Preview

CySCA 2014 Access Information Dea1

Good Essays
Open Document
Open Document
799 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CySCA 2014 Access Information Dea1
2014 Cyber Security Challenge Australia
Access Information
This is the final information document required for each team to compete in the 2014 Cyber Security
Challenge Australia (the Challenge). The information in this document, along with the Terms &
Conditions, Game Scenario and General Information, will be available and updated on the website: http://www.cyberchallenge.com.au Provided below are:
1. Instructions for setting up the teams’ computers prior to the Challenge
2. Website access information – for submitting flags and responses during the game
3. IRC access information – for real-time communication between exercise control and participants
4. Twitter address – for real-time broadcasting to participants
5. Information on other avenues of contact

1. Setting up and Accessing the Challenge environment
The Challenge environment will be hosted on infrastructure provided by Telstra.


Each team will have their own instance of this environment i.e. the network and systems for the company Fortress Certifications Pty Ltd. Teams will be unable to access others’ environments.

The Challenge will begin on 7 May 2014 when access to each environment will be made available at
12:00pm AEST (Sydney time). It will conclude promptly at 12pm, 8 May 2014.
Exercise control recommends that you access the challenge environment from within a virtual machine such as VirtualBox running Kali Linux 1.0.6 32bit.

Prior to this, each team will need to:
1. Ensure that the computer/workstation used to compete in the Challenge has either:


Direct un-firewalled Internet access or 

Outbound TCP port 3018 allowed to IP address 203.43.28.164

2. Ensure that your own LAN segment is not using the IP ranges within 10.10.10.0/24, 172.16.1.0/24 or
192.168.16.0/24 ranges, as this will likely interfere with your Challenge environment.

3. Install and configure OpenVPN (Kali 1.0.6 or other) on this computer.


For instructions on accessing, installing and using OpenVPN, follow the URL:

You May Also Find These Documents Helpful

  • Satisfactory Essays

    If the problem still isn’t solved, check your scope configuration, and make sure the network/subnet mask match what is configured on the router that is connected to this local LAN.…

    • 636 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 1

    • 235 Words
    • 1 Page

    Now if that fixes the problem, then great. If not then you may need to check your scope configuration and make sure the network/subnet mask match what is configured on the router that you have connected to that particular LAN.…

    • 235 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT1330 Unit 2 Assign 1

    • 275 Words
    • 1 Page

    There are several things to check and several things that could be wrong. I would start by making sure that you have your ranges of IP addresses right and that you didn’t mistype any numbers.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Itt 255 IT255 Instructor Lab Manual LABORATORY Instructor Lab Manual IT255 Fundamentals of Information Systems Security Copyright © 2012 Jones & Bartlett Learning, LLC www.jblearning.com All Rights Reserved. Current Version Date: 12/06/2010 -1- IT255 Instructor Lab Manual LABORATORY ISS Curriculum Overview............................................................................................................................. 5 Ethics and Code of Conduct.......................................................................................................................... 6 ISS Mock IT Infrastructure ...........................................................................................................................…

    • 33056 Words
    • 133 Pages
    Satisfactory Essays
  • Powerful Essays

    mdaniels IS3110 week5quiz

    • 1535 Words
    • 6 Pages

    •Distributed team- there can be multiple teams due to major computing facilities in multiple locations. They are normally centrally located and are managed from a central location which could be a home office for a company or one location that can manage everything.…

    • 1535 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

    IS4799 Information Systems and Cybersecurity Capstone Project Unit 2 RFP Bidder’s Conference © ITT Educational Services, Inc. All rights reserved. Learning Objective and Key Concepts…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    References: Kim, D., & Solomon, M. G. (2012). Fundamentals of Information Systems SecuritY. Sudbury: Jones & Bartlett Learning.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Csia 301 - Syllabus

    • 4678 Words
    • 19 Pages

    Welcome to Foundations of Cybersecurity CSIA 301, a hybrid course. My name is Professor Nancy M. Landreville and I have been teaching here at the University of Maryland, University College since February 2007. My phone number is (301) 401-0144. You may contact me by phone any evening during the week (Monday - Friday) from 7:00pm - 9:00pm. You may email me at any time at nancy.landreville@faculty.umuc.edu . I encourage you to use the private messaging area rather than the faculty email address. This will facilitate faster response to your course questions. I will respond to your email within 24 hours from receipt of your email. Please place the name of the course in the subject line so I know the email is from one of my students. I check email every day from my students. I encourage you to contact me with any questions about the course, require that you contact me for extenuating circumstances for late work, and meet with me online for any required conferences that are held during the course. We will meet in the online chat room at least once this semester to discuss the midterm and once this semester to discuss your final assignment. This is in addition to your required face-to-face attendance each week for eight weeks.…

    • 4678 Words
    • 19 Pages
    Good Essays
  • Powerful Essays

    IS4560 Graded Assingments

    • 5563 Words
    • 23 Pages

    This particular report provides information on cutting edge and growing threats to Internet security. Using the background provided by the class so far, as well as your own critical thinking skill, you need to write a summary of the top threats described in the whitepaper. Explain why the threats are important issues and how these threats have changed or are changing.…

    • 5563 Words
    • 23 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    ISS Information Systems Information NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 5…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Wgu Economics Syllabus

    • 607 Words
    • 3 Pages

    each small team, and will generally serve as a forum for collaborative discussions on research…

    • 607 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    A virtual team is a team whose members operate across space, time and organizational boundaries, and are linked through information technologies to achieve organizational tasks. [1] With more and more corporations having their business operations going global and being enabled by the advancement of technology, virtual team becomes an emerging new-age trend. [2] Virtual teams offer several advantages and disadvantages to organizations that require exploration. [3]…

    • 2114 Words
    • 9 Pages
    Powerful Essays

Related Topics