The third Sichuan Province Information security technology Competition Small note

Source: Internet
Author: User

After a few days of the game, come back and rest after the other busy, in general, or more relaxed. But the rest of the back is a variety of egg-ache exams, Dad AH ~ ~ ~ ~
Originally wanted to wait for the topic are sorted out again hair, although the theoretical problems we have a backup, but the other topics have not been published, and a lot of the pot pot have done a summary ~ ~
////////////////////////////////

Date: May 21 am–3:30 pm
Location: Chengdu Institute of Information Engineering
Participants: (Swust Team1) Wuyuan zsens Bird

(Swust Team2) dllk Magicyoung Lodevil

39 Other college teams (117 people)

Competition Profile:

Computer-owned, tool-owned.

The topic is provided by the Green Alliance technology altogether 200 points

1. Theoretical Questions 50 points

It's all about the range of choice questions.

Sniffer-principle

Scanning-Principle

-des Principle of cipher algorithm

Firewalls-Concepts, configuration

Reverse engineering-Added shelling application

Buffer Overflow-principle

Denial of Service attacks-syn attacks, Smurf attacks, Pingflood, teardrop, land attacks, and other principles

Malicious code-Trojan horse, virus, worm, webpage malicious code and other principles, features, etc.

SQL injection-Application

Principles of Network spoofing-IP address spoofing

Log cleanup-windows, Linux

Operating system vulnerability-windows, Linux

Operating system security policy configuration-windows, Linux

Network device attack and security configuration-routers, switches, etc.

Common DOS commands-ping, nslookup, tracert, etc.

2. On-line practical questions 50 points

Mainly divided into 6 categories to submit key questions online

Basic basic

Web Security

OS operating system

Crack hack

Overflow overflow

Program programming

3. Seepage problem 100 points

Gold, silver, copper three servers


Bronze Server environment:

os:windows2003

Web Server:iis 6.0

Database:sql Server 2000

Web program: hishop5.1
Silver Server Environment:

os:windows2003

Web Server:apache 2.x

Database:mysql

Web Program: Korea xpressengine

Gold Server Environment:

Os:debian
————————————————-
The following by Wuyuan

Personally I can and from the province and outside a total of 41 teams of experts in the game I feel very honored, both see the strengths of others, to find their own shortcomings, but also let me have a deeper understanding of information security.

The

Tournament flow is as follows:
9:00–9:30 sign In, change clothes, debug the network
9:30–11:30 theoretical questions and online answers are open at the same time (the server problem is not open) (Can not sisu)
Our team to do the theoretical problem of the method is done by the Zsens Linux related problems , the rest is for me to do, to differentiate (certainly right, to be sure, to have doubts, not to), to be bird and questionable questions. Finally after a round of total submitted together, the submission time is about 11 points, at the same time to apply for the opening of the external network. Theoretical questions can only be submitted once and cannot be modified. Theoretical problems are not imagined difficult, 1 points, the basic problem is mostly, occasionally a few to not. The topic is similar to the Internet Security exam question, it is suggested that the students who prepare for the theory should take some time to find out the problems on the net. Overall, our team has done a good job of theoretical problems.
Cross-border problem we take the method is to follow the previously prepared group to find their own will do, how much can be counted. Cross-border score according to the difficulty of the problem to set 1-5 points, it is tragic that our team is not ready enough, a round down only to complete a few points for the title of 1, the proportion of the problem score is too little. Cross-border problem of the big head in reverse crack, Shellcode, recommended after the students to prepare for the reverse, Shellcode aspects, but also focus on the knowledge of the database.
11:30–14:00 Open Bronze Server
Our group is mainly responsible for the topic by Zsnes, the cup is only to get Webshell, did not succeed in the right to take down the bronze server only a small problem (a total of three questions). The silver medal and the gold question were too tricky to give up after temptation. Recommended later students usually participate in penetration testing activities to accumulate experience.
14:00–15:30 Gold and Silver Copper Server open
The race process is more orderly than the previous races, the speed of the network has been greatly improved, the wireless number before the preparation is not useful (ready or necessary).

Found game loophole: Although the use of communication tools is prohibited in the game, but can be used in the playing field
Noon meal to take is a batch meal, a school team certainly not in the same batch, after this time difference, the team and the team can communicate with each other.

