www.darkreading.com
Open in
urlscan Pro
2606:4700::6812:6f2f
Public Scan
URL:
https://www.darkreading.com/cloud-security/7-lessons-learned-from-designing-a-defcon-ctf
Submission: On January 12 via api from TR — Scanned from DE
Submission: On January 12 via api from TR — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Dark Reading is part of the Informa Tech Division of Informa PLC Informa PLC|ABOUT US|INVESTOR RELATIONS|TALENT This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales and Scotlan. Number 8860726. Black Hat NewsOmdia Cybersecurity Newsletter Sign-Up Newsletter Sign-Up Cybersecurity Topics RELATED TOPICS * Application Security * Cybersecurity Careers * Cloud Security * Cyber Risk * Cyberattacks & Data Breaches * Cybersecurity Analytics * Cybersecurity Operations * Data Privacy * Endpoint Security * ICS/OT Security * Identity & Access Mgmt Security * Insider Threats * IoT * Mobile Security * Perimeter * Physical Security * Remote Workforce * Threat Intelligence * Vulnerabilities & Threats World RELATED TOPICS * DR Global * Middle East & Africa See All The Edge DR Technology Events RELATED TOPICS * Upcoming Events * Webinars SEE ALL Resources RELATED TOPICS * Library * Newsletters * Reports * Videos * Webinars * Whitepapers * * * * * Partner Perspectives: * > Google Cloud * > Microsoft SEE ALL Sponsored By * Сloud Security * Cybersecurity Careers Cybersecurity In-Depth: Feature articles on security strategy, latest trends, and people to know. 7 LESSONS LEARNED FROM DESIGNING A DEF CON CTF7 LESSONS LEARNED FROM DESIGNING A DEF CON CTF Practical advice for anyone interested in elevating their cyber capture-the-flag events. Ericka Chickowski, Contributing Writer January 11, 2024 10 Min Read Source: Leonardo Lazo via Alamy Stock Photo Capture-the-flag (CTF) events are both fun and educational, providing cybersecurity professionals a way to flex their hacking skills while learning new concepts in a constructive and safe environment. Well-designed CTFs expose individuals and teams to operational challenges, novel attack paths, and creative scenarios that can be later applied in their work both as offensive and defensive security professionals. But not all CTFs are created equal, and there's a lot more that goes into designing a successful CTF competition than just coming up with the challenges. Along with the technical design challenges, there are also operational considerations involved with setting up the environment and actually running the competition, creative planning required to set up an engaging game, and factoring in details related to gamifying the challenges, such as tradeoffs in how scoring structure is set up. "As a designer I want it [the CTF] to be challenging fun. I want to reward people who are clever, who really work at it, and who are persistent," says Jenko Hwong, principal researcher on Netskope's Threat Research Labs team and team leader for last year's DEF CON Cloud Village CTF. "It also has to be practical for us to carry out." Fun and practical was the mindset that Hwong brought to the DEF CON CTF, a massive multi-day affair that had over 400 individuals and teams trying their hands at the challenge and a team of 20 working under him to run the event. A veteran researcher and seasoned CTF participant, Hwong had never run a CTF before this event. One of his biggest hopes for his first try at the job was to level up the relevancy and realism of the challenges in the event, which can sometimes be a bugaboo in CTFs today. "Sometimes in these CTFs you get a really hard challenge but it's like what's the point of this? It'll be a decryption or encryption problem, where the event goes, 'Here's something, good luck,' and then you have to jump through all these hoops that may not be completely divorced from reality but don't really fit into a bigger storyline," he says. "So, when I got the call, my thought was 'let's jump in, let's figure out a good story and a good set of challenges that will be fun but also that make sense and maybe relate to the real world of research penetration testing, defensive measures, what's happening in the real world.'" As he dove into the project, though, one thing he found especially challenging is how little information there is out there about running CTFs. Most write-ups are from participants who rate an event and explain how they solved challenges, but there's rarely information offered on best practices in running an event. As a result, he said that he and his team had to do a ton of work was done creating challenges nearly from scratch. "The community generally shares a ton, so why aren't we sharing CTF challenges?" he says. "I think we can do better." In that spirit of security community sharing, he shares some important lessons that his team picked up along the way so that others in charge of CTF design can learn and understand from the process. His goal is to run the event again and build on what they learned last year. He also hopes others will share their best practices, and even technical details, so that the whole security community can improve the quality of CTFs being offered. STORYTELLING IS KEY Hwong says that his DEF CON Cloud Village team was very keen on crafting a storyline that was engaging and fun. He says he thought of the story as a movie script with realistic cyber scenarios built in. For the event they chose a theme of 'Gnomes' that was