Symantec Cyber Readiness Challenge Player’s Manual Version 1.6 January 20, 2014 Table of Contents Introduction ...................................................................................................................................... 3 1 The Cyber Readiness Challenge ............................................................................................... 4 1.1 1.2 1.3 1.4 1.5 Your Credentials ............................................................................................................................................... 4 Accessing the Competition ............................................................................................................................... 4 Scoring.............................................................................................................................................................. 4 Obtaining Support ............................................................................................................................................. 5 Continuing Professional Education (CPE) Credit ............................................................................................. 5 2 Cyber Readiness Challenge Event Preparation ....................................................................... 6 2.1 2.2 2.3 Rules ................................................................................................................................................................. 6 Resources Required ......................................................................................................................................... 6 Using a Live CD or a Virtual Machine on Your System .................................................................................... 7 3 Connecting to the Event ............................................................................................................ 8 3.1 3.2 3.3 Requirements ................................................................................................................................................... 8 Settings ............................................................................................................................................................. 8 Connecting........................................................................................................................................................ 8 4 Using the Scoreboard and Team Chat ...................................................................................... 9 4.1 4.2 4.3 4.4 4.5 4.6 4.7 Preface ............................................................................................................................................................. 9 Accessing the Scoreboard................................................................................................................................ 9 The Scoreboard ................................................................................................................................................ 9 Navigating Between Levels .............................................................................................................................. 9 Viewing Your Progress...................................................................................................................................... 9 Support ........................................................................................................................................................... 10 Team Chat ...................................................................................................................................................... 10 5 VPN Configuration for Kali ...................................................................................................... 11 5.1 5.2 Launch Kali ..................................................................................................................................................... 11 Client Install .................................................................................................................................................... 11 6 VPN Configuration for BackTrack 5R3 with Gnome .............................................................. 14 6.1 6.2 Launch BackTrack .......................................................................................................................................... 14 Client Installation ............................................................................................................................................ 14 7 VPN Configuration for Windows ............................................................................................. 18 7.1 Client Installation ............................................................................................................................................ 18 8 VPN Configuration for Mac OS X ............................................................................................ 23 8.1 Client Installation ............................................................................................................................................ 23 Appendices..................................................................................................................................... 