Denver Hackathon: I share my thoughts on NetWars โ€” a live interactive Capture the Flag training exercise at SANS Rocky Mountain 2016. NetWars is an excellent way to arm your team with knowledge of offensive tools employed by hackers.

In my ongoing blog series โ€œHacker Mindset,โ€ Iโ€™ll explore an attackerโ€™s assumptions, methods and theory, including how information security professionals can apply this knowledge to increase cyber-vigilance on the systems and networks they steward.

Earlier this month, I had an incredible opportunity to facilitate Rocky Mountain SANS 2016 with a small group of other volunteers and SANS staff. The SANS Institute specializes in information security courses and certifications, cybersecurity Masterโ€™s degrees and end-user awareness training.

Focusing on the proficiency of candidates through a wide range of programs, such as security administration, forensics, incident response, audit and management, SANS is an excellent way to keep your skills cutting edge.

The SANS NetWars tournament took place three hours a night over two days, featuring training situations simulating vulnerability hunting, malware discovery, memory and disk forensics, as well as other network defense and penetration methods.

Letโ€™s recap what happenedโ€ฆ

Last Thursday night kicks off with participants and their laptops filling up the conference hall. Everyone takes a seat and begins to load the custom virtual machine theyโ€™ll use for the first two levels of the competition.

I get my VM up and running in VMWare Fusion and log into the tournament website with everyone else. Level I of the contest tests your Linux knowledge with simple challenges to ease you into the game. Getting stumped on a question or tasks is no problem. The entire series is guided and allows for increasingly helpful โ€œhintsโ€ that anyone can complete regardless of skill level.

I move into level II using THC-Hydra for cracking the login of an FTP service running on my target machine. From there, I use John The Ripper to accomplish the task of cracking a hash to move further into my attack. Then, I gain root access to the Linux target to make progress into the next level of competition.

It was very exciting to answer the questions and earn points with the correct answers. When stumped on a question or task, I ask the system for a hint. It is such a great atmosphere to learn how hackers operate. As the evening goes on, the chat volume of all the team members collaborating increases.

The last day is pretty lively with music and a sense of urgency to win. The top five teams and top five individuals receive a NetWars challenge coin similar to ones used by military personnel, as well as an invitation to attend a โ€œNetWars Tournament of Championsโ€ later on in the year.

One of the first tasks I perform on the second day is a forensic memory capture analysis using Volatility Framework, followed by a captured packet analysis looking for the cause of two hosts experiencing communication failure. Again, the hints are great if youโ€™re not a fluent pentester; itโ€™s fun for all skill levels.

Before the tournament ends, I catch up with Jeff McJunkin from Counter Hack, the creators of NetWars. We speak about the benefits to this type of live training and how it arms information security professionals with real-world knowledge to fight hackers who invade corporate and government networks.

The NetWars model brings a broad range of training scenarios benefiting managers to incident responders. Another learning track involves a scale city, dubbed โ€œNetWars CyberCity.โ€ This mini town of critical infrastructure provides a backdrop to simulate attacks to prepare the U.S. military for any contingency.

Being prepared for a cyberattack may just need to involve not only your incident response plan but also your real-world skills to understand how a hacker penetrates into systems and gains evaluated access. The NetWars learning experience drove it home to me how we need to change our mindset for the security controls we put into place.

Knowing the steps to a cyberattack may just help you plan to prevent a real one in your organization.

What do you think? I welcome your feedback and ideas of how you handle your organizationโ€™s security and combat the hacker mindset.

Originally published at www.tripwire.com on July 27, 2016.

--

--

๐Ÿ‘จ๐Ÿปโ€๐Ÿš€U.S. Air Force ๐Ÿ‡บ๐Ÿ‡ธveteran | ๐ŸŽ“University of Denver alumnus | ๐Ÿ•ต๐Ÿปโ€โ™‚๏ธcybersecurity. โค๏ธ:๐Ÿƒ๐Ÿปโ€โ™‚๏ธ,โ˜•๏ธ,๐Ÿ“š,๐Ÿ––๐Ÿป,๐Ÿ“ท,๐Ÿฃ,๐Ÿฅ‘,&๐Ÿš€. ๐Ÿฆ‹ bsky.app/profile/sudojames.com