fun and funny. but it wasn't just the storyline writing that was important but also how the technical challenges were planned within the story. "The goblin and gnomes storyline wrapped around everything but the important thing was coming up reasonable scenarios that you might encounter as a security professional, including attack paths and reasonable defenses you'd encounter," he says. "The more we can do that as CTF designers, the better it is for learning and the more fun the CTF." TAKE A SOFTWARE DEVELOPMENT APPROACH CTF creators should definitely take a software development approach to designing the technical elements of their challenge, Hwong recommends. "You've got to think of design, implementation and testing," he says, explaining that he and his team learned the hard way how difficult it can be to test challenges in a complex CTF environment that can be manipulated by participants in numerous ways. "What happened — and I'll take the blame as the lead creator for not guiding the testing — is we missed the negative testing pass, as well as the viability checks," he says. "Part of it is we didn't have enough time to test, so I was continuing to lock down some environments as the challenge was underway so some of the challenges wouldn't be too easy and there were no loopholes. I think at one point for an hour or two I ended up making something unsolvable at a certain step." So, one of the big lessons he learned is that CTF designers need to bring software development rigor to the table that goes all the way through testing and viability work. OPERATIONAL RIGOR…AND A LITTLE BIT OF CAFFEINE Meticulousness in software development isn't the only technical capability that needs to come to the table. The crew running a CTF also needs some serious operational rigor as well. "We had some fabulous people running the servers and the AWS accounts and the Google and Azure accounts and making sure things kept running and that we were monitoring things," he says. "All of that stuff has to be handled. And if you ignore it, it just could mean things fail, break or you have performance problems." One of the operational problems they ran into was that they experienced some collision between participants and challenges, as the team was operating with a constraint in that they couldn't create a standalone environment for every participant across AWS, Google, and Azure. "Because it was in the same environment, it helped them on other challenges and if you have a challenge that requires changing the environment then you have people stepping on each other's toes, changing a shared object," he said, explaining that he and his team had to reset policies as the CTF rolled forward so participants wouldn't run into one another. He and his team are trying to learn from the experience to figure out a practical method—from time, effort, and expense perspective — to give participants a truly isolated environment without making the whole CTF less viable because things break or take forever to execute. Finally, Hwong says that on the operational front CTF show runners also have to be mindful of the constant communication that they'll need to facilitate between their team and participants. "I was on Discord after midnight and I'm like, 'I've got a talk to give in the morning, would you go to sleep?'" joked Hwong, who explained that participants will have questions and they're going to be pinging organizers for tips and pointers at all hours. DESIGNING DIFFERENT DIFFICULTY LEVELS IS HARD Getting the difficulty levels of challenges right and creating a fair scoring system may be harder than a newbie CTF organizer may initially think, warned Hwong. He explained that a few of the levels that his team designed as easier were more difficult for participants to complete than they'd anticipated, while some of the more challenging levels were successfully finished by more participants than expected. Hand-in-hand with the difficulty leveling challenge is figuring out a scoring system that makes sense. After his experience at DEF CON, Hwong is a proponent of doing some kind of Bell Curve scoring system. But he says the problem isn't as straightforward as instituting a curve. There's also the issue of normalizing and balancing out the advantage that big CTF teams have in racking up challenge points—an issue that one of the participants provided him feedback about after the event. "So if your challenges can be divided and done in parallel multiple players, if I've got 10 people I will be 10 times is fast. And so there's an advantage," he says. "His point was some sort of dynamic scoring levels it a little bit. If there are things that he's really, really good at, he might be the only one who solves it and he'll get maximum points. The bell curve will reward him versus scale doesn't necessarily matter if it's something in his wheelhouse of expertise in terms of 10 versus one. There's some debatable stuff here that we have to work through." One possibility is making challenges sequential, but the downside of that is it could make the CTF too rigid and linear, and it could create a bottleneck or dependencies that could blow up one or more challenges. Hwong says he'd also love to see more CTFs reward participants on techniques like how stealthily they operate in an environment or dock points if they leave too many footprints and fingerprints, and that's an area he'd like to explore as he designs future events. Regardless, though, dynamic scoring is something that could alleviate some of the leveling issues and he and his team are pursing that for the coming year. BLUE TEAMS NEED MORE FUN CTF CHALLENGES After working through his first CTF, Hwong also increasingly believes these events don't do enough to challenge and really engage blue team participants. "Blue team exercises tend to go like this: 'We have a misconfigured environment with lots of vulnerabilities. Can you go fix them?'" he says. "And what they do is they just test whether those configurations are changed or not or whether I can access this public bucket. And as soon as you make it private, we know you fixed it and you get points. It'd be way better to do things on top of that, such as what if you're compromised, there's an attacker in your environment, you have to find them and kick them out. So you have an incident going on right now, and as long as the attacker is, they have credentials and as long as they'll do things, you might be able to detect it. That's your job as a participant. And until you revoke their access, you don't solve it and you don't get maximum points." Those kind of scenarios are harder to do but they're more realistic for defenders and will make CTFs more valuable for them, he says, explaining that is on his radar for next time. CTFS NEED MORE FRESH AND RELEVANT COMPONENTS. Hwong also challenges CTF designers — and himself — to incorporate more fresh exploit and vulnerability information into their challenges. This was one of the things he wished he had more time to dive into in his first go at DEF CON Cloud Village and which he's resolved to improve for next year. "This is one of the areas where CTFs can be more of a learning and training tool," he explains. "We would love to use relevant ideas and exploits fresh from researchers occurring earlier in the year or even presented at DEF CON." CTF 'BUILDING BLOCKS' TO IMPROVE 'REUSABILITY' Finally, one of the biggest lessons Hwong says he learned is that the industry needs to find more ways to create reusable components for CTF just like software developers do for applications. He has dreams of helping to organize an open GitHub repository of small exercises in code that can form the building blocks of building out a CTF. "You're still going to have to customize it and add your own twist, but the idea is let's get the first 60% out of the way so CTF organizers can focus on really novel things. That way nobody is reinventing the wheel," he says. "And then the remaining 40% can be adding new techniques, scenarios, and storylines." ABOUT THE AUTHOR(S) Ericka Chickowski, Contributing Writer Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading. See more from Ericka Chickowski, Contributing Writer Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. Subscribe You May Also Like -------------------------------------------------------------------------------- Application Security MGM, Caesars Cyberattack Responses Required Brutal Choices Threat Intelligence China Unleashes Flax Typhoon APT to Live Off the Land, Microsoft Warns Application Security Google, Microsoft Take Refuge in Rust Language's Better Security Perimeter Microsoft Teams Exploit Tool Auto-Delivers Malware More Insights Webinars * What's In Your Cloud? Jan 17, 2024 * Everything You Need to Know About DNS Attacks Jan 18, 2024 * Tips for Managing Cloud Security in a Hybrid Environment Feb 01, 2024 * Top Cloud Security Threats Targeting Enterprises Feb 08, 2024 * DevSecOps: The Smart Way to Shift Left Feb 14, 2024 More Webinars Events * Black Hat Asia - April 16-19 - Learn More Apr 16, 2024 * Black Hat Spring Trainings - March 12-15 - Learn More Mar 12, 2024 * Cyber Resiliency 2023: How to Keep IT Operations Running, No Matter What Aug 24, 2023 More Events Latest Articles in The Edge * 7 Lessons Learned From Designing a DEF CON CTF Jan 11, 2024 | 10 Min Read * Executing Zero Trust in the Cloud Takes Strategy Jan 9, 2024 | 4 Min Read * Is the vCISO Model Right for Your Organization? Jan 4, 2024 | 6 Min Read * Name That Edge Toon: Frosty the Steel Man Jan 3, 2024 | 1 Min Read Read More The Edge DISCOVER MORE WITH INFORMA TECH Black HatOmdia WORKING WITH US About UsAdvertiseReprints JOIN US Newsletter Sign-Up FOLLOW US Copyright © 2024 Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG. Home|Cookie Policy|Privacy|Terms of Use Cookies Button ABOUT COOKIES ON THIS SITE We and our partners use cookies to enhance your website experience, learn how our site is used, offer personalised features, measure the effectiveness of our services, and tailor content and ads to your interests while you navigate on the web or interact with us across devices. You can choose to accept all of these cookies or only essential cookies. To learn more or manage your preferences, click “Settings”. For further information about the data we collect from you, please see our Privacy Policy Accept All Settings COOKIE PREFERENCE CENTER When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Allow All MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Cookies Details PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Cookies Details FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Cookies Details Back Button BACK Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label * View Cookies * Name cookie name Confirm My Choices