Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

1/13/2021
01:00 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Virtual Pen-Testing Competition Tasks College Students With Running a Red Team Operation

Aimed at developing offensive cyber talent, last weekend's sixth annual Collegiate Penetration Testing Competition brought out some of the brightest from RIT and Stanford, among other universities.

The security industry has sponsored capture-the-flag (CTF) competitions for decades, with the Collegiate Cyber Defense Competition (CCDC) among the most well-known.

But the annual Collegiate Penetration Testing Competition (CPTC) has emerged as the only competition that focuses strictly on testing offensive security skills – something security pros say the industry sorely needs.

CPTC started in 2015. Past winners include the University of Buffalo, University of Central Florida, and Stanford University (three times). This year – Sunday to be exact – Rochester Institute of Technology, which hosts the event, was awarded first place. 

The competition has become one of the company's important recruiting tools, says Cris Thomas, the X-Force red global strategy lead at IBM (a CPTC premium sponsor).

"It's very difficult to find people with offensive security talent," says Thomas, also known in security circles as "Space Rogue." "We've hired a number of people from the competition, and it's amazing [that] some of these students already have their OSCP certifications. There's a lot of passion, and many of these students want to learn everything."

While the vast majority of CPTC students are computer science majors, some are engineering and also business majors, adds Justin Pelletier, global director of CPTC. He stresses that "soft skills" are as important as technical chops.

"We don't want people who go in and slash and burn and try to find the most vulnerabilities," Pelletier says. "Of equal importance is the ability to write a report and present your findings to a board. We want to give students the experience of what it's like to be on a real red team – that ultimately they'll have to explain what they found to top management and explain what it means to the business."

This year's two-day competition was virtual. Some 15 schools, whittled down from 64 schools in eight regions, competed in the finals. As in years past, each teams consisted of up to six students who were required to submit a written report of their findings and make a presentation to a board. The task: to run a red team operation on a water and power company.

More specifically, students tested the energy grid infrastructure of a small city, including a hydroelectric dam, a nuclear power plant, and a wind farm system that was connected to a regional power utility company. Each team was exposed to programmable logic controllers (PLCs) – industrial computers that control many of the important components of the nation's critical infrastructure. The virtual power company ran in a hybrid environment, a combination of the AWS cloud and RIT's Global Cybersecurity Institute's Cyber Range and Training Center.

"Through this exposure, students learned about some of the challenges associated with securing these low-bandwidth – often legacy – devices that are being overlooked in our current energy grid," Pelletier says. "They also got exposed to a field that they may not have considered. Much of the innovation in computing revolves are desktop and mobile apps, but we need smart people who can take on the security challenges of these ICS devices. Many of them can't use encryption because they are legacy systems. The industry needs people who can think of creative ways to solve these challenges."

Alex Keller, senior systems security engineer at the Stanford School of Engineering and the Stanford cyberteam's coach since early 2016, says the competition teaches students practical takeaways about how to build a successful red team.

"In putting together the teams for the competition, I look for people who understand Windows, an Active Director specialist, someone who knows Linux, then someone who know how networks work and finally somebody who understands, policy, regulatory, and risk," Keller says. "Just finding the vulnerabilities is not enough. In the real world, managers want to know what's the risk to the business, how difficult will it be to address, what will it cost the organization, and how will your team help us prioritize what needs to be done."

Highly Motivated Students
Students on these winning teams are some of the most motivated young people around.

For example, Sunggwan Choi, a computing security student at RIT and a member of this year's winning team, already has his OSCP and was an IBM X-Force red team intern. He says CPTC covers the entire process of how a penetration test engagement goes. This starts from pre-engagement to actual hands-on penetration testing (internal network pen test, application security, and, this year, operational technology), report writing, presenting, and communicating to clients.

Students are getting much better at gaining hands-on experience on offensive security through CTFs and platforms such as TryHackMe or Hack the Box, says Choi, who is originally from South Korea. However, CTPC offers as close to a real-world experience in a virtual environment.  

"I have learned what it's like to work with a client using my technical skill –  knowing what my client needs, using my technical skills to provide that business need, and finally learning the soft skills to represent my technical work to both technical, and non-technical folks," Choi says. "Moreover, CPTC is a great competition to learn teamwork and cooperation. All of the members actively need to communicate with one another to solve technical and non-technical problems."

Kyla Guru, a freshmen on the Stanford team on the computer science track, already has several years of cybersecurity awareness education under her belt. Guru is founder and CEO of Bits N' Bytes Cybersecurity Education, in the greater Chicago area, where she has trained students, parents, and senior citizens on cybersecurity basics. She also is a co-founder and board member of GirlCon, a tech conference for high school women.

"I've done research on the gender gap in cyber and how there are so many unfilled jobs. One of the best parts of CPTC was that we had the opportunity to learn and work with cyber pros who want us to understand some of the challenges the industry faces and want us to be at the forefront of these issues," Guru says. "I've spoken at RSA, so I really enjoyed the presentation part. It's so critical to go to management and be able to explain to them what the risks to the business are and the cost to mitigate."

Steve Zurier has more than 30 years of journalism and publishing experience and has covered networking, security, and IT as a writer and editor since 1992. Steve is based in Columbia, Md. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Edge-DRsplash-10-edge-articles
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
News
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27132
PUBLISHED: 2021-02-27
SerComm AG Combo VD625 AGSOT_2.1.0 devices allow CRLF injection (for HTTP header injection) in the download function via the Content-Disposition header.
CVE-2021-25284
PUBLISHED: 2021-02-27
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
CVE-2021-3144
PUBLISHED: 2021-02-27
In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
CVE-2021-3148
PUBLISHED: 2021-02-27
An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.
CVE-2021-3151
PUBLISHED: 2021-02-27
i-doit before 1.16.0 is affected by Stored Cross-Site Scripting (XSS) issues that could allow remote authenticated attackers to inject arbitrary web script or HTML via C__MONITORING__CONFIG__TITLE, SM2__C__MONITORING__CONFIG__TITLE, C__MONITORING__CONFIG__PATH, SM2__C__MONITORING__CONFIG__PATH, C__M...