CYRIN CYBER RANGE Capture the Flag Contest

Sign Up for CYRIN’s First Capture the Flag Contest

Why Capture the Flag? As you know one of the most important skills in cyber defense is the ability to think like an attacker.  How will an adversary break in to your systems?  Are your sensitive files properly hidden from prying eyes?  Can a dedicated attacker steal encryption keys that would allow them to impersonate you?  Knowing how such attacks might work helps you securely configure and defend your systems.

A capture the flag (CTF) contest is a special kind of cybersecurity competition designed to challenge its participants to solve computer security problems and/or capture and defend computer systems. 

CYRIN’s Capture the Flag (CTF) challenges let you hone your skills and see how an attacker would exploit configuration weaknesses.  All participants start on a level playing field, with the same tools: a fully-loaded Kali Linux box with standard penetration testing tools.  Using these tools, your job is to break in to an unknown system on your local network.  You have three goals, arranged in increasing level of difficulty:
 
1. Read a web-accessible file that is not intended to be public.
2. Read a key file owned by a user on the target system.
3. Read a key file owned by the root (administrative) user. 
 
If you achieve the third goal, you have obtained total control over the target system - starting only from a web application!
 
If you get stuck, hints are available—but be careful, the system keeps track of which hints you request! You will be assessed based on how many of the goals you achieve, how long it takes you, and whether you required any hints to achieve the goals. 
 
Participants will be ranked as follows:
 
  • First Place (GOLD): the participant who reads all 3 flag files in the fastest time with no hints used.  Winner receives Free Level 3 Access to CYRIN FOR 1 YEAR!
  • Second Place (SILVER): participants who read all 3 flag files, with no hints used, ranked by time required. Prize –Free Level 2 Access to CYRIN FOR 1 YEAR!
  • Third Place (BRONZE): participants who read all 3 flag files, with no hints used, in the third-fastest time. Prize – Free Level 1 Access to CYRIN FOR 1 YEAR! 

To Take Part In The Contest  SIGN UP  >  HERE

 

 

 

 

« GDPR Is Failing By Not Being Enforced
Creating A Data-Driven Business Culture »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Red Hat

Red Hat

Red Hat is a leader in open source software development. Our software security team proactively identifies weaknesses before they become problems.

Egress Software Technologies

Egress Software Technologies

Egress Software Technologies is a leading provider of data security services designed to protect shared information throughout its lifecycle.

Hodgson Russ

Hodgson Russ

Hodgson Russ is a US business law firm. Practice areas include Privacy, Data Breach & Cybersecurity.

CONCERT

CONCERT

CONCERT is a Computer Emergency Response Team and cyber security information sharing network for companies, institutes and government in Korea.

Adlink Technology

Adlink Technology

ADLINK is a leading provider of embedded computing products and services for applications including IoT and industrial automation.

Fujitsu

Fujitsu

Fujitsu is the leading Japanese global information and communication technology company, offering a full range of products, solutions and services including Managed IT Services and Cyber Security.

Sapien Cyber

Sapien Cyber

Sapien Cyber is an Australian company bringing leading-edge cyber security and threat intelligence solutions.

Crosser

Crosser

The Crosser Platform enables real-time processing of streaming or batch data for Industrial IoT, Data Transformation, Analytics, Automation and Integration.

Alpine Cyber Solutions

Alpine Cyber Solutions

Alpine Cyber is a Managed IT Service Provider focused on cybersecurity and cloud services.

Google for Startups

Google for Startups

Google for Startups is Google’s initiative to help startups thrive across every corner of the world.

PricewaterhouseCoopers (PwC)

PricewaterhouseCoopers (PwC)

PricewaterhouseCoopers is a multinational professional services network of firms headquartered in London, United Kingdom and operating in 157 countries.

Intel

Intel

Intel products are engineered with built-in security technologies to help protect potential attack surfaces.

Sevco Security

Sevco Security

Sevco Delivers Real-time Asset Intelligence to Identify and Close Unknown Security Gaps.

Avalor

Avalor

Avalor are on a mission to help security teams make faster, more accurate decisions by making sense of their data. With Avalor you can bring in data from anywhere, normalize it and analyze it.

ASRC Federal

ASRC Federal

ASRC Federal’s mission is to help federal civilian, intelligence and defense agencies achieve successful outcomes and elevate their mission performance.

ANY.RUN

ANY.RUN

ANY.RUN is an interactive online malware analysis service created for dynamic as well as static research of multiple types of cyber threats.