27 Appendix A: Resources .......................................................................................................................................... 28 2 © 2014 Symantec Introduction Welcome to Symantec’s Cyber Readiness Challenge! Sun Tzu once said, "Know both yourself and your enemy and you can win a hundred battles without jeopardy." The Symantec Cyber Readiness Challenge is an immersive, interactive “capture the flag” competition that models scenarios after the current threat landscape using realistic, virtualized IT infrastructure. Designed for many levels of technical skill and experience it puts participants in the hacker's shoes to understand their targets, technology and thought processes so they can ultimately better protect their organization and themselves. Offered as both online and live onsite events at numerous locations around the world, participants will have the opportunity to test, practice and develop their security skills within a unique and real world inspired environment developed by Symantec, the global leader in security. While participating in this event, you will have the opportunity to: Sharpen skills such as forensics, ethical hacking and more Expand your awareness of targets and threats Learn and try new techniques and tools Compete against your peers for prizes and bragging rights Earn Continuing Professional Education, or CPE, credit Bringing together some of the world's leading experts in IT security, this innovative competition will offer a keynote presentation by renowned security experts on the current security landscape and provides a fantastic environment for networking and knowledge sharing. For more information on future events, rules and technical requirements, please visit the following URL: http://go.symantec.com/cyber-readiness Please read this manual for important information about connecting to and playing in the event. 3 © 2014 Symantec 1 The Cyber Readiness Challenge This section will provide an overview of the Cyber Readiness Challenge experience. 1.1 Your Credentials Every participant has their own username and password for the event. Your username and password are used to connect to the event via a Virtual Private Network (VPN), and to log into the scoring system (the “Scoreboard”) to get your objectives and enter your answers. The username (“handle”) and password you registered or were provided at the event are used to log into the VPN and the scoreboard. Do not lose or disclose your password to anyone. 1.2 Accessing the Competition The online environment for the Cyber Readiness Challenge is run from several datacenters globally. Prior to the start of the event each participant will receive an email providing information about how to access their event. Each participant will need a computer or a virtual machine to access the environment. There are two main ways to participate: Using the participant’s computer with a native operating system or an ethical hacking toolset such as Kali or BackTrack installed or dual-booted, such as using a live CD/DVD, connecting with VPN software provided by the online environment Using the participant’s computer with an ethical hacking toolset running in a virtual machine, with the VM connecting with VPN software provided by the online environment More information about these options, including detailed setup instructions, will be provided in later sections of this document. 1.3 Scoring The objective is for individuals, or their teams for team events, to capture as many flags as possible during the event. All participants should log into the Scoreboard to see the questions and to enter their answers to score points. Each question and answer set is referred to as a flag. The competition is broken into levels, starting with level one (1), with flags for each level. A flag is any piece of information requested in the Scoreboard and is the only thing points will be awarded for. As you make your way through the event additional levels with more flags will open. Scoring is based on the capture of flags for each of the five (5) stages of a cyber attack: Reconnaissance, Incursion, Discovery, Capture and Exfiltration. There will be varying degrees of difficulty for sets of flags: easy (worth 300 points), moderate (worth 500 points), and hard (worth 1000 points). Hints will be available for some of the early levels. Up to three (3) hints may be taken to help with capturing a flag. Taking a hint will reduce the point value of a flag; taking all three hints will reduce it to zero (0) points. If you get stuck on a flag, don’t get discouraged! The hints are there to help make this a fun learning experience. Don’t be afraid to take them – it’s your opportunity to learn something new about security and the risks we face. Scoring a Flag Capture Description: A list of flags will be provided in the Scoreboard. Examples include: 1. Provide the clear text password of a fictional user. 2. Breach a system or application and retrieve a credit card number. 3. Find a specific file and provide the MD5 value. 4 © 2014 Symantec Scoring using the “Scoreboard”: 1. Successfully find the answer to a flag (question) requested on the Scoreboard. 