Re: Deconstructing rules
Fair enough. I'm not happy with being limited to the x86 architecture, though. Cuts down on both the sporting and real-world aspects of the network.
That actually sounds very reasonable to me.
Well, no, because by the sounds of it you're limited to the x86 architecture which is not necessarily the best platform to *use* in the real world. This is why I'm upset at seeing other architectures ostensibly excluded from the network.
Something else that bothers me here (going into full paranoia mode for a moment): we're supposed to be attacking some flavour of accounting package. Fine and dandy. However, I'd like to know what the intentions are for this package post-con - is the code going to be recycled into another product, commercial or otherwise?
I'm not saying that this *is* the case, but it is something I'm curious about. CTF contestants shouldn't be used as QA engineers, nor would I necessarily want to use a product whose security QA was primarily conducted at CTF.
Originally posted by zero
You get an OS given to you which you must protect. This OS is X86 based. Basic real world scheme. Keep it running without hacks.
You get an OS given to you which you must protect. This OS is X86 based. Basic real world scheme. Keep it running without hacks.
Attacks - use anything you want, but there is no direct connectivity to the 'net. This'll keep slam attacks off of both sides (none going out to annoy the ISP, and none comming in to be a nuisance to the ctf.)
This is pretty straight forward when you break it down. Net admins get what management tells them to use and they have to make it work/safe. The hacker get all the tools and platforms they can lay their hands on. That's about as real world as it gets.
Something else that bothers me here (going into full paranoia mode for a moment): we're supposed to be attacking some flavour of accounting package. Fine and dandy. However, I'd like to know what the intentions are for this package post-con - is the code going to be recycled into another product, commercial or otherwise?
I'm not saying that this *is* the case, but it is something I'm curious about. CTF contestants shouldn't be used as QA engineers, nor would I necessarily want to use a product whose security QA was primarily conducted at CTF.
Comment