Monday, December 28, 2009

Netwars Round 5 Results

There was some confusion on the CNN story: There were three things happening for NetWars in December:

1) Workshop hosted by SANS
2) Allstar challenge
3) Round 5

The CNN article dealt with #2, the Allstar Challenge. Winners for the Allstar Challenge:

1) chrisbdaemon
2) Level
3) SevenM7

The allstar points carried over into Round 5 which ended December 23, 2009. Here are the ROUND 5 TOP 20:


Player Round5 BONUS Round5TOTAL
alertlogic 6103 125 6228
chrisbdaemon 4279 4279
sleepya 3246 3246
Level 2065 2065
SevenM7 1271 19 1290
user0555 397 397
ace1 126 125 251
h4n5ju57 150 150
xeno280 96 96
oorang3 89 89
user0230 41 41
PuN1sh3r 28 28
user0910 17 17
dontarpme 16 16
n00ne 15 15
user0341 8 8
infonaut 5 5
dr29 5 5
bpfinn 5 5
user1260 3 3



We have some nice things in store for Round 6 in January, 2010. If you would take advantage of a Netwars workshop in your area, please email workshop@netwars.info with WORKSHOP and your preferred zip code in the subject and we'll see what we can do in 2010.

Labels: ,

Tuesday, December 08, 2009

NetWars Allstars and Round 5

We are finalizing details on the upcoming Allstar event, sponsored by SANS at the CDI 2009 Conference. We have a few surprises up our sleeves to enhance entry-level player experience. Round 5 will prove to be very interesting as we'll be starting the allstar players on a different level during the regular competition.

We will continue to update the http://tinyurl.com/netwarscal calendar with any scheduling changes. We will also be adding more promotional material such as http://tinyurl.com/netwarspromo.

Labels:

Friday, September 18, 2009

NetWars Round 3 Oct 10-Oct 18 2009

Busy rebuilding the targets for the next round of NetWars, October 10-18, 2009. You can sign up at http://sans.org/netwars/.

Adding a ton of rich content--websites, streaming audio, etc. The NetWars network will be taken down (has been up for practice) while we rebuild everything. Also, if you have some licenses or hardware you'd like to let the project use, please send an email to netwars@sans.org with "SPONSOR" in the subject. There are a ton of things brewing; I hope it comes together soon.

I'm a little bummed I'm building it instead of playing the game . . .

Labels:

Tuesday, July 28, 2009

SANS NetWars Status

After a meeting in Washington DC about the US Cyber Challenge, there has been a lot of interest in the SANS NetWars project. Since there is little information on NetWars published, I wanted to summarize what I said during the panel discussion on Monday, July 28th, 2009:

We wanted a challenging environment for Netwars. We wanted to
identify information security talent and encourage positive use of that talent. Netwars is designed to run for a week per round.


Most of the environment is hosted at the SANS Institute, but each player downloads a bootable Linux CD Operating System. It contains a few small challenge stages and a tutorial that walks the player through identification and exploitation, ultimately finding the key to the rest of the game. Once in this hosted environment, players compete with other players for access to services and systems, planting flags and defending them to score points. Bonus challenges are also injected during the game and serve as hints and opportunities to get players “unstuck.” Netwars is different than other Red/Blue team or Capture the Flag games because of the combined offensive and defensive requirements but no prep. time required--it's more of a King of the Hill game.

Netwars Round 1 was held in late June, we had about 80 participants that included teenagers, all levels of formal education, and a few information security professionals. We had a handful of participants to extraordinarily well on the defensive side, so we adjusted the game to give the others a fighting chance. Initially, all players entered the game environment in random locations to give each player a realistic chance to accomplish a task before his processes or connections where destroyed by another player. This was not quite good enough, but now once a player's score hits a 500 points threshhold, they get a different set of random entry points. We had a totalof 13 people that made it onto the scoreboard in Round 1.

It was exciting to be there to watch the ingenuity of the players. One of the highlights from the first round was in the form of a bonus challenge. One player managed to break into the superuser account in exactly 20 keystrokes and one mouse-click, beating out all other players that did the same in 34 to 68keystrokes. The winning player from Round 1 managed to manipulate the scoring system to increase his scoring rate (since the scorebot existed in the scope of attack network, he kept the legal points). All players used the same connection pool, so an enterprising player created a fake password prompt that led other players to believe their account password was no longer valid.

Netwars Round 1.5 was held last weekend for three days, with 100 players. We changed this version of the game by providing a less foreign initial image and a safer entry point. Each player received their own personal image with just their key to play the rest the game. We only had six players score due to the short round. My favorite point in this round was where the second place player completely
firewalled off a Windows XP target from the game because he had to accomplish some real-life tasks. This firewall, only allowing the scorebot and his personal backdoor in. It took about 5 hours for the first and third place winners to join forces and broke into this player's backdoor and liberate the target so they could continue scoring on it.



We will announce the next full round on August 10th. You can register now at www.sans.org/netwars. The environment has been a great challenge to play and to operate, and we are adding new targets and internal networking to add more depth to the game.

I have a pile of things to do before heading out to DEFCON . . . I have a pile of things to post as well that have been put on hold while buiding the NetWars system, so check back in a couple weeks.

Labels: