Loading...
7th Singapore Cyber Conquest
Competition Design
System Setup and Reading Materials
Code of Conduct
Internet Usage
Permitted Materials
Questions and Disputes
Scoring
Contact Info
Competition Design
Competition Design
  1. The competition is a computer and network security challenge that is designed to test the participants’ skills and wit in a cyber range.

  2. Participants will require a broad range of computer and network security skills. Two participants are required to form a team to take part and complete the competition. The competition is designed with ascending level of difficulty. Participants will be required to resolve a challenge before graduating to the next level. Skilful players may graduate faster through the levels. The team that achieves the highest score (refer to Scoring) will be declared as the winning team. If more than one team has the same top score, the team who clocks in that score in the fastest time will be the winner. Any other team with the same top score with have their placings determined in a similar way based on the clock-in timing of their score.
System Setup and Reading Materials
System Setup and Reading Materials
  • Participants must bring a laptop capable of
    • running a VMware virtual machine
    • with a DVD drive and
    • connecting to an Ethernet network. Each participant is allowed to bring up to two laptops.

  • Virtualization recommendations for laptop:
    • Participants will be required to open an .OVA file on a DVD provided.
    • Participants using Microsoft Windows (7 or later) as the host operating system, may choose to download the latest version of the free VMware Player software or bring the latest version of VMware Workstation (9.x or later).
    • Participants using Apple OSX as the host operating system should download and install the latest version of VMware Fusion.
    • VirtualBox is generally not recommended.

  • All tools and their respective README files needed to solve the challenges will be provided. Participants will also be allowed to use their own tools.

  • The competition will cover the following topics:
    • Vulnerability Assessment
    • Packet Analysis
    • Penetration Testing
    • System Hardening
    • Malware Analysis
    • Digital Forensics and Incident Response
Code of Conduct
Code of Conduct
  1. Participants are expected to behave professionally at all times.

  2. Participants will not tamper with, modify, or attempt to manipulate any element of the competition including scoring and management systems.

  3. Denial of Service (DoS) attacks are not allowed.

  4. Participants will not reboot, shutdown, or intentionally disable the services or functions of the target systems.

  5. Participants will not conduct any offensive actions that scan, attack, or interfere with another participant's system, unless stated otherwise.

  6. Participants will not enter another participant's workspace, nor attempt to deceive, hoax, or assist other participants by any means.

  7. Participants must compete without "outside assistance" from non-participants.

  8. Participants must not publicly disclose information about the competition or targets including flags or their means of obtaining them without the express written consent of the organiser.

  9. Removal of unauthorised materials (refer to Permitted Materials) from the competition area is prohibited.

  10. Participants who violate any part of this code of conduct or of these rules will warrant their immediate dismissal and disqualification from the competition, as well as removal from the competition area. Judges’ decision is final and no appeal will be entertained.
Internet Usage
Internet Usage
  1. Internet resources such as company websites, FAQs, and existing forum responses may be used during competition provided there are no fees, membership, or special access required. Only resources that could reasonably be available to all participants are permitted.

  2. All network activity that takes place on the competition network may be logged and subject to release.
Permitted Materials
Permitted Materials
  1. Each team may not connect more than two (2) laptop or notebook computers to the competition network unless specifically authorized to do so.

  2. Printed reference materials (books, magazines, checklists, etc.) are permitted.

  3. All competition materials, including equipment, hand-outs, and participant-generated reports and documents, must remain in the competition area unless specifically authorized. Only materials brought into the competition area may be removed after the competition concludes. When in doubt, participants may approach any of the judges or competition officials before removing any material from the competition area.
Questions and Disputes
Questions and Disputes
  1. Participants should work with the competition staff to resolve any questions regarding the rules of the competition or scoring methods before the competition begins.

  2. Should any questions arise about scoring, the scoring engine, or how they function, participants should immediately contact the competition staff.

  3. Objections must be submitted in writing to the competition staff before the end of competition. The competition officials are the final arbitrators for any protests or questions arising before, during, or after the competition. Rulings by the competition officials are final. All competition results are official and final as of the end of the competition.
Scoring
Scoring
  1. Scoring is based on completing tasks that are provided throughout the competition. Participants accumulate points by successfully obtaining flags and entering them into the scoring system.

  2. Scores are maintained by the competition officials and may be shared at the end of the competition. Running totals may be provided during the competition. Rankings for some portion of the top participants may be provided during the competition.

  3. Attacking or otherwise interfering with the scoring system is specifically prohibited.

  4. Scoring will be publicly displayed on a near-real time basis for all teams to see.
Contact Info