Challenge Overview & Suggested Prerequisites
Coming soon to a computer near you, the North American Cyber Range Alliance “NACRA Cyber Quest 2020”. This overview provides the expectations and recommended prerequisites (not required) for individual events during October!
NACRA’s Cyber Quest 2020 takes place during October's Cybersecurity Awareness month, providing a variety of workshops and challenges hosted by leaders in the IT and Cybersecurity training industry and feature live cyber ranges simulating real world attack scenarios. The live ranges will cover everything from a hands-on introduction to Kali Linux tools through the eyes of the adversary, to range challenges defending against advanced real-world attacks used worldwide to train countries and their defense security forces. Pre-event activities will commence on the 5th through the 17th of October, with the main events taking place on Saturday October 24th.
October Pre-Event Activities include:
10/5 Michigan Range operated by Merit ‘Capture the Flag (CTF)’ Competition
This competition features a jeopardy style format in which teams will exercise their cybersecurity knowledge and skills to see who can locate the most flags and attain the most points. Participants will face a variety of challenges that range in levels of difficulty so that even beginners will feel comfortable. Although not required, contestants should understand networking, operating systems, cybersecurity tools and techniques, vulnerabilities, and cryptology.
10/10 ABL Range Familiarization
This is a mandatory event for those interested in taking part in ABL’s Basic Range Challenge that will be held on 10/24. Individuals registering for the ABL’s Basic Range Challenge will automatically be registered for this event. The event is designed to facilitate familiarity with the ABL range environment that participants will be utilizing on 10/24, and assure proper setup.
10/14 Cisco Threat Hunting Workshop
Participants in this hands-on workshop will uncover best practices for threat hunting, learn how to incorporate threat hunting into daily workflows, network with their peers to share strategies and techniques, and execute real-world lab scenarios against live ransomware/malware. In this real-world workshop, you will be responding to dynamic attacks and containing incidents that organizations face every day. Not only should participants understand networks, they should also have a working knowledge of cybersecurity principles and practices.
10/17 Cyberbit Range Familiarity
This is a mandatory event for those interested in taking part in any of Cyberbit’s Range Challenges that will be held on 10/24. Individuals registering for any of the Challenges will automatically be registered for this event. The event is designed to facilitate an understanding of the environment and tools that participants will be utilizing on 10/24 during the competition.
The Main Events – 10/24
ABL Basic (Beginner) Range Challenge
In this challenge, participants will be introduced through using them to various Kali Linux cybersecurity tools. In some scenarios, there will be step-by-step walk throughs on how to utilize these tools. All scenarios will be done in safe and ethical sandboxed environments where individuals will use the tools to attack and hack servers, websites and/or applications. Outside of attending ABL’s Range Familiarization workshop or Cyberbit’s Range Introduction workshop, there are no pre-requisites to participate in this challenge. However, it is helpful if an individual has a foundation in computers, operating systems, internet searches as well as a basic knowledge of networks.
Cyberbit Intermediate Range Challenge
Real-world scenarios and challenges supported by real world tools are utilized in this simulated SOC environment where participants must work together as a team to leverage one-another’s talents in response to adversaries simulated real-world intrusions. Tasks this team may be required to execute include assessing network security, identifying vulnerabilities, detecting attacks and implementing a response. Contestants should understand malicious tactics, techniques and procedures, operating systems, security operations concepts, networking, firewalls, IDS and IPS, log and memory analysis, and SIEM systems. Make sure to sign up for the Student Program or the cybersecurity professional program respectively to gain the most from this challenge!
Cyberbit Advanced Range Challenge
In this virtual SOC setting, contestants can assess their current knowledge and skills as well as learn new skills and techniques while tackling advanced real-world scenarios. Participants will work as a team to thwart an opponent that doesn’t have to “play by the rules”. The team is going to have to utilize their collective strengths to rapidly identify and neutralize threats, quickly assess network and end-point security and adapt to any changes in their digital infrastructure. Participants selecting this challenge should have a solid understanding of security operations concepts, operating systems, networks, firewalls, network monitoring tools, log and memory analysis, end-point security, malware and an understanding of an attacker’s motivations and techniques. Make sure to sign up for the Student Program or the cybersecurity professional program respectively to gain the most from this challenge!