is inserting something into customers...
Not sure what this proves (Score:5, Insightful)
Re:Not sure what this proves (Score:5, Funny)
Re:Not sure what this proves (Score:4, Interesting)
Re:Not sure what this proves (Score:4, Interesting)
Re: (Score:1)
Re: (Score:3, Informative)
Usually competitions like this are in "Which OS is most secure" kinds of settings, where the ostensible purpose is to find out which OS is the most secure. However, in this case, you had you had a bunch of different OSs all linked together, and you had to protect them from a bunch of security professionals. I imagine these "pros" probably weren't hard-core hackers, and given that, I'm not sure what the value of the exercise was.
These "pros" as you said are actually professional flown in from around the country who either are partners in consulting companies or just a level below that. Everyone on the red team does it for a living at the national level and certainly is not a bunch of non hardcore hackers who said o lets have fun. But then again what do i know, I was on the red team.
Re: (Score:2)
My point wasn't that they didn't hire security professionals, or that they didn't hire people who knew how to break into systems. They hired people who don't break into systems professionally, and that's what you'll be up against in the real world. It's like putting Home Guardsmen on the front line.
Re: (Score:1)
Re: (Score:2)
If I'm mistaken, please correct me. Also, see what kind of havoc you can cause next year by flooding the pipes with useless data. If the box is too busy serving bogus requests and it drops some legit ones, that counts as service outage, right?
Re: (Score:1)
Re: (Score:2)
Elite Network Counter Strike Force pwn Teens:
http://it.slashdot.org/comments.pl?sid=227039&cid=18391373 [slashdot.org]
Re: (Score:1)
Usually competitions like this are in "Which OS is most secure" kinds of settings, where the ostensible purpose is to find out which OS is the most secure. However, in this case, you had you had a bunch of different OSs all linked together, and you had to protect them from a bunch of security professionals. I imagine these "pros" probably weren't hard-core hackers, and given that, I'm not sure what the value of the exercise was. These pros won't have anything in their arsenal that everybody doesn't already know about it (at least, if they're studying computer security, they *ought* to know about it), and so we're basically left with (and this is something the article mentions) a bunch of people changing their conf files as fast as possible. If you ask me, they should six Eastern Europeans and North Koreans, and offer them $10,000 for every box they own. If the teams box doesn't get owned, they get the ten grand. Simpler, more interesting, and far more realistic.
being both from eastern europe and also a decent hacker, I like that idea
Re: (Score:1)
RIT (Score:2)
In a previous life .. (Score:1)
Re: (Score:1)
from a Red Team member perspective.... (Score:5, Informative)
Someone hasn't played UT... (Score:2)
steal the flag? wth (Score:1)
Re: (Score:2)
More of a System Administration Challenge (SAC!) (Score:1)
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)
I led a team that competed in one of the qualifiers and found the competition extremely wanting. It's more of an arcane system administration challenge rather than anything about security. Some responses to the competition are collected at my lab's blog here: http://isisblogs.poly.edu/2008/02/29/pre-neccdc/ [poly.edu] (see the comments)
I agree with you completely. I was a captain for a team that made it to the finals the first year they held nationals. The majority of business injects are related to system administration. Most of the strategies to win involve patching quickly and changing stupid defaults (among other things). However, I don't complain too much because it is a fun experience. Also, I haven't come up with better "rules" for the game. One of the biggest challenges was to devise a security competition that didn't promo
Re: (Score:2)
That should be the immediate first step (Score:2)
Re: (Score:2)
Red Vs Blue ? (Score:1)
Who was caboose ?