For information security professional teaching arrangements, level 08 should be said to be a failure.
Freshman in confusion spent, sophomore most of the time is digital logic, electronic circuit, university physics such class to occupy, junior began to gather credits. The curriculum arrangement on the training programme is not very reasonable.
Information Security Professional Advice course schedule:
Freshman: C and data structure (preferably one year) computer network (learning This course to the network has a whole understanding)
Sophomore: compilation (compulsory), cryptography, Database sophomore: Anti-virus (compulsory), cyber security
Always keep the things that you focus on.
I wish the students in the future to achieve good results.
——————————————————————–

Following by Crackerban, Zsens
Theoretical answer
Process:
First Test the net at the entry point in the morning. Then you can unify the topic answer question. At the beginning of the general view of the theoretical problem, the feeling involved in a wide range of, our theoretical preparation is not too full. Next we work on a theoretical problem. Bird do the programming direction, and I do is the Linux direction of the problem, Wuyuan is to do the network and other aspects of the topic. About 30 points before the theoretical question server, we collected the answers to the theoretical questions, and the 3 people in question were discussing them and finally came to an answer.
Summarize:
Theoretical problems have a wide range, including encryption and decryption, network, Linux, Shell shelling, scripting and shellcode and so on 、、、、、、 which is not very comprehensive preparation, especially programming, reverse this direction, shellcode these aspects.

Penetration Answer
Process:
Our group in the afternoon of infiltration problems, because we 3 people think the theoretical problem is the focus. They 2 people to do the front of the theoretical problem, I looked at the morning of the Infiltration server silver medal, is hishop5.1, that there is an editor loophole, Webshell easy to get!!
I prepared from the source of the analysis of the path to the big horse, and then smoothly get Webshell, in the root directory of the site to get key1. Look at Key2 in the C drive directory but no right to access. There is no way to mention the right, but I was there for about 10 minutes, the network from time to break off, a variety of normal right after the trial finally failed to mention the right to succeed, feel a bit difficult!!! After waiting for a few Zhong Ti right did not succeed, I gave up!!! In a look at the Silver Machine, a Korean site!! Probably looked under, did not start point, again saw not a team took the Webshell, directly gave up!!! Gold-medal Linux has looked at the next no consideration (usually did not get the Linux of the Mulberry do AH)!!!

Summarize:
The bronze medal failed to win, too bad!!! There are many ways to raise the right, but they usually more to get Webshell, to mention the right to too much food!!! The direct result loses 15 points, oneself down feeling too should not!!! So the right to mention must be a focus to train themselves!!!

Suggestions:
More attention to the programming direction of theoretical problems
More attention to the right of Webshell in seepage problem

——————————————————————-

Following by Crackerban, Bird
This game saw a lot of masters, I focus on this preparation of the deficiencies and the occurrence of the situation:
The first is pre-match preparation, we think that the preparation of things enough, including a variety of tools (a dark group of tools, tools are not used to complete), but other materials are not very well prepared, so in the theoretical answer to write a small trouble, the proposal to participate in the game after the students to take the theoretical questions, you can bring more books.

But I think the way we answer the theoretical questions can be used for reference, in charge of the students to do theoretical problems as soon as possible, encountered a controversial write down, a classmate is responsible for checking all kinds of information, if there is time, the rest of the students can probably understand the following what types of questions, when the theoretical problem is not found the answer, We discuss, determine the most probable answer, write down the answer to the theoretical question and then submit it.

To our group This online answer encountered a lot of trouble, can be said to be a "tragedy", online answer the last few are gold and silver bronze machine, generally can let the students responsible for infiltration, bronze machine take down the possibility of relatively large, we only get one, and then the most important is the reverse engineering problem, General other online answer scores are 1 points, and three reverse cracked 13 points, the score is quite high, because our group reverse is very weak, and more to reverse the sub-can not get, the group has no adverse strongman on the cup.

To reasonably arrange the answer time, some problems are troublesome and the score is not high, it is recommended not to touch easily.

There is a small experience, the online answer will show how much of the problem is done, so we will choose some high-hit problem first answer, after all, we all take the points we also want to take, and take such a point will not be difficult.

These are basically the situation in the game, but pre-match preparation is the most important, and the theoretical problem is the top priority, personally think the second is the knowledge of reverse engineering.

I wish my classmates a good result in the next competition.
—————————————————————-

The third Sichuan Province Information security technology Competition Small note

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.