📜 ⬆️ ⬇️

Come to the information security tournament and conference

0100010000110010001000000100110000110010001000000100011000110010001000
000101001000110010001000000101010100110010001000000000010001100100010
0000010001000011001000100000010001100011001000100000010100100011001000
1000000101010100110010001000000101001000110010001000000101010100110010
It's a glider, but you can't see it.

This year was very rich in vulnerabilities, beautiful hacks and non-standard attack methods. In the same year, the Ministry of Defense decided to create special security forces to protect critical objects. At the next C ^ 2 conference, experts will talk about this and share practical practical experiences.

Here is a report from the last conference, perhaps interesting to you by Mitnick's performance.
')
After the conference, the CTF IB tournament begins, not the first in Russia from the Cyber ​​Challenge line.

The conference


On September 17, we speak: Efim Bushmanov (revealing the Skype protocol), Artyom Vorobyov, director of information security BAYER, Fedor Tsarikovsky from FAS, Alexey Pleshkov from Gazprombank, Vladimir Naimark from PricewaterhouseCoopers, Mikhail Flenov (who wrote “C ++ programming by the eyes of a hacker” and a couple more books), Ilyas Chantos, Andrey Vyshlov and May Smart from Symantec, Alexander Makar from United Europe, Ivan Ivanov from control of UIB DB of VTB24 bank, as well as our expert Yevgeny Druzhinin.

In a programme:

September 17 (Wednesday), beginning at 14:00. Participation is free for managers of IT departments and departments of information security. Here more.

Tournament


One of the employees of a large company forgot a laptop in a taxi. At least they told you so. With it, you need to access information systems of a large corporation. You will have only four hours to crack the protection.

The principle is as usual on C ^ 2. A virtual network simulator of a large company, flags and a learning system (tips, removing points) that help those who get confused. With you - a laptop with Kali or a set of utilities to taste, we give the network and VPN to the simulator.

Inside - a system of flags. Each flag represents one of the tasks of network defense-attack, and is used to train information security specialists around the world. A set of flags emulates real-world vulnerabilities and user behavior on the network, as well as, sometimes, administrative response. For CTF players, this is traditionally a good and very useful game (below the link to reviews), and for the rest - a tutor. The fact is that the flags have 3 clues - from a hint to, in fact, direct instructions on what to do. And it helps to learn - not from the beginning, but from the level of an ordinary sysadmin in a small business for sure. Of course, a flag with a hint brings in far fewer points than a “clean” one.

Separate quest - getting access. We know about the history of how one of the participants of the tournament became a guest of Mitnick, taking badges from journalists, and we know how one of the participants tried to break the infrastructure in order to fix his score in the results table. The latter, alas, is forbidden by the rules, but we treat the first case with understanding if you act with ethical methods.

The main prize is a trip to London for the Vision conference and the iMAC monoblock. The second and third places - MacBook Air.


This year there were 235 online participants who went beyond the first obstacles. For 5 days of the hack tournament, 10,923 flags were taken by joint efforts, and the total game time was 6,357 man-hours. Last year there were 3,070 man-hours.


Flag distribution in a corporate network simulator

The tournament is attended by the winners of the online tour of this year, as well as two winners of last year (according to the conditions, they can not get prizes, but decided to play for the sake of sports interest).

On Wednesday, September 17, beginning at 17:00. All those who have registered are allowed to participate, more details here .

Come.

Source: https://habr.com/ru/post/236725/


All Articles