2. If you are not already, log into the Scoreboard using your username (handle) and password. Note that this is only available while connected to the event; it is not an Internet site. 3. Enter the answer for the flag. You will receive immediate feedback if the answer is correct. You will not be penalized for incorrect answers. To View Your Score To view your score, the list of flags, or to submit captured flags, log on to the Scoreboard using your username and password while connected via VPN to the online event. 1.4 Obtaining Support Support during the competition will be available several ways: From Symantec employees staffing the event Through support options available in the Scoreboard once connected to the environment (documented in a later section) By email to [email protected] at any time, including if participants are having problems connecting to the environment to access support in the Scoreboard 1.5 Continuing Professional Education (CPE) Credit You will be eligible for continuing education credits, or CPEs, towards certification requirements from organizations such as (ISC)2 and ISACA, and possibly from others as well. A Verification of Attendance form will be provided onsite or 2-4 weeks after completion of the event. Please refer to your accreditation guidelines for specific guidance including reporting requirements. Changes to the 2013 (ISC)2 “Continuing Professional Education (CPE) Policies & Guidelines” allow for Group A credit for this type of activity under “Performing unique projects and activities on-the-job.” 5 © 2014 Symantec 2 Cyber Readiness Challenge Event Preparation 2.1 Rules Please refer to the Contest Rules on the Cyber Readiness Challenge site at http://go.symantec.com/cyber-readiness/ . The objective of this test is to try to breach the environment without causing disruption or damage. As such testing that may disable services, alter or destroy files or content, interfere with other participants’ ability to play, or be a Denial of Service (DoS) may not be conducted unless otherwise directed during the event. Any individual found intentionally interfering with game play may be disqualified. 2.2 Resources Required Participants will need to have access to certain resources, such as an ethical hacking (or attack) environment, for game play. There are several options to meet these resources. Some participants may have existing resources at their disposal, including a preferred attack environment and tools for their use; you are encouraged to use what you are familiar with. 1. Participants will provide their own computer, such as a laptop, with the following minimum recommended requirements: 1 Ghz Intel x86 compatible processor (2 Ghz with virtualization extensions recommended) 2 GB of RAM 20 GB of free disk space Operating system including Windows 2000 or later, OS X 10.4.11 or later, Linux 2.4.10/2.6.4 or later, and/or Kali Linux (BackTrack is no longer recommended as it has been replaced by Kali) Virtualization, if desired, including VMware Workstation or Player (for Windows or Linux), VMware Fusion (for Mac OS X), or VirtualBox (multiple OS') The latest version of Java on Mac OS X 2. Participants will provide their own ethical hacking toolkit, such as Backtrack or Kali 3. Internet access may be required for events, such as online Challenges; for onsite events, a wired and/or wireless network may be used Network requirements for all participants: Participants will be using a VPN from their system and will need to have access to the Internet to connect (e.g. home network, coffee shop or Internet café, permitted office or corporate network, etc.) Since an encrypted networking such as the Virtual Private Network (VPN) will be used to access the online competition network, Internet service providers will not see or be affected by any attack traffic used during play. Remember to connect to the VPN before starting any scans or event-related activity to prevent accidentally affecting others. For participants using their own computer: Participants are welcome to use their own computer, such as: Dual-booting to an installed or a live CD/DVD/USB image such as Kali Linux A virtual machine installed on their system (for example, using the free VMware Player or free VirtualBox with Kali) If you currently do not have an ethical hacking environment, or a “toolset,” we recommend trying Kali. It is free to download and use. Due to some reported issues with the latest 64-bit version we recommend the 32-bit for now. 6 © 2014 Symantec 2.3 Using a Live CD or a Virtual Machine on Your System Many participants may want to use the Kali Linux to play the game. Kali is pre-configured with a variety of ethical hacking software and is a quick and easy way to get the tools necessary to participate. The latest version can always be found at http://www.kali.org/downloads/. We recommend using the 32-bit version. Unless you install Kali on your computer, which is an option, there are two main ways to run it: 1) Boot from a Kali Linux Live CD or Kali Linux Live USB Drive This is the best option if you are a beginner to the information security world. By booting from a “live” CD, you get to use a fully featured version of Kali Linux without actually installing it or modifying your hard drive in any way. If you’re setting up for the event at the last minute, go with this option, as it will get you playing