Explore the TechTarget Network at SearchTechTarget.com. Activate your FREE membership today | Log-in


Search this site and the Web
powered by Google
HomeNewsTopicsAsk the ExpertsTipsDiscussionsWebcastsWhite PapersProductsCareersSite Map
Home > News >

Capture the Fla...

EMAIL THIS PAGE TO A FRIEND

Security News:

Search for:   in   Full TargetSearch with Google

Capture the Flag competitions can net far more than fun

By Anne Saita, Staff Writer
16 Aug 2004 | SearchSecurity.com

SAN DIEGO -- Need to boost morale? Find flaws in your systems? Enhance employees' security skills? Consider Capture the Flag competitions.

At last week's Usenix Security Symposium, experts advocated these hacking contests to improve security programs by allowing employees or students to attack simulated networks. In the process, enterprises can become more adept at finding soft spots in their real-life systems while employees discover weaknesses in their own skills.

"Pretty much any security practitioner will tell you that you need to know how to attack to know how to defend," noted Marc Dougherty, a recent Northeastern University graduate who came to enhance his campus's Capture the Flag program after initially exploiting a weakness to win.

The goal of most games is to gain root access to privileged areas and retrieve a token. Then it's just as important to hold off attackers trying to steal that booty.

"The competition creates teamwork, and that's something most security classes do not focus on," said Giovanni Vigna, a University of California, Santa Barbara, computer science professor who incorporates student competitions into his curriculum.

"One criticism has been that it's not realistic," he continued. Usually defense is a slow-building process, he explained, "while this is concentrated Campbell's soup. But I think it's well suited for education because it can really put people in a crisis situation -- and that's something normally not taught in classrooms."

Nor in the workplace. Capture the Flag contests are used increasingly as a corporate training tool, according to Tina Bird, a Stanford University network security expert who moderated a panel on the competitions. Intel, for example, has fielded a team for DefCon. "I know that it's in a lot of companies now," she said.

The panel also included professor Chris Eagle, whose Naval Postgraduate School team captured the flag this year at DefCon, and Riley Eller, better known in hacker circles as Caesar. His group, Ghetto Hackers, has run DefCon's game for several years and will create competitions for private groups (including companies) upon request.

Though growing in popularity, the competitions are still difficult to orchestrate.

First and foremost, the games must be done on isolated networks. "Never, ever wire a contest to a real network," Eller warned.

Some contests allow Internet access to retrieve online tools, but this can create liabilities if the game gets out of hand. Ethics need to be stressed and repercussions for violators well outlined. "There's an element of trust that they're going to keep it inside the trusted network," Eagle said. Dougherty added, "It's in everyone's best interest to behave."

Scoring can be difficult. "It's not like a 40-year dash. It's just difficult to quantify," Bird remarked. The reward system must be explained and enforced -- and fair to both attackers and defenders. Be sure to use licensed copies of any commercial software, too.

"And don't try to reverse engineer the scoring system," Vigna advised. "That's lame."


RELEVANT SPONSORED LINKS
Firewalls Aren't Enough
Protect your Microsoft Web Servers
from attack - learn why. Free Trial
www.eeye.com
Expert Network Security
Network Attack Security
Download Your Free White Paper Now!
www.TopLayer.com
Secure from RPC?
CORE IMPACT- verify your network is
secure with a full pen test product
www.CoreSecurity.com
Denial-Of-Service Attack
Article in Newsweek
Read it online. Free Trial!
www.KeepMedia.com
ITtoolbox Security Blog
Follow case studies from a leading
information security investigator.
Blogs.ITtoolbox.com


EMAIL A FRIEND
Send the article you've just read to a friend
LATEST HEADLINES  
>>  Security appliances: Hype vs. reality (SearchSecurity.com) EXCLUSIVE!
>>  Report card: Security appliances (Information Security) EXCLUSIVE!
>>  Detailed comparison: Firewall (Information Security) EXCLUSIVE!
>>  Detailed comparison: Virtual Private Network (VPN) (Information Security) EXCLUSIVE!
>>  Detailed comparison: Antivirus (Information Security) EXCLUSIVE!

  WHAT'S NEW
on SearchSecurity
1. Visit the new SearchWindowsSecurity.com!
2. Network with your peers
3. Security e-Newsletters - Free
4. Top 10 Clicks of the Week
TechTarget Security Media
Information Security View this month's issue and subscribe today.
Information Security Decisions Apply online for free conference admission.
SearchSecurity.com
HomeNewsTopicsAsk the ExpertsTipsDiscussionsWebcastsWhite PapersProductsCareersSite Map
About Us  |  Contact Us  |  For Advertisers  |  For Business Partners  |  Reprints
SEARCH 
SearchSecurity.com is part of the TechTarget network of industry-specific IT Web sitesSearchSecurity.com is part of the TechTarget network of industry-specific IT Web sites
WINDOWS
SearchExchange.com
SearchVB.com
SearchWin2000.com
SearchWindowsSecurity.com
Labmice.net
MyITForum.com

APPLICATIONS
SearchCRM.com
SearchSAP.com

ENTERPRISE IT MANAGEMENT
SearchCIO.com
SearchSmallBizIT.com

CORE TECHNOLOGIES
SearchDatabase.com
SearchMobileComputing.com
SearchNetworking.com
SearchOracle.com
SearchSecurity.com
SearchStorage.com
SearchWebServices.com
WhatIs.com

PLATFORMS
Search390.com
Search400.com
SearchDomino.com
SearchEnterpriseLinux.com
TechTarget Expert Answer Center  |  TechTarget Enterprise IT Conferences  |  TechTarget Corporate Web Site  |  Media Kit

Explore SearchTechTarget.com, the guide to the TechTarget network of industry-specific IT Web sites.

All Rights Reserved, Copyright 2000 - 2004, TechTarget Read our Privacy Statement