• Breaking News

    Friday, May 3, 2019

    CCDC Red Team Live Q&A - 5/3 @ 12PM CST! Security News & Discussion

    CCDC Red Team Live Q&A - 5/3 @ 12PM CST! Security News & Discussion


    CCDC Red Team Live Q&A - 5/3 @ 12PM CST!

    Posted: 02 May 2019 03:03 PM PDT

    LIVESTREAM: https://youtu.be/IlutvmaWv6A

    Note: Submit your questions via Sli.do Q&A!!!

    Hey /r/netsec! Dave and I are excited to announce a new Q&A with the Red Team! Thanks to /r/netsec mods for supporting this event!

    Dave and myself are hosting the event and he's written a little description below about what to expect!

    Dave's Introduction (/u/NCCDC_DCowen)

    Hello Reddit! My name is David Cowen and since 2007 I've been the captain of the National Collegiate Cyber Defense Competition Red Team (also known as NCCDC). CCDC is a network security defense contest where student teams are pitted against real world information security professionals. Student teams or blue teams defend their networks while the security professionals or red team attempts to break in. CCDC is a competition open to any college (2 or 4 year) who gets together a team of up to 12 full time students, of which two can be graduate students. Eight of those team members can compete in a CCDC event, and the events usually last 10-25 hours of gameplay over two days.

    Teams first qualify locally and then can move on to regionals. There are 10 regionals around the US and the winning team from each is flown to the National Championship (NCCDC) to face my team.

    My team consists of professional penetration testers, reverse engineers, social engineers, security software developers and other security professionals who get to ignore the normal rules of the world for a weekend and try their dirtiest tricks against the best college teams in the nation. How dirty? In the real world we can't just go around leaving custom malware and wiping systems but in NCCDC we can! It's the ability to play a real bad guy that brings in very motivated attackers to be on my team. CCDC, and specifically NCCDC, is different from other computer security contests as the red team is the only attacker. The student teams (blue teams) are there to defend their network while achieving business objectives given to them by organizers posing as their CEO.

    The scenario differs but usually follows this basic scenario, you and your team have just taken over an already active IT infrastructure. The prior IT team was fired and you have to quickly jump in and get things in shape. At the exact time as the teams start entering their rooms and securing their systems, the red team is given the IP addresses of the teams and nothing else. We both walk in blind, the blue team gets a packet about their network including passwords while the red team gets a list of IP address ranges and from that point on it's a race to see who will win. Our objective is to emulate sophisticated threats that, just like the real world, don't play by the rules. We apply this mindset to all teams and act as the adversarial force. The team that can demonstrate the best proficiency in responding, remediating, and eradicating our intrusions wins.

    This year, myself and Alex Levinson, one of my core Red Team members, are going to do a Livestream AMA on the Forensic Lunch podcast! In order to help anyone that can't listen in live, we've put up a sli.do where you can submit, and vote on questions ahead of time. The podcast will also be recorded and published for anyone unable to attend.

    We're looking forward to having an amazing discussion with anyone interested on Friday!

    David Cowen

    National CCDC Red Team Captain

    Who

    David Cowen, Red Team Captain

    David Cowen, CISSP, is a partner at G-C Partners, LLC based in Dallas, Texas. Mr. Cowen is one of the authors of Hacking Exposed: Computer Forensics first and second editions, the third edition of the Anti-Hacker Toolkit and Computer Forensics: A Beginner's Guide, all from McGraw Hill. Mr. Cowen is also the author of the popular Hacking Exposed Computer Forensics Blog and a graduate of the University of Texas at Dallas with a B.S. in Computer Science. Mr. Cowen has been the captain of the National Collegiate Cyber Defense Competition Red Team for 14 years.

    Twitter: @HECFBlog

    LinkedIn: https://www.linkedin.com/in/dcowen/

    Reddit: /u/NCCDC_DCowen

    Alex Levinson, Core Red Team Member

    Alex Levinson is a Senior Security Engineer at Uber, based in San Francisco, CA. Alex is the author of GSCRIPT, a popular framework for creating adaptive, multi-payload, stagers and droppers. Prior to Uber, Alex was a Senior Consultant and oversaw red team tool development for Lares Consulting. As a kid, Alex got into security by being one of the administrators and maintainers of AutoRune, a well known botting software for Runescape Classic. Alex competed in the Collegiate Cyber Defense Competition as a student at [Rochester Institute of Technology](rit.edu), and has been a member of the Nationals Red Team since 2012.

    Twitter: @alexlevinson, @CCDCRedTeam

    Github: github.com/gen0cide

    Reddit: /u/gen0cide_

    LinkedIn: https://www.linkedin.com/in/alexlevinson/

    Evan Anderson, Core Red Team Member

    Evan Anderson is the Director of Offensive Security at Randori.com and focused on building an attack platform CISOs rely on to stay ahead of the next attack. Evan has a strong background in exploit development, reverse engineering and vulnerability assessment. Evan has been a core NCCDC red team member for 14 years.

    Twitter: @syndrowm

    LinkedIn: https://www.linkedin.com/in/evan-anderson-4256611/

    When

    Livestream starts at Friday, May 3rd, 2019 at 12:00PM CST.

    In the meantime, Sli.do is open for the audience to upvote questions ahead of time here. (#CCDCRedTeam2019)

    Where

    Livestream

    Links

    HECFBlog Twitter

    CCDCRedTeam Twitter

    Livestream

    Sli.do

    Reddit Announcement

    Google Doc

    submitted by /u/gen0cide_
    [link] [comments]

    Throwing 500 vm's at your fuzzing target being an individual security researcher

    Posted: 03 May 2019 08:09 AM PDT

    How to Reverse Malware on macOS Without Getting Infected | Part 1

    Posted: 02 May 2019 10:46 PM PDT

    Comprehensive walk-through of CTF reverse engineering challenges

    Posted: 03 May 2019 09:03 AM PDT

    ESI Injection Part 2: Abusing specific implementations

    Posted: 03 May 2019 02:16 AM PDT

    Story of a Hundred Vulnerable Jenkins Plugins

    Posted: 02 May 2019 09:44 PM PDT

    Insider Threats - Importance & Prevention

    Posted: 03 May 2019 01:31 PM PDT

    Wormable XSS in Twitter

    Posted: 02 May 2019 06:01 PM PDT

    No comments:

    Post a Comment