USITCC Regionals Security Preperation

USITCC Regionals Security Preperation
Photo by Scott Webb / Unsplash

Hey! This article is a written version of the topics that I went over in my recent talk to the Association of Business Information Technology students about cybersecurity a full link to the presentation as well as video is below this paragraph:

(This will be updated with the video once taken)

Sections of the Competition

How the Regional / National USITCC competition is setup

Written Section

50 - 70 multiple choice test, similar to CompTIA Security+ and other security certifications This mostly covers questions that you can have multiple choice questions on. I would recommend looking at the Security+ exam objectives

https://comptiacdn.azureedge.net/webcontent/docs/default-source/exam-objectives/comptia-security-sy0-601-exam-objectives-(6-0).pdf

Capture the flag

The top 10% from the written test move on to a CTF starting as soon as the last person is done taking the written exam. This covers practical application and is the majority of the topics covered. Nationals consisted mostly of log analysis and forensics. It is to be seen if they will add additional areas based on ethical hacking.

Topics covered:

Resources

Item's I've collected to help you study for the USITCC Security Competition

Hack the box / Try hack me

Hack the box provides great resources to complete "Boxes" in order to practice what CTF challenges will look like

Hack the box hosts CTF's too take a look at a couple here to get your feet wet into cyber

October 24th - 26th

Hack The Boo 2024 - Competition | HTB CTF
Play the Hack The Boo 2024 - Competition event on the Hack The Box CTF Platform. <div><strong>Enter the spooky world of Hack The Boo</strong>, a Capture The Flag competition designed to test your cybersecurity skills while embracing the thrills and chills of the season. Perfect for beginners, Hack The Boo combines easy challenges with real-world cybersecurity puzzles.The competition kicks off with <em>The Practice</em>, where you can solve beginner-friendly challenges and get familiar with key concepts. From <strong>Monday, October 21st, to Wednesday, October 23rd</strong>, you’ll tackle 15 easy challenges with write-ups designed to help you prepare for the real deal.Then, from <strong>Thursday, October 24th, to Friday, October 25th</strong>, come here in <em>The Competition</em>, where the real horrors await—tougher challenges, fierce competition, and the chance to climb the leaderboard for exciting prizes.Are you brave enough to face the terror?&nbsp;</div>

Hack the box CTF occuring this weekend.

University CTF 2024: Binary Badlands | HTB CTF
Play the University CTF 2024: Binary Badlands event on the Hack The Box CTF Platform. <div>Life ain’t easy for an outlaw. But we bet our lucky stars we know how to take down those responsible for that!<br><br>Hey gunslinger, do you think you have the spurs to reach for the stars? Get the gang together for hours of high-octane hacking challenges to learn new skills, compete with the best universities, and earn $90,000 in prizes. Sign up for free!<br><br><strong>HOW TO REGISTER<br></strong><br>1. Click the “SIGN UP” button.<br>2. You’ll be given the option to select your university from a dropdown menu. Search this list carefully and select your institution.<br>3. Enter your Full Name and Academic Email. If you make a mistake here, you’ll need to reach out to our support team to correct it.<br>4. If the domain name or subdomain you entered for your academic email matches what we have on file for your institution, you’ll be sent a verification code in your email inbox. This is the final step in the registration process.<br>5. After verifying, you’ll be given a message confirming your registration and will be ready to compete in the CTF. Good luck! 🤞<br><br>*This might take a few minutes as our team is reviewing the registrations. We will do this automatically, no need to reach out.<br><br><strong>TROUBLESHOOTING<br></strong>1. Your University is not in the drop-down list.<br>All participating universities need to be enrolled with Hack The Box. Enrollment is a free process that can be done with a few clicks. You will need to have the Authorization Registration form we provide reviewed and signed by a faculty member. Click here to enroll your university.<br>2. You selected the wrong university from the list.<br>In this event, simply choose the correct university from the dropdown list and re-request verification.<br><br><a href=“https://help.hackthebox.com/en/articles/6666329-how-to-join-university-ctf-2024″>How to join University CTF 2024</a></div>

University CTF

News Sites

I use an RSS feed on my phone to get the latest in news from several different cybersecurity websites I highly recomend taking some time to look at large new articles and events in cyber!

