Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

7/18/2019
02:00 PM
Connect Directly
Twitter
RSS
E-Mail vvv
100%
0%

How Capture the Flag Competitions Strengthen the Cybersecurity Workforce

These competitions challenge participants with problems involving digital forensics, cryptography, binary analysis, web security, and many other fields.

As cyberattacks become more sophisticated and network complexity increases, there are just not enough security professionals to handle the massive amount of attacks, intrusions, and breaches that are observed every day in every kind of organization. Given the scarcity of human talent, it is not surprising that cybersecurity professionals are difficult to hire, train, and retain. One tool that can help in this process is the use of cybersecurity competitions, also known as capture the flag (CTF) competitions.

CTF competitions take two main forms: They can be "challenge-based" or "interactive." More precisely, challenge-based competitions are structured in a way that presents to the participants a number of challenges that require different skills (e.g., reversing binaries, performing forensic analysis on file systems, manipulating network traffic) at different levels of complexity (which are usually rewarded with different amounts of points when challenges are solved). These challenges are a form of a take-home test and do not include any interactions with other teams.

Alternatively, interactive (or "attack/defense") competitions focus on the interaction between teams. Every participant is given the same system (usually a server with a number of network-accessible services), and their task is to identify flaws in their own copy of the server, patch (if possible) their own services without breaking the service's functionality, and use the same knowledge to attack the other participants.

As proof of having been able to exploit an opponent's service, the goal of an attack is to grab a file or other data on the opponent's machine; this piece of data is referred to as a "flag" (and this is where the "capture the flag" label comes from). This type of exercise provides opportunities for exercising both attack and defense skills.

Even though many imagine these competitions as the domain of skilled hackers who turn to crime at the first opportunity, participants are, most of the time, very bright and skilled security enthusiasts who want to explore, in a fun and competitive setting, the world of security beyond the corporate domain. Therefore, CTF events are a great opportunity to hire new talent, and major corporations are already doing so, by sponsoring events or by sending representatives to spot the best security experts.

Cybersecurity competitions can also be used to train the cyber workforce. These competitions challenge the participants with problems that cover digital forensics, cryptography, binary analysis, web security, and many other fields.

As a result, participating in these events can help in honing and expanding the skill set of the security workforce. In addition, much of the benefit of participating in these competitions is the effort that goes into preparing for the competition itself.

Teams and individuals search for the best tools and test them for viability in different situations. It is therefore not surprising that CTF competitions are also used in academic settings, as a tool to train students. The competitive nature of these events pushes students well beyond the call of duty and result in an effective transfer of knowledge and skills.

Finally, these events are great for retaining the cybersecurity workforce. Working in security can be a repetitive, stressful, and sometimes thankless job. Nobody gets congratulated because "no one compromised our network today." Usually, the only time a security professional is contacted is when things go wrong, in a way similar to the role of a goalie in a soccer team.

It is therefore unsurprising that cybersecurity professionals experience burnout, and often they move to a different company in order to get a fresh start. Cybersecurity competitions allow cybersecurity professionals to have a team experience in a fun, engaging environment. By participating in security competitions as a team, cybersecurity professionals feel engaged and connected to their teammates, while, at the same time, training to operate as a functional unit under pressure.

I have experienced all this firsthand, having founded Shellphish, a hacking team that has been at more DEF CON CTF competitions than any other team (DEF CON CTF is the most well-known attack/defense CTF, happening every year as part of the DEF CON convention).

Students (who usually represent the vast majority of the team's participants) are always eager to participate in competitions in which they can showcase their skills, and spend a considerable amount of time training, working as teams and even coming up with innovative techniques that advance the state of the art in security.

However, one does not have to be a doctoral student in computer science to enter the world of cybersecurity competitions: There are many competitions for any skill level. Most competitions are listed on the site ctftime.org, and many websites provide challenges for every level of expertise that can be carried out at one's own pace.

So, game on!

Related Content:

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Dr. Giovanni Vigna leads technology innovation at Lastline. He has been researching and developing security technology for more than 20 years, working on malware analysis, web security, vulnerability assessment, and intrusion detection. He is a professor in the Department of ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
tdsan
50%
50%
tdsan,
User Rank: Ninja
7/19/2019 | 5:53:34 PM
Excellent commentary, this is good to know
this piece of data is referred to as a "flag" (and this is where the "capture the flag" label comes from."

I thought the flag came from a military exercise where the soldiers would devise methods to defeat the other teams in order to take the hill or the flag on the hill, thus the term "flag". If not, they use it as well.

Universities are doing this, the UMUC and UMBC is doing this as welll. I think one of them were the winners for a number of years (not sure) but this is something the universities are employing, I think this would build comradary in the work place and provide a measuring stick of what should be done in case of compromise.

Very good points.

Todd
mcafeeactivate10
50%
50%
mcafeeactivate10,
User Rank: Apprentice
7/22/2019 | 2:52:27 AM
Very useful information
It is always nice to get different kind of information from this website.
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
6 Small-Business Password Managers
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/8/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprise
Assessing Cybersecurity Risk in Today's Enterprise
Security leaders are struggling to understand their organizations risk exposure. While many are confident in their security strategies and processes, theyre also more concerned than ever about getting breached. Download this report today and get insights on how today's enterprises assess and perceive the risks they face in 2019!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-5271
PUBLISHED: 2019-11-12
Pacemaker before 1.1.6 configure script creates temporary files insecurely
CVE-2014-3599
PUBLISHED: 2019-11-12
HornetQ REST is vulnerable to XML External Entity due to insecure configuration of RestEasy
CVE-2014-7143
PUBLISHED: 2019-11-12
Python Twisted 14.0 trustRoot is not respected in HTTP client
CVE-2018-18819
PUBLISHED: 2019-11-12
A vulnerability in the web conference chat component of MiCollab, versions 7.3 PR6 (7.3.0.601) and earlier, and 8.0 (8.0.0.40) through 8.0 SP2 FP2 (8.0.2.202), and MiVoice Business Express versions 7.3 PR3 (7.3.1.302) and earlier, and 8.0 (8.0.0.40) through 8.0 SP2 FP1 (8.0.2.202), could allow creat...
CVE-2019-18658
PUBLISHED: 2019-11-12
In Helm 2.x before 2.15.2, commands that deal with loading a chart as a directory or packaging a chart provide an opportunity for a maliciously designed chart to include sensitive content such as /etc/passwd, or to execute a denial of service (DoS) via a special file such as /dev/urandom, via symlin...