CYRIN CYBER RANGE Capture the Flag Contest

Sign Up for CYRIN’s First Capture the Flag Contest

Why Capture the Flag? As you know one of the most important skills in cyber defense is the ability to think like an attacker.  How will an adversary break in to your systems?  Are your sensitive files properly hidden from prying eyes?  Can a dedicated attacker steal encryption keys that would allow them to impersonate you?  Knowing how such attacks might work helps you securely configure and defend your systems.

A capture the flag (CTF) contest is a special kind of cybersecurity competition designed to challenge its participants to solve computer security problems and/or capture and defend computer systems. 

CYRIN’s Capture the Flag (CTF) challenges let you hone your skills and see how an attacker would exploit configuration weaknesses.  All participants start on a level playing field, with the same tools: a fully-loaded Kali Linux box with standard penetration testing tools.  Using these tools, your job is to break in to an unknown system on your local network.  You have three goals, arranged in increasing level of difficulty:
 
1. Read a web-accessible file that is not intended to be public.
2. Read a key file owned by a user on the target system.
3. Read a key file owned by the root (administrative) user. 
 
If you achieve the third goal, you have obtained total control over the target system - starting only from a web application!
 
If you get stuck, hints are available—but be careful, the system keeps track of which hints you request! You will be assessed based on how many of the goals you achieve, how long it takes you, and whether you required any hints to achieve the goals. 
 
Participants will be ranked as follows:
 
  • First Place (GOLD): the participant who reads all 3 flag files in the fastest time with no hints used.  Winner receives Free Level 3 Access to CYRIN FOR 1 YEAR!
  • Second Place (SILVER): participants who read all 3 flag files, with no hints used, ranked by time required. Prize –Free Level 2 Access to CYRIN FOR 1 YEAR!
  • Third Place (BRONZE): participants who read all 3 flag files, with no hints used, in the third-fastest time. Prize – Free Level 1 Access to CYRIN FOR 1 YEAR! 

To Take Part In The Contest  SIGN UP  >  HERE

 

 

 

 

« GDPR Is Failing By Not Being Enforced
Creating A Data-Driven Business Culture »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XCure Solutions

XCure Solutions

XCure Solutions are a Finnish company specializing in data security, data protection and data recovery.

Sliced Tech

Sliced Tech

Sliced Tech provides enterprise grade managed Cloud services, including Security-as-a-Services, aimed at meeting the needs of commercial and government clients from within Australia.

Yelbridges

Yelbridges

Yelbridges is your reliable partner in all fields of IT-Security, from developing of Security Policies and Guidelines to the design and implementation of secure processes.

CyberDegrees.org

CyberDegrees.org

CyberDegrees.org aims to provide top-notch information for students seeking Cyber Security education and career guidance.

BHC Laboratory

BHC Laboratory

BHC Laboratory is a cyber capabilities’ development company for a wide range of global customers.

Augusta HiTech

Augusta HiTech

Augusta Hitech is a focused product development, software services and technology consulting company. Our Vision is to become the most socially impactful and innovative technology company in the world

Plug and Play Tech Center

Plug and Play Tech Center

Plug and Play is the ultimate innovation platform, bringing together the best startups and the world’s largest corporations.

Red Piranha

Red Piranha

Red Piranha's Crystal Eye Unified Threat Management Platform is designed for Managed Service Providers and corporations that need extreme security that is both easy to use and affordable.

Conatix

Conatix

Conatix was formed to apply recent advances in AI and other fields of technology to insider fraud, one of the most intractable problems in cybersecurity.

Componolit

Componolit

Componolit GmbH is a highly specialized company with a strong emphasis on trustworthy software, component-based systems and formal verification.

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER) conducts full spectrum military cyberspace operations in order to enable freedom of action in cyberspace and deny the same to the adversary.

Avetta

Avetta

Avetta One is the industry’s largest Supply Chain Risk Management (SCRM) platform. It enables clients to manage supply chain risks and suppliers to prove the value of their business.

SideChannel

SideChannel

At SideChannel, we match companies with an expert virtual CISO (vCISO), so your organization can assess cyber risk and ensure cybersecurity compliance.

Cyberplc

Cyberplc

Cyberplc is a global cybersecurity consulting firm providing services to government, the public sector and enterprises.

BreakPoint Labs

BreakPoint Labs

BreakPoint Labs is dedicated to providing the methods and means for sustainable, measurable, and effective cybersecurity operations.

AirMDR

AirMDR

Designed by experts, AirMDR solutions cater to the unique demands of security operations centers.