CYRIN CYBER RANGE Capture the Flag Contest

Sign Up for CYRIN’s First Capture the Flag Contest

Why Capture the Flag? As you know one of the most important skills in cyber defense is the ability to think like an attacker.  How will an adversary break in to your systems?  Are your sensitive files properly hidden from prying eyes?  Can a dedicated attacker steal encryption keys that would allow them to impersonate you?  Knowing how such attacks might work helps you securely configure and defend your systems.

A capture the flag (CTF) contest is a special kind of cybersecurity competition designed to challenge its participants to solve computer security problems and/or capture and defend computer systems. 

CYRIN’s Capture the Flag (CTF) challenges let you hone your skills and see how an attacker would exploit configuration weaknesses.  All participants start on a level playing field, with the same tools: a fully-loaded Kali Linux box with standard penetration testing tools.  Using these tools, your job is to break in to an unknown system on your local network.  You have three goals, arranged in increasing level of difficulty:
 
1. Read a web-accessible file that is not intended to be public.
2. Read a key file owned by a user on the target system.
3. Read a key file owned by the root (administrative) user. 
 
If you achieve the third goal, you have obtained total control over the target system - starting only from a web application!
 
If you get stuck, hints are available—but be careful, the system keeps track of which hints you request! You will be assessed based on how many of the goals you achieve, how long it takes you, and whether you required any hints to achieve the goals. 
 
Participants will be ranked as follows:
 
  • First Place (GOLD): the participant who reads all 3 flag files in the fastest time with no hints used.  Winner receives Free Level 3 Access to CYRIN FOR 1 YEAR!
  • Second Place (SILVER): participants who read all 3 flag files, with no hints used, ranked by time required. Prize –Free Level 2 Access to CYRIN FOR 1 YEAR!
  • Third Place (BRONZE): participants who read all 3 flag files, with no hints used, in the third-fastest time. Prize – Free Level 1 Access to CYRIN FOR 1 YEAR! 

To Take Part In The Contest  SIGN UP  >  HERE

 

 

 

 

« GDPR Is Failing By Not Being Enforced
Creating A Data-Driven Business Culture »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DriveLock

DriveLock

Our security solution is designed to prevent external attacks, which are evermore sophisticated as well as monitor, document and even prevent internal incidents.

Information Security Media Group (ISMG)

Information Security Media Group (ISMG)

Information Security Media Group is the world’s largest media organization devoted solely to information security and risk management.

Information Security Research Association (ISRA)

Information Security Research Association (ISRA)

ISRA is a non-profit organization focused on various aspects of Information Security including security research and cyber security awareness activities.

International Telecommunication Union (ITU)

International Telecommunication Union (ITU)

ITU is the United Nations specialized agency for information and communication technologies – ICTs. Areas of activity include cybersecurity.

BioConnect

BioConnect

BioConnect provide biometric access control solutions to verify a person’s identity across physical, IOT and digital applications.

EOL IT Services

EOL IT Services

EOL IT Services is the UK’s most accredited provider of IT Asset Disposal (ITAD), Lifecycle Services and Data Destruction.

Bolt Learning

Bolt Learning

Bolt's Cyber Security eLearning module provides users with an in-depth understanding of cybercrime, how it can occur and what everyone can contribute to preventing it.

Siemens

Siemens

Siemens Industrial Security Services provide solutions for cybersecurity in automation environments based on the recommendations of the international standard IEC 62443.

Vention

Vention

Vention (formerly iTechArt) is the partner of forward-thinking tech leaders around the globe.

Aligned Technology Solutions (ATS)

Aligned Technology Solutions (ATS)

ATS manage, monitor, and maintain everything from your network and servers to your workstations and mobile devices, and we do it proactively to eliminate downtime and keep hackers at bay.

MetaCert

MetaCert

MetaCert’s Zero Trust browser software reduces the risk of organizations being compromised with a phishing-led cyberattack by more than 98%.

HiddenLayer

HiddenLayer

HiddenLayer is a provider of security solutions for machine learning algorithms, models and the data that power them.

Information Security Officers Group (ISOG)

Information Security Officers Group (ISOG)

ISOG's mission is to strengthen information security through awareness and education programs, promoting community and fellowship among information security leaders.

European Cybersecurity Competence Centre (ECCC)

European Cybersecurity Competence Centre (ECCC)

The ECCC aims to increase Europe’s cybersecurity capacities and competitiveness, working together with a Network of National Coordination Centres to build a strong cybersecurity Community.

CatchProbe Intelligence Technologies

CatchProbe Intelligence Technologies

CatchProbe provides actionable web intelligence, OSINT, deception systems, threat intelligence, and digital crime analytics solutions and products through an AI-Driven intelligence platform.

Paragon Cyber Solutions

Paragon Cyber Solutions

Paragon Cyber Solutions provides specialized security risk management and IT solutions to protect the integrity of your business operations.