CYRIN CYBER RANGE Capture the Flag Contest

Sign Up for CYRIN’s First Capture the Flag Contest

Why Capture the Flag? As you know one of the most important skills in cyber defense is the ability to think like an attacker.  How will an adversary break in to your systems?  Are your sensitive files properly hidden from prying eyes?  Can a dedicated attacker steal encryption keys that would allow them to impersonate you?  Knowing how such attacks might work helps you securely configure and defend your systems.

A capture the flag (CTF) contest is a special kind of cybersecurity competition designed to challenge its participants to solve computer security problems and/or capture and defend computer systems. 

CYRIN’s Capture the Flag (CTF) challenges let you hone your skills and see how an attacker would exploit configuration weaknesses.  All participants start on a level playing field, with the same tools: a fully-loaded Kali Linux box with standard penetration testing tools.  Using these tools, your job is to break in to an unknown system on your local network.  You have three goals, arranged in increasing level of difficulty:
 
1. Read a web-accessible file that is not intended to be public.
2. Read a key file owned by a user on the target system.
3. Read a key file owned by the root (administrative) user. 
 
If you achieve the third goal, you have obtained total control over the target system - starting only from a web application!
 
If you get stuck, hints are available—but be careful, the system keeps track of which hints you request! You will be assessed based on how many of the goals you achieve, how long it takes you, and whether you required any hints to achieve the goals. 
 
Participants will be ranked as follows:
 
  • First Place (GOLD): the participant who reads all 3 flag files in the fastest time with no hints used.  Winner receives Free Level 3 Access to CYRIN FOR 1 YEAR!
  • Second Place (SILVER): participants who read all 3 flag files, with no hints used, ranked by time required. Prize –Free Level 2 Access to CYRIN FOR 1 YEAR!
  • Third Place (BRONZE): participants who read all 3 flag files, with no hints used, in the third-fastest time. Prize – Free Level 1 Access to CYRIN FOR 1 YEAR! 

To Take Part In The Contest  SIGN UP  >  HERE

 

 

 

 

« GDPR Is Failing By Not Being Enforced
Creating A Data-Driven Business Culture »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Lloyd's

Lloyd's

As an insurance market, Lloyd’s can provide access to more than 65 expert cyber risk insurers in one place.

Feedzai

Feedzai

Feedzai provide software that uses big data analysis and machine-based learning to prevent fraud in ecommerce.

MAD Security

MAD Security

MAD Security is a premier provider of information and cybersecurity solutions that combine technology, managed security services, support and training.

CSIRT-NQN

CSIRT-NQN

CSIRT-NQN is the Computer Incident Response Team for the Argentine province of Neuquen.

Monegasque Digital Security Agency (AMSN)

Monegasque Digital Security Agency (AMSN)

AMSN is the national authority in charge of the security of information systems in Monaco.

Uniwan

Uniwan

Uniwan is an IT services company specializing in networking and security.

AVORD

AVORD

AVORD is a cloud-based security testing platform that allows clients to manage security testing requirements in a far more productive and efficient way.

ICS-CSR

ICS-CSR

ICS-CSR is a research conference bringing together researchers with an interest in the security of industrial control systems.

NSA Career Development Programs

NSA Career Development Programs

NSA offers entry-level programs to help employees enhance their skills, improve their understanding of a specific discipline and even cross-train into a new career field.

Cyber Smart Defense

Cyber Smart Defense

Cyber Smart Defense is a specialist provider of penetration testing services and IT security audits.

Across Verticals

Across Verticals

Across Verticals is a boutique cyber security consulting firm that specializes in holistic, deeply technical and end to end cyber security advisory services based on industry best practices.

BAE Systems

BAE Systems

BAE Systems develop, engineer, manufacture, and support products and systems to deliver military capability, protect national security, and keep critical information and infrastructure secure.

SkillsDA

SkillsDA

SkillsDA is pureplay company in cyber security involved in capacity building towards National Security.

CyberTest

CyberTest

CyberTest offers cybersecurity consulting and penetration testing services that helps organizations and businesses securing their assets.

SoConnect

SoConnect

SoConnect provides safe, secured, and taken care of IT, with infrastructure built around you and your business.