Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,149,874 members, 7,806,501 topics. Date: Tuesday, 23 April 2024 at 05:26 PM

Hands On Cyber Security Challenge Drill "Capture The Flag" - Science/Technology - Nairaland

Nairaland Forum / Science/Technology / Hands On Cyber Security Challenge Drill "Capture The Flag" (626 Views)

Nigerian Air Force Trains 20 Officers On Cyber Security, Software Development In / I Need An Idea On Cyber Security / Japanese Scientists Plan To Drill Through Earth's Crust To The Molten Mantle. (2) (3) (4)

(1) (Reply)

Hands On Cyber Security Challenge Drill "Capture The Flag" by nikks(f): 10:21am On Mar 16, 2017
Welcome to Defence Cyber Security Drill Title : Capture The Flag (CTF)! A game designed to test your cyber capability in Programming, Forensic, Crypto, Binary hacking skills and problem solving abilities against friends within cyber security community.

Defence Space CTF has 7 Flags to puzzle out. For every flag you capture, your team will get a certain points depending on the difficulty of the challenge.

Flags


Instructions: The CTF is a virtual machine and works best in Virtual Box. Download the OVA file open up Virtual Box and then select File –> Import Appliance. Choose the OVA file from where you downloaded it. After importing the OVA file above make sure that USB 2.0 , Audio and share is disabled before booting up the VM. The networking is setup for a Host-Only & DHCP . The Virtual Machine Server is configured for DHCP. If you have any questions please send me a message on Twitter @silexsecure and I’ll be glad to help.
Note :
1. There are no great limits to discovering service running on platform because there are no limits of intelligence, when it come to cyber warfare
2. We shall go on to the end. we shall fight on the Air and Land, we shall fight with growing confidence and growing strength with Intelligence , we shall defend our Cyber Space, whatever the cost may be, we shall fight with HEX
b. Restricted access, only for top commanders +
3. It will be difficult often impossible - for us to infiltrate without predominently scanning
4. Relevant, actionable intelligence tailored to your security mission
5. Late Lt. Col Abu Ali’s Head Unit 99056 Command "OPERATION LAFIYA DOLE" After a successful conclusion in the fight againt terrorism and insurgency in Far North East. He build a massive information-sharing system, detailing national security personnel involved in the operation and individuals cleared for accessing OPERATION LAFIYA DOLE Classified Sysem, to flag who among them might be potential insider threats.but unfortunately he died as a hero who sacrificed his life for peace to reign in Nigeria identify the unit DB and Break into it.
6. The Only Secure token I need is the One that can work on mutiple platform (AKA Double Agent)
7. Late Wing Commander Chinda Hedima is an expert in unmanned aircraft, He double as Defense Intelligence Agency surveillance and reconnaissance Unit. The Air Component of OPERATION LAFIYA DOLE. He single handedly recorded air campaign against the BHT which in return captured the satellite image of CHIBOK girls before the Spy Craft Crashed, He sent a stenography messages to DIA /AIRFORCE Cloud system before he was killed, you goal is to retrieve the audio and visual image and decipher it for the agency.

Kindly download on http://ctf2017.silexsecure.com/
https://download.vulnhub.com/defencectf2017/DEFENCESPACECTF-2017.ova
https://download.vulnhub.com/defencectf2017/DEFENCESPACECTF-2017.ova.torrent
Re: Hands On Cyber Security Challenge Drill "Capture The Flag" by chamboy(m): 6:38pm On Mar 20, 2017
nikks:
Welcome to Defence Cyber Security Drill Title : Capture The Flag (CTF)! A game designed to test your cyber capability in Programming, Forensic, Crypto, Binary hacking skills and problem solving abilities against friends within cyber security community.

Defence Space CTF has 7 Flags to puzzle out. For every flag you capture, your team will get a certain points depending on the difficulty of the challenge.

Flags


Instructions: The CTF is a virtual machine and works best in Virtual Box. Download the OVA file open up Virtual Box and then select File –> Import Appliance. Choose the OVA file from where you downloaded it. After importing the OVA file above make sure that USB 2.0 , Audio and share is disabled before booting up the VM. The networking is setup for a Host-Only & DHCP . The Virtual Machine Server is configured for DHCP. If you have any questions please send me a message on Twitter @silexsecure and I’ll be glad to help.
Note :
1. There are no great limits to discovering service running on platform because there are no limits of intelligence, when it come to cyber warfare
2. We shall go on to the end. we shall fight on the Air and Land, we shall fight with growing confidence and growing strength with Intelligence , we shall defend our Cyber Space, whatever the cost may be, we shall fight with HEX
b. Restricted access, only for top commanders +
3. It will be difficult often impossible - for us to infiltrate without predominently scanning
4. Relevant, actionable intelligence tailored to your security mission
5. Late Lt. Col Abu Ali’s Head Unit 99056 Command "OPERATION LAFIYA DOLE" After a successful conclusion in the fight againt terrorism and insurgency in Far North East. He build a massive information-sharing system, detailing national security personnel involved in the operation and individuals cleared for accessing OPERATION LAFIYA DOLE Classified Sysem, to flag who among them might be potential insider threats.but unfortunately he died as a hero who sacrificed his life for peace to reign in Nigeria identify the unit DB and Break into it.
6. The Only Secure token I need is the One that can work on mutiple platform (AKA Double Agent)
7. Late Wing Commander Chinda Hedima is an expert in unmanned aircraft, He double as Defense Intelligence Agency surveillance and reconnaissance Unit. The Air Component of OPERATION LAFIYA DOLE. He single handedly recorded air campaign against the BHT which in return captured the satellite image of CHIBOK girls before the Spy Craft Crashed, He sent a stenography messages to DIA /AIRFORCE Cloud system before he was killed, you goal is to retrieve the audio and visual image and decipher it for the agency.

Kindly download on http://ctf2017.silexsecure.com/
https://download.vulnhub.com/defencectf2017/DEFENCESPACECTF-2017.ova
https://download.vulnhub.com/defencectf2017/DEFENCESPACECTF-2017.ova.torrent

Hi am phil

1 Like 1 Share

(1) (Reply)

Why Exactly Did Dinosaurs Go Extinct? / Steve Job’s Final Masterpiece Is Completed: New Silicon Valley Headquarters / Top And Best Technology Blogs In Nigeria

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 16
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.