in the shortest amount of time. However, know that the performance will not be as good as using a virtual machine or installing to a hard drive, especially with a CD or a DVD. It will still be usable. Once you have downloaded the appropriate ISO file from the Kali Linux website burn it to a CD or a DVD with software such as ImgBurn. Alternatively, if you want to make a live USB drive, follow these instructions: http://docs.kali.org/installation/kali-linux-live-usb-install Finally, restart your computer and interrupt your normal system startup. Then, select the CD/DVD/USB drive from the boot options menu. 2) Run Kali Linux in a Virtual Machine A virtual machine is a virtual computer that exists inside your physical computer. By using free software such as VMware Player or VirtualBox, you can run Kali Linux inside a virtual machine that will run inside the operating system that you already have on your computer. This option is useful if you want to have quick access to various Windows tools that don’t exist on Kali. Additionally, with this method you can connect to the game network from inside the virtual machine, leaving the network of your main operating system still able to access the Internet in case you have to do any research. If you go with this option, make sure that you configure the machine’s network adapter to use the “bridged” option, which gives Kali direct access to the network. Using this mode will ensure that you bypass several networking and hacking pitfalls. Once the virtual machine is created, you can either “live” boot from the downloaded ISO file (if you are short on time) or perform a normal Kali Linux install (if you want the best performance). More information on installing Kali Linux can be found here: http://docs.kali.org/installation/kali-linux-hard-disk-install 7 © 2014 Symantec 3 Connecting to the Event 3.1 Requirements Online events are accessed using a Virtual Private Network (VPN). The VPN software will be provided during the connection and setup process, if required. Step by step setup instructions follow for several different environments: Kali BackTrack Microsoft Windows Mac OS X Note that once you are “inside” the game using the VPN provided or by directly connecting in an in-person event you will not be able to access the Internet (for security purposes). However, feel free to disconnect and reconnect from the game to do research as many times as you like, or use another system for “Googling.” Once connected to the provided VPN address: The scoreboard address will be provided; you should log into the scoreboard as soon as you are connected The target address range will be provided; nothing outside this range should be attacked 3.2 Settings VPN Settings Field Setting VPN Address Provided by email or at the start of the event Username Selected by each participant when registering, or provided at the event Password Set by each participant when registering, or provided at the event Target Address Range Provided by email or in the Scoreboard once the event starts (These are the attack targets in the online event) Nothing outside this range should be attacked! Scoreboard Provided by email or at the start of the event Do not attack or attempt to brute force the scoreboard! 3.3 Connecting When you connect to the online environment using the address (URL) provided and your web browser, you will be presented with a login screen. Use your username (handle) and password set or provided for the event. The following sections of this document will provide instructions for setting up the VPN software. Once connected to the online environment: You should log into the Scoreboard as soon as you are connected The target address range will be provided in the Scoreboard; nothing outside this range should be attacked 8 © 2014 Symantec 4 Using the Scoreboard and Team Chat 4.1 Preface This section documents some of the operation and features of the Scoreboard. The Scoreboard is used to obtain the flags, or questions you will answer to score points. It also has a team chat so that you can talk to and work with your team members, and support options to report problems and request support from the Cyber Readiness Challenge team. 4.2 Accessing the Scoreboard You can access the Scoreboard using a browser. Note that it is only available while connected to the event; it is not an Internet site. 4.3 The Scoreboard As you can see in this example the Scoreboard shows several types of information, such as which level you are on, the flags for the level, your score (points), the time remaining in the competition, hints available for each flag, etc. 4.4 Navigating Between Levels On the top-left-hand corner near “LEVEL” you will see the list of levels that you currently have access to. At the beginning, you will only have access to level 1, but as you progress through the game you will unlock more levels. Use the links in this section to navigate back and forth between different levels to review your progress or work on flags you may have skipped. 