Cyber security challenge australia 2014

Page 1

6/12/2014

Cyber Security Challenge Australia - 2014

CySCA2014-in-a-Box CySCA2014-in-a-Box is a Virtual Machine that contains most of the challenges faced by players during CySCA2014. It allows players to complete challenges in their own time, to learn and develop their cyber security skills. The VM includes a static version of the scoring panel with all challenges, required files and flags.

 Download CySCA2014-in-a-Box (http://goo.gl/6ftZ39) Download size is 367M.

To use CySCA2014 in a box virtual machines, players will need to have either Oracle VirtualBox or VMWare Player installed on their machines. Additionally we recommend players have at least 4GB of RAM. If you have less RAM, you can reduce the amount of RAM available to the VM down to 512MB, however it may adversely affect the speed of some of the challenges. CAUTION: The VM contains software that is deliberately vulnerable. We advise that you do not attach it to a critical network. Consider using your virtualisation software's host‐ only network functionality.

Getting Started 1. 2. 3. 4.

Extract files from CySCA2014InABox.7z Navigate to the folder containing the extracted files Confirm that the checksums for the files match those in checksums.txt If you are using VirtualBox double click the CySCA2014InABox.vbox file. When you start the VM, you may be prompted that a "Centrino Advanced" adapter is not found. If this happens, click Change Network Settings and select the adapter that you would like the VM to bridge to. ‐ ‐ Or ‐ ‐ If you are using VMWare Player double click the CySCA2014InABox.vmx file. When you start the VM, you may be asked if the VM has been moved or copied. Select copied. 5. If DHCP is available on the network adapter you have selected the VM will request an IP address and you will be prompted with http://cyberchallenge.com.au/inabox.html

1/3


6/12/2014

Cyber Security Challenge Australia - 2014

the allocated IP. If no IP is specified you will need to set one before connecting. See instructions below. 6. Use your browser to connect to http://<VMip>/.

Setting a Static IP 1. Login to the VM using the username user and the password CYSCA2014user. 2. Use sudo and your favorite editor (vim and nano are installed) to edit /etc/network/interfaces to set a static IP. 3. Reboot the VM for your static IP to take effect. Then follow step 6 in Getting Started.

CySCA is supported by

(http://australia.gov.au/topics/it-and-communications/cyber-security)

(http://www.telstra.com)

(http://www.pwc.com.au/cyber)

http://cