CYRIN CYBER RANGE Capture the Flag Contest

Sign Up for CYRIN’s First Capture the Flag Contest

Why Capture the Flag? As you know one of the most important skills in cyber defense is the ability to think like an attacker.  How will an adversary break in to your systems?  Are your sensitive files properly hidden from prying eyes?  Can a dedicated attacker steal encryption keys that would allow them to impersonate you?  Knowing how such attacks might work helps you securely configure and defend your systems.

A capture the flag (CTF) contest is a special kind of cybersecurity competition designed to challenge its participants to solve computer security problems and/or capture and defend computer systems. 

CYRIN’s Capture the Flag (CTF) challenges let you hone your skills and see how an attacker would exploit configuration weaknesses.  All participants start on a level playing field, with the same tools: a fully-loaded Kali Linux box with standard penetration testing tools.  Using these tools, your job is to break in to an unknown system on your local network.  You have three goals, arranged in increasing level of difficulty:
 
1. Read a web-accessible file that is not intended to be public.
2. Read a key file owned by a user on the target system.
3. Read a key file owned by the root (administrative) user. 
 
If you achieve the third goal, you have obtained total control over the target system - starting only from a web application!
 
If you get stuck, hints are available—but be careful, the system keeps track of which hints you request! You will be assessed based on how many of the goals you achieve, how long it takes you, and whether you required any hints to achieve the goals. 
 
Participants will be ranked as follows:
 
  • First Place (GOLD): the participant who reads all 3 flag files in the fastest time with no hints used.  Winner receives Free Level 3 Access to CYRIN FOR 1 YEAR!
  • Second Place (SILVER): participants who read all 3 flag files, with no hints used, ranked by time required. Prize –Free Level 2 Access to CYRIN FOR 1 YEAR!
  • Third Place (BRONZE): participants who read all 3 flag files, with no hints used, in the third-fastest time. Prize – Free Level 1 Access to CYRIN FOR 1 YEAR! 

To Take Part In The Contest  SIGN UP  >  HERE

 

 

 

 

« GDPR Is Failing By Not Being Enforced
Creating A Data-Driven Business Culture »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

SiteLock

SiteLock

SiteLock is a global leader in website security solutions. We provide affordable, cybersecurity software solutions designed to allow small to midsize businesses to operate without fear of an attack.

Granite Partners

Granite Partners

Granite is a cloud service for the development of business risk management, cyber security and privacy and occupational safety and health.

Certus Software

Certus Software

Our Secure Data Erasure solutions protect customer data confidentiality by completely erasing it from data storage devices.

TEISS

TEISS

Teiss.co.uk is a website dedicated to providing information about cyber security. TEISS also provide a series of conferences and events focused on cyber security.

Vintegris

Vintegris

Vintegris are a Certification Authority and manufacturer of innovative systems and applications for the full cycle of digital identity.

Clym

Clym

Clym is the data privacy platform that helps organisations meet their data protection obligations. Cookies, Consent, Requests, Policies and more are all managed in a secure and adaptive application.

Verifi

Verifi

Verifi is an award-winning provider of end-to-end payment protection and risk management solutions.

Axonius

Axonius

Axonius is the only solution that offers a unified view of all assets and their coverage, empowering customers to take action to enforce their organization’s security policies.

Red Snapper Recruitment

Red Snapper Recruitment

Red Snapper Recruitment is a market leading staffing services provider to the law enforcement, cyber security, offender supervision and regulatory services markets.

Crypto Valley Association

Crypto Valley Association

Crypto Valley Association is an independent, government-supported association established to build the world’s leading blockchain and cryptographic technologies ecosystem.

Terralogic

Terralogic

Terralogic is a software and IT services company, an expert in IoT, Cloud, DevOps, App development and Cybersecurity.

Porto Research, Technology & Innovation Center (PORTIC)

Porto Research, Technology & Innovation Center (PORTIC)

PORTIC brings together several research centers and groups from P.PORTO in a single space, forming a superstructure dedicated to research, technology transfer, innovation and entrepreneurship.

BitTrap

BitTrap

BitTrap helps companies worldwide detect attackers and put an early end to breaches, preventing data exfiltration and ransomware altogether.

WithSecure

WithSecure

WithSecure (formerly F-Secure Business) is your reliable cyber security partner, providing outcome-based cyber security that protects and enables operations.

McDonald Hopkins

McDonald Hopkins

McDonald Hopkins is a business advisory and advocacy law firm. We focus on insightful legal solutions that help our clients strategically plan for an increasingly competitive future.

Cyber Qubits

Cyber Qubits

Cyber Qubits is a cybersecurity training and consulting company focused on developing the next generation of cybersecurity professionals.

Cyberagentur (Cyber Agency)

Cyberagentur (Cyber Agency)

Cyberagentur is the Federal Agency in Germany for innovation in cybersecurity. Our mission is to advance research and groundbreaking innovations in the field of cybersecurity and related technologies.