4.5 Viewing Your Progress You can view information about your progress using the “Progress” link in the top menu. 9 © 2014 Symantec 4.6 Support There is a trouble ticket system built into the Scoreboard. If you have problems at any point during the game, click on the "Support" link on the top menu. From there, you can submit a trouble ticket that will be seen by the Cyber Readiness Challenge team. When your ticket has been replied to, Scoreboard will automatically notify you via the top menu, like this: If you are having a problem with an individual flag you can report it using the “Report a Problem” button found on each flag. This will open a ticket noting the flag you are having problems with. Additionally, administrators can also put out “global” tickets. If you have never submitted any tickets but you still see that you have a support notification, this is probably the reason. Global tickets are used to convey information quickly to all of the players at once. For example, a global ticket would be issued if a particular flag is malfunctioning. 4.7 Team Chat From the “Team Chat” link on the top menu you can access a separate web page that will allow you to chat with your team members. This provides a way for the team to exchange ideas and collaborate on flags. 10 © 2014 Symantec 5 VPN Configuration for Kali Please note that these instructions should also apply to other versions of Linux. BackTrack is covered separately in this document. If you are using a virtual computer requested during registration you will NOT need to perform these steps. The VPN software is already installed for you. 5.1 Launch Kali Step 1 – Start Kali, either native or a virtual machine (VM). If you are using a VM, bridged mode is recommended. a. Log in with your credentials (the default username is root, and password is the one that was set at the time of installation). b. Make sure you have a valid IP address and can access the Internet (see your network admin for help). 5.2 Client Install Step 3 – Install AnyConnect Client. a. Kali’s default Internet browser is called Iceweasel. Start Iceweasel by clicking on the following icon on the menu bar. b. Navigate to the VPN address URL that was given to you in email. c. Log in with your user name and password. d. You will be prompted to install missing plugins since Java is not automatically configured for use within Iceweasel. Do NOT install the missing plugin. Wait until the Sun Java applet install times out and then click on the Linux i386 link to download the VPN software installer. e. Download the vpnsetup.sh file to the /root folder of the file system. f. Execute the ls command in a terminal window and you should see the vpnsetup.sh file. 11 © 2014 Symantec g. Change the permissions on the file by performing: chmod +x vpnsetup.sh h. Execute the ls command again to ensure that the file is now executable. If the file is green, then it can be executed. i. Execute the vpnsetup.sh script by typing: ./vpnsetup.sh j. Start the VPN client GUI by clicking on the menu icon in the lower left corner, navigating “Applications” to “Internet,” and selecting the “Cisco AnyConnect Secure Mobility Client”. 12 © 2014 Symantec Note: if you are on a live (not installed) version of Kali the AnyConnect option will not automatically be added to the menu during installation. If this is the case you can start the client in a terminal window using the nohup /opt/cisco/anyconnect/bin/vnpui & command. k. Enter the VPN URL address used previously (provided to you in email). l. When prompted, enter your username and password from registration. m. The VPN should now start; to test, open Iceweasel and log into the scoreboard. You are now connected – begin working through the flags in the scoreboard and attacking the permitted target address range once directed to do so once the event begins! 13 © 2014 Symantec 6 VPN Configuration for BackTrack 5R3 with Gnome Please note that these instructions should also apply to most versions of Linux. 6.1 Launch BackTrack Step 1 – Start BackTrack, either native or a virtual machine (VM). If you are using a VM, bridged mode is recommended. a. Log in with your credentials (the default username is root and password is toor). b. Make sure you have a valid IP address and can access the Internet (see your network admin for help). c. Start the Gnome desktop by typing startx and press the Enter. 6.2 Client Installation a. Start Firefox by clicking on the top left hand corner. Select Internet -> Firefox Web Browser. b. Navigate to the VPN address URL that was given to you in email. c. Click on the NoScript icon next to the location bar and Allow cyberreadinesschallenge.com. 14 © 2014 Symantec d. Log in with your user name and password. e. Wait until the Sun Java applet install times out and then click on the Linux i386 link. f. Transfer the vpnsetup.sh file to the /root folder of the Linux OS. g. Start the Terminal application and change directory to /root (cd /root). 15 © 2014 Symantec h. Execute the ls command and you should see the vpnsetup.sh file. i. Change the permissions on the file by performing chmod +x vpnsetup.sh j. Execute the ls command again to ensure that the file is now executable. If the file is green, then it can be executed. k. Execute the vpnsetup.sh script by executing ./vpnsetup.sh 16 © 2014 Symantec l. If the script asks you to accept the terms in the license agreement, press Y and Enter. m. Start the VPN client GUI by clicking on the menu icon in the lower left corner, navigating to “Internet,” and selecting the Cisco VPN GUI. n. Enter the VPN URL address used previously (provided to you in email). o. When prompted, enter your username and password from registration. p. The VPN should now start; to test, open Firefox and log into the scoreboard. q. You are now connected – begin working through the flags in the scoreboard and attacking the permitted target address range once the event begins! 