Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

1/13/2021
01:00 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Virtual Pen-Testing Competition Tasks College Students With Running a Red Team Operation

Aimed at developing offensive cyber talent, last weekend's sixth annual Collegiate Penetration Testing Competition brought out some of the brightest from RIT and Stanford, among other universities.

The security industry has sponsored capture-the-flag (CTF) competitions for decades, with the Collegiate Cyber Defense Competition (CCDC) among the most well-known.

But the annual Collegiate Penetration Testing Competition (CPTC) has emerged as the only competition that focuses strictly on testing offensive security skills – something security pros say the industry sorely needs.

CPTC started in 2015. Past winners include the University of Buffalo, University of Central Florida, and Stanford University (three times). This year – Sunday to be exact – Rochester Institute of Technology, which hosts the event, was awarded first place. 

The competition has become one of the company's important recruiting tools, says Cris Thomas, the X-Force red global strategy lead at IBM (a CPTC premium sponsor).

"It's very difficult to find people with offensive security talent," says Thomas, also known in security circles as "Space Rogue." "We've hired a number of people from the competition, and it's amazing [that] some of these students already have their OSCP certifications. There's a lot of passion, and many of these students want to learn everything."

While the vast majority of CPTC students are computer science majors, some are engineering and also business majors, adds Justin Pelletier, global director of CPTC. He stresses that "soft skills" are as important as technical chops.

"We don't want people who go in and slash and burn and try to find the most vulnerabilities," Pelletier says. "Of equal importance is the ability to write a report and present your findings to a board. We want to give students the experience of what it's like to be on a real red team – that ultimately they'll have to explain what they found to top management and explain what it means to the business."

This year's two-day competition was virtual. Some 15 schools, whittled down from 64 schools in eight regions, competed in the finals. As in years past, each teams consisted of up to six students who were required to submit a written report of their findings and make a presentation to a board. The task: to run a red team operation on a water and power company.

More specifically, students tested the energy grid infrastructure of a small city, including a hydroelectric dam, a nuclear power plant, and a wind farm system that was connected to a regional power utility company. Each team was exposed to programmable logic controllers (PLCs) – industrial computers that control many of the important components of the nation's critical infrastructure. The virtual power company ran in a hybrid environment, a combination of the AWS cloud and RIT's Global Cybersecurity Institute's Cyber Range and Training Center.

"Through this exposure, students learned about some of the challenges associated with securing these low-bandwidth – often legacy – devices that are being overlooked in our current energy grid," Pelletier says. "They also got exposed to a field that they may not have considered. Much of the innovation in computing revolves are desktop and mobile apps, but we need smart people who can take on the security challenges of these ICS devices. Many of them can't use encryption because they are legacy systems. The industry needs people who can think of creative ways to solve these challenges."

Alex Keller, senior systems security engineer at the Stanford School of Engineering and the Stanford cyberteam's coach since early 2016, says the competition teaches students practical takeaways about how to build a successful red team.

"In putting together the teams for the competition, I look for people who understand Windows, an Active Director specialist, someone who knows Linux, then someone who know how networks work and finally somebody who understands, policy, regulatory, and risk," Keller says. "Just finding the vulnerabilities is not enough. In the real world, managers want to know what's the risk to the business, how difficult will it be to address, what will it cost the organization, and how will your team help us prioritize what needs to be done."

Highly Motivated Students
Students on these winning teams are some of the most motivated young people around.

For example, Sunggwan Choi, a computing security student at RIT and a member of this year's winning team, already has his OSCP and was an IBM X-Force red team intern. He says CPTC covers the entire process of how a penetration test engagement goes. This starts from pre-engagement to actual hands-on penetration testing (internal network pen test, application security, and, this year, operational technology), report writing, presenting, and communicating to clients.

Students are getting much better at gaining hands-on experience on offensive security through CTFs and platforms such as TryHackMe or Hack the Box, says Choi, who is originally from South Korea. However, CTPC offers as close to a real-world experience in a virtual environment.  

"I have learned what it's like to work with a client using my technical skill –  knowing what my client needs, using my technical skills to provide that business need, and finally learning the soft skills to represent my technical work to both technical, and non-technical folks," Choi says. "Moreover, CPTC is a great competition to learn teamwork and cooperation. All of the members actively need to communicate with one another to solve technical and non-technical problems."

Kyla Guru, a freshmen on the Stanford team on the computer science track, already has several years of cybersecurity awareness education under her belt. Guru is founder and CEO of Bits N' Bytes Cybersecurity Education, in the greater Chicago area, where she has trained students, parents, and senior citizens on cybersecurity basics. She also is a co-founder and board member of GirlCon, a tech conference for high school women.

"I've done research on the gender gap in cyber and how there are so many unfilled jobs. One of the best parts of CPTC was that we had the opportunity to learn and work with cyber pros who want us to understand some of the challenges the industry faces and want us to be at the forefront of these issues," Guru says. "I've spoken at RSA, so I really enjoyed the presentation part. It's so critical to go to management and be able to explain to them what the risks to the business are and the cost to mitigate."

Steve Zurier has more than 30 years of journalism and publishing experience and has covered networking, security, and IT as a writer and editor since 1992. Steve is based in Columbia, Md. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-22152
PUBLISHED: 2021-05-13
A Denial of Service due to Improper Input Validation vulnerability in the Management Console component of BlackBerry UEM version(s) 12.13.1 QF2 and earlier and 12.12.1a QF6 and earlier could allow an attacker to potentially to prevent any new user connections.
CVE-2021-22153
PUBLISHED: 2021-05-13
A Remote Code Execution vulnerability in the Management Console component of BlackBerry UEM version(s) 12.13.1 QF2 and earlier and 12.12.1a QF6 and earlier could allow an attacker to potentially cause the spreadsheet application to run commands on the victim’s local machine with t...
CVE-2021-22154
PUBLISHED: 2021-05-13
An Information Disclosure vulnerability in the Management Console component of BlackBerry UEM version(s) 12.13.1 QF2 and earlier and 12.12.1a QF6 and earlier could allow an attacker to potentially gain access to a victim's web history.
CVE-2021-20331
PUBLISHED: 2021-05-13
Specific versions of the MongoDB C# Driver may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when commands such as "saslStart", "saslContinue", "i...
CVE-2021-31215
PUBLISHED: 2021-05-13
SchedMD Slurm before 20.02.7 and 20.03.x through 20.11.x before 20.11.7 allows remote code execution as SlurmUser because use of a PrologSlurmctld or EpilogSlurmctld script leads to environment mishandling.