Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

Guest Blog // Selected Security Content Provided By Sophos
What's This?
5/17/2013
04:53 PM
Dark Reading
Dark Reading
Security Insights
50%
50%

Security War Games

Information security keeps evolving, but our educational methods are not evolving rapidly enough to win the cold cyberwar

Let's face it: Protecting your technical environment from internal and external attacks isn't much different than the age-old wars fought since mankind picked up a rock. The goal is to keep people in and/or keep people out. Just much less blood.

How are you preparing your Blue Team from getting decimated on the virtual battlefield? With training and drills? Has that approach been effective?

When it comes to information security, I've always found the "traditional" classroom-based training difficult to retain and recall at a moment's notice unless it was a hands-on exercise. Adding in a spice of entertainment piques interest and retention for the next round of content.

Update: A reader caught my bad math. Windows NT 4 RTM was released July 1996. It was closer to 16 years ago. I recall 19 years ago sitting through a Microsoft Windows NT 4 week of training that was content-rich but lacking flavor. Nonetheless, the most memorable portions were when we attacked each other systems. What we did was remotely made some environment changes and then executed WinNuke to BSOD the box using of the Out-Of-Band TCP port 139 exploit. The challenge was to quickly find and undo the antagonistic setting changes in order to keep up with the instructor's lesson.

Oh, I forgot to mention that we did this without the instructor's knowledge.

I barely recall other lessons the instructor presented, but I will never forget how we educated each other through unsanctioned war games.

Our brains haven't evolved enough during the past 16 years to change how it stores data, but our wisdom has.

The security communities have transformed the military-based training exercises of Capture The Flag (CTF) into the world of technology. CTF isn't new, but it's gaining momentum as a complement to the traditional classroom-based training we've grown to love.

Applying knowledge gained from classroom, books, or online sources to a series of hands-on challenges that are forcing one to think differently reinforces that knowledge. Challenges that are fun, engaging, and competitive are when education happens and the content moves into long-term memory. Learning happens.

The reward system for the participant is immediate gratification by finding the flag, earning points, watching the ranking elevate, and hoping to take home a prize while getting better. The benefit for an organization is a lower cost for education with a higher retention rate! Who wouldn't want that?

During your next incident, would you rather spend a direct cost to an external company or have better educated staff who can think outside of the box any time of day?

Not all CTFs are created equally. Some CTFs may be specific to individuals attempting a social engineering attack, while others are team-based attacks and defend challenges or emulate the TV show Jeopardy. CTFs will challenge one's skills in the areas of Web application security, forensics, reverse engineering, network sniffing, cryptanalysis, system administration, programming, and several other disciplines.

Some readers of this article may feel that CTFs are dark activities done late at night for the extremists and not the IS professional. Completely not true. People from all walks of life with a passion to beat the challenges, alone or as a team, will participate.

The annual DEF CON CTF draws competitors from all over the world and is difficult to get past the qualifiers. Someone curious about participating in a CTF for the first time can attend a conference such as BSides. BSidesChicago and BSidesDetroit are currently hosting the first-ever cross-conference and cross-city CTF spanning a couple of months. BSidesDenver will be hosting a Jeopardy-style CTF starting on May 24.

Having difficulty getting out of the office (even on weekends) and want to pop an operating system during a CTF? You may want to consider joining the team-based attack and defend online war game called CTF365. Simply create an account, join/create a team, and build your fortress. Keep your fortress safe while attempting to penetrate a fortress in another country.

Perhaps CTF365 is the international training ground for cyberwarfare?

Still not convinced that a CTF will test your metal, some security organizations offer fun challenges in the way of puzzles, such as Naked Security's sophospuzzle.

I would like to end with these thoughts: Security is everyone's responsibility, from the person sweeping the floor all the way up to signing the checks. When the cyberwar comes, if we ever find out what cyberwar means (as recently outlined by Corman and Jericho at THOTCON), your staff will be the soldiers on the front line.

Get your soldiers ready.

No security, no privacy. Know security, know privacy.

David Schwartzberg is a Senior Security Engineer at Sophos, where he specializes in latest trends in malware, web threats, endpoint and data protection, mobile security, cloud and network security. He is a regular speaker at security conferences and serves as a guest blogger for the award winning Naked Security blog. David talks regularly with technology executives and professionals to help protect their organizations against the latest security threats. Follow him on Twitter @DSchwartzberg

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
WannaCry Has IoT in Its Crosshairs
Ed Koehler, Distinguished Principal Security Engineer, Office of CTO, at Extreme Network,  9/25/2020
Safeguarding Schools Against RDP-Based Ransomware
James Lui, Ericom Group CTO, Americas,  9/28/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-26120
PUBLISHED: 2020-09-27
XSS exists in the MobileFrontend extension for MediaWiki before 1.34.4 because section.line is mishandled during regex section line replacement from PageGateway. Using crafted HTML, an attacker can elicit an XSS attack via jQuery's parseHTML method, which can cause image callbacks to fire even witho...
CVE-2020-26121
PUBLISHED: 2020-09-27
An issue was discovered in the FileImporter extension for MediaWiki before 1.34.4. An attacker can import a file even when the target page is protected against "page creation" and the attacker should not be able to create it. This occurs because of a mishandled distinction between an uploa...
CVE-2020-25812
PUBLISHED: 2020-09-27
An issue was discovered in MediaWiki 1.34.x before 1.34.4. On Special:Contributions, the NS filter uses unescaped messages as keys in the option key for an HTMLForm specifier. This is vulnerable to a mild XSS if one of those messages is changed to include raw HTML.
CVE-2020-25813
PUBLISHED: 2020-09-27
In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, Special:UserRights exposes the existence of hidden users.
CVE-2020-25814
PUBLISHED: 2020-09-27
In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, XSS related to jQuery can occur. The attacker creates a message with [javascript:payload xss] and turns it into a jQuery object with mw.message().parse(). The expected result is that the jQuery object does not contain an <a> ...