17 © 2014 Symantec 7 VPN Configuration for Windows 7.1 Client Installation Step 1 – Start Windows, either native or a virtual machine (VM); if you are using a VM, bridged mode is recommended. a. Log in with your credentials. b. Make sure you have a valid IP address and can access the Internet (see your network admin for help). Step 2 – Open Internet Explorer a. Launch Internet Explorer. b. Click on Tools and then Internet Options. c. Click on the Security tab. 18 © 2014 Symantec d. Click on Trusted sites. Next click on Sites. e. In the Add this website to the zone field enter the VPN IP Address or domain that you were given during registration and click the Add button. f. Navigate Internet Explorer to the VPN URL Address that you were given during registration. 19 © 2014 Symantec g. Login to the Cisco SSL VPN Service Portal with your user name and password. 20 © 2014 Symantec h. Click on the yellow banner to allow the AnyConnect add-on to be installed. i. When the User Account Control pops up, click the Yes button. j. The web page might show an error that VPN connection establishment failed. However, if you click on the Cisco AnyConnect Icon in the notifications area you will see that in fact the VPN is connected. 21 © 2014 Symantec m. Open your browser and log into the scoreboard. You are now connected – begin working through the flags in the scoreboard and attacking the permitted target address range once the event begins! 22 © 2014 Symantec 8 VPN Configuration for Mac OS X 8.1 Client Installation Step 1 – The following instructions are for Mac OS X, tested on the Intel 64 bit platform. OS X within a virtual machine environment is not supported. Pre-requisite: Make sure the latest version of Java is installed. Use java.com to download and install if needed. a. Log in with your credentials. b. Make sure you have a valid IP address and can access the Internet (see your network admin for help). Step 2 – a. Navigate Safari to the IP Address or host that you were given during registration. b. Login to the Cisco SSL VPN Service Portal with your user name and password. 23 © 2014 Symantec c. If the following screen appears, you may not have Java installed. Obtain Java from java.com, install it, and retry the previous step of logging into the SSL VPN Service Portal. d. Click on “Yes” if the following security warning screen pops up. 24 © 2014 Symantec e. Click on Run when the following screen pops up: f. At this point, the Client Downloader should appear: g. If prompted for system credentials, enter them and click OK: 25 © 2014 Symantec h. If the installation was successful, the VPN connection should establish: i. Once connected, the following icon should appear as a Menu Bar Extra: j. The VPN should now start; to test, open Firefox and log into the scoreboard. k. You are now connected – begin working through the flags in the scoreboard and attacking the permitted target address range! l. To quit or disconnect the VPN, click on the menu bar extra icon and select “Disconnect” or “Quit Cisco AnyConnect”. m. After installation, the VPN client can be accessed in the future by opening Cisco AnyConnect Secure Mobility Client from the Applications folder: You are now connected – begin working through the flags in the scoreboard and attacking the permitted target address range once the event begins! 26 © 2014 Symantec Appendices Appendix A: Resources ............................................................................................................ 28 27 © 2014 Symantec Appendix A: Resources The following resources may be useful: Kali Linux Kali Linux is the “next generation” of BackTrack, is a penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Based on open-source tools it has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester. The i386 version is currently recommended for VPN compatibility, and VMware and ISO images are available. Kali Linux: http://www.kali.org/ Metasploit A collaboration of the open source community and Rapid7, Metasploit® software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits and is available at: http://metasploit.com/download/ Rapid7 has some Metasploit tutorial videos that provide a quick introduction to network scanning and basic exploitation. They will help in getting started with Metasploit Community and in understanding basic methodology. https://community.rapid7.com/community/solutions/metasploit/blog/2011/12/21/metasploit-tutorial-an-introductionto-metasploit-community The Armitage graphical user interface (GUI) makes working with Metasploit easier, and is built into BackTrack. A good introduction and how-to is available at: http://dl.packetstormsecurity.net/papers/general/Armitage-hacking_made_easy_Part-1.pdf Setting up a Penetration Testing Lab Rapid7 and Metasploit have a good how-to for setting up a penetration testing lab to learn or attempt exploits. It’s available at: https://community.rapid7.com/docs/DOC-2196 28 © 2014 Symantec
© Copyright 2024