Announcement

Collapse
No announcement yet.

(virt) OpenSOC Blue Team CTF at DEF CON 29

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • kwilds
    replied
    OpenSOC event times:
    • General round: Friday, August 6th, 10am to 5:30pm PT
    • Finals: Saturday, August 7th, 9am through 4pm PT.
    FAQs are here

    Leave a comment:


  • kwilds
    replied
    Registration for OpenSOC is LIVE!! https://forms.gle/cTiqXqFmooRBFgto9

    Leave a comment:


  • Dark Tangent
    started a topic (virt) OpenSOC Blue Team CTF at DEF CON 29

    (virt) OpenSOC Blue Team CTF at DEF CON 29

    Click image for larger version

Name:	Blue Team Village logo-smaller.png
Views:	711
Size:	8.4 KB
ID:	238019


    OpenSOC is a Digital Forensics, Incident Response (DFIR), and Threat Hunting challenge meant to teach and test practical incident response skills in an environment that closely resembles a real enterprise network. This virtual environment is a scaled down version of what you would find in an enterprise network, including: workstations, servers, firewalls, email, web browsing, user activity, etc. Simulated users are browsing the Internet, downloading files, watching videos, and accessing LAN resources. This creates a high fidelity training environment for unleashing real-world attacks and testing a responder’s ability to filter out the noise and find malicious activity on the network.

    This isn’t just another CTF. We’ve built this platform to train real-world responders to handle real-world situations.

    What’s even better? 100% of the security tools demonstrated on OpenSOC are FREE and OPEN SOURCE! These projects include ELK, Arkime, osquesry, Suricata, pfsense, Snort, and Thinkst Canary, bringing it all together in an awesome way.

    The Challenge:
    • Given an initial IOC’s (indicator of compromise (or pivot point)), identify attacks that are being carried out against and within the enterprise environment.
    • Trace the attackers throughout the kill chain, submitting key IOCs and observables to the scoreboard as you reveal their tactics.
    • Reverse engineer any artifacts connected to hostile activities.
    • Perform forensics analysis on PCAPs (Packet Captures), memory images, etc.
    • Win awesome prizes, learn new skills, and get experience with some of the best OPEN SOURCE tools for SecOps!
Working...
X