Exactly. :) That why I added that rule, so people could pull off tricks like
that.  Glad you spotted it.

Adrian

On Wed, Oct 6, 2010 at 7:24 PM, Dennis Lavrinenko <
[email protected]> wrote:

> 2. DoS and network routing/traffic attacks are allowed, even on the traffic
> coming to and from contestants and the scoring box.
>
> So, it would be possible to ARP poison the network and get points without
> having to deface anything?
>
> On Wed, Oct 6, 2010 at 9:50 AM, Adrian Crenshaw <[email protected]>wrote:
>
>> I've been put in charge of the war game for the Louisville Infosec
>> tomorrow, and decide to try out my Network King of the Hill idea for the
>> first time. Below is my plan, please give me comments and suggestions. If
>> things go well with the trial run we will be playing it at Hack3rcon also.
>> Should make for easier to run hacker war games once I figure out the kinks.
>>
>>
>>
>>
>> *Network King of the Hill
>> (NetKotH)*
>>
>> Adrian Crenshaw and Martin Bos are running a live hacking event on the top
>> floor. Go to the NetKotH area to register. The winner gets an iPod Touch.
>>
>> Scoring:
>>
>> 1. The teams will be given IPs to web servers with vulnerabilities to
>> attack, their goal is to deface the front page on each. Expect there to be a
>> Linux and a Windows box, and maybe some surprises. J The IPs for this
>> game are:
>>
>> 10.0.0.1           Linux
>> 10.0.0.2           Windows
>> 10.0.0.3           Wildcard
>>
>> Versions will be switching during the game.
>>
>> 2. Teams try to put up their own defacement, take down other people's
>> defacement, and lock down the box to keep others teams out. The teams name
>> must be in the <team></team> tag when they deface the site for the scoring
>> system to register it, but they can change the page however they like.
>>
>> 3. Once per minute (more or less) the scoring software will see who
>> currently owns the site, and score it.
>>
>> 4. Referees will work as a blue team to occasionally step in and change
>> things on the target IPs. Fix the defacement, patch, roll back changes,
>> switch Operating Systems, etc, just to even the playing field and make
>> things interesting.
>>
>> Rules:
>>
>> 1. Only penetrate the hosts at the given IPs, not the scoring box
>> (10.0.0.99) or other contestant's boxes.
>>
>> 2. DoS and network routing/traffic attacks are allowed, even on the
>> traffic coming to and from contestants and the scoring box.
>>
>> 3. Stay on the NetKotH network while attacking.
>>
>> 4. Martin and Adrian may change other rules at will.
>>
>> You may view the current scores by surfing to 10.0.0.99.
>>
>>
>> _______________________________________________
>> Pauldotcom mailing list
>> [email protected]
>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>> Main Web Site: http://pauldotcom.com
>>
>
>
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
>
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to