My current list:

  • 0day Fans
  • Bleeping Computer
  • Cyber Security News
  • The Register - Security
  • Dark Reading

MITRE Vectors

Want to know how malware works? check out the Mitre ATT&CK to find out about malware tactics for many different things

MITRE ATT&CK®

Mitre ATT&CK Vectors list

CompTIA Security+ Exam Objectives (Written study guide basically)

https://comptiacdn.azureedge.net/webcontent/docs/default-source/exam-objectives/comptia-security-sy0-601-exam-objectives-(6-0).pdf

Networking

A quick jump into computer networking

IP Addressing

IP Address visualized

What is an IP Address? Its basically the phone number of the internet. You use the 32 bits in a ip address to reach a different machine. These addresses are assigned by the router to a machine to allow other computers to contact it. The router then does Network Address Translation (NAT) to translate that IP address into a MAC address to ensure its delivered to the correct location.

CIDR Notation

CIDR Notation of a network

The CIDR notation describes how IP addresses are assigned in a network. The /24 notation shows that the first 24 bits (8+8+8) will be assigned to be the "Network" and will not change on any of the ip addresses assigned while the "host" bits are the last 8 and will change based on the machine.

Web security

Talking about vulnerabilities affecting websites.

Broken Access Control

Users can act outside of their intended permissions from viewing folders they shouldn’t be able to. to finding files not intended for public display

Here a fun google dork as a demonstration:

“not for public release filtype:pdf”

not for public release filetype:pdf - Google Zoeken

Google search fill in for a not for public release files

Cryptographic Failures

Lack of encryption, passwords or data stored in plaintext. card data not encrypted etc.

Meta was recently fined $102 million dollars for storing Facebook passwords in plain text. This was a cryptographic failure from Meta. I'm sure they've had a great time "investigating" why they haven't hashed their passwords for four years.

Meta Fined $102M for Storing Facebook Passwords in Plain Text
There’s no evidence that the passwords were accessed by anyone, but Meta still broke European privacy rules.

Injection

User input is dangerous and without the proper safeguards can cause a system to do something it normally shouldn't as an example you can use a sql injection:

“ or “”=” in the password field if not properly sanitized to log right in to an account

Juice shop

For demonstration in the presentation we take a look at the OWASP juice shop. a web hackable application that is super easy to host. demonstrating some simple attacks against the machine.

OWASP Juice Shop | OWASP Foundation
Probably the most modern and sophisticated insecure web application for security trainings, awareness demos and CTFs. Also great voluntary guinea pig for your security tools and DevSecOps pipelines!

Cryptography

01000011 01110010 01111001 01110000 01110100 01101111 01100111 01110010 01100001 01110000 01101000 0111100101000011 01110010 01111001 01110000 01110100 01101111 01100111 01110010 01100001 01110000 01101000 01111001

“Cryptography is the process of hiding or coding information so that only the person a message was intended for can read it. The art of cryptography has been used to code messages for thousands of years and continues to be used in bank cards, computer passwords, and ecommerce.” -Fortinet

  • Traces its roots back to Julius Caesar (Caesar Cipher)
  • 1970s IBM developed Data Encryption Standard (DES) Algorithm
  • 1977 RSA Algoritm was published

Types

  • Symmetric Key Encryption
    • One key to encrypt / decrypt
  • A-Symmetric Key
    • Public / Private key pairs

Algorithms

Rivest - Shadmir - Aldeman (RSA)

Public-Key System Developed for Intelligence encroyption

Uses two large prime numbers

Factoring two prime numbers is near impossible

RSA (cryptosystem) - Wikipedia

Data Encryption Standard (DES)

First main computer encryption standard Replaced by triple DES With three keys of 56 bytes

Phased out and has been broken many times

Showing what the key for a DES looks like
Data encryption standard (DES) | Set 1 - GeeksforGeeks
A Computer Science portal for geeks. It contains well written, well thought and well explained computer science and programming articles, quizzes and practice/competitive programming/company interview Questions.

Advanced Encryption Standard (AES)

This is the current government standard using keys of 192 and 256 bits

Advanced Encryption Standard - Wikipedia

Quantum Computers

Each year the amount of bits of a key that quantum can hack grows, the latest one was 22-bit keys. This has put NIST in a rush to get new standards for encryption out and ready to go for when not if quantum computers are able to crack our encryption.

CyberChef
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis

The swiss army knife for all things encryption

Regulations

Types of Controls

Management

Security controls that focus on the management of risk and management of information system security.

Operational

Implemented to be executed by people This would be procedural. How data is handled, where its stored and the policies an organziation operates by

Technical

The controls implemented that are executed by the computer. Not people. I/e Multi Factor Authentication, Password Policies, etc


Control Types

Preventative

Work to prevent an incident from occurring

Examples: Firewalls encryption system hardening malware detection

Detective

Detect incidents after they have occurred

Examples: Audit logs, Intrusion Detection Systems, Security Information and Event Management (SIEM Systems), Vulnerability Scanning

Corrective

Last line of defense against cyber threats, They correct the impact of an incident

Data recovery, incident response, data backups

Deterrent

Attempt to discourage individuals into causing incidents

Compensating

When primary controls are unfeasible or require enhancement and alternative methods are needed to fulfill unmet requirements

Red teaming, Honey pots

Physical

Controls implemented at the physical level to deter or prevent attacks on a system. such as locking down a computer's USB ports


PCI - DSS

Payment Card Industry standards. If you are accepting payments I better hope you are following PCI. Provides core protection through encryption and secure software

Official PCI Security Standards Council Site
A global forum that brings together payments industry stakeholders to develop and drive adoption of data security standards and resources for safe payments.

Patriot Act

War on terror act. Affecting information disclosures by organizations in national security incidents. Requring disclosure from ISP’s

Signed by George W Bush in October 26 2001

GDPR

You seen those cookie pop ups? Thank GDPR

Applies to people in the European Union protecting their data from being stored outside of the EU. Millions of dollars of fines come every month out of this regulation

General Data Protection Regulation (GDPR) – Legal Text
The official PDF of the Regulation (EU) 2016/679 – known as GDPR – its recitals & key issues as a neatly arranged website.

Recent Events

Crowdstrike

Largest IT Outage in HISTORY. $5 billion dollars worth of direct losses according to one insurer July 2024.

8 million computers blue screened constantly due to an error in the root driver caused by a channel file being added with 12 parameters instead of 13.

https://www.crowdstrike.com/wp-content/uploads/2024/08/Channel-File-291-Incident-Root-Cause-Analysis-08.06.2024.pdf

Russian Attacks

Advent of the Russia / Ukraine war has seen a massive increase in cyber attacks and shown us how cyber attacks have become weapons of war

February 2022 Many russian officers in unit 29155 were indicted for large-scale cyber attacks against ukraine.

September 4th the U.S Filed charges against employees of the Russian media group network RT in an effort to hire a company to influence the 2024 election using shell companies and personas

Blackouts in ukraine caused by malware “Industroyer One and Two”

Pollyfill.io

Attacked the pollyfill library used by websites researchers at sensec discovered java script code injected into 110,000 websites including phishing and advertising on June 25th (They even got ddosed on the 26th)

Code was based on http headers, one redirected mobile users to a sports betting site using the domain ww.googie-anaiytics.com only activating at specific hours or against admin users or web analytics.

https://sansec.io/research/polyfill-supply-chain-attack

if the internet archive works:

http://web.archive.org/web/20240000000000*/pollyfill.io

https://www.csis.org/programs/strategic-technologies-program/significant-cyber-incidents

Conclusion

Thanks for sticking it out!

I wish you luck in the security competition this year! Kind of weird how I'm training my competitors. But I think everyone deserves a slice of this cyber knowledge! if you have any questions you can reach out to me at my missouri state email or olsontyler@proton.me

Can't wait for day 2! After working on this I'll be setting up the infrastructure for our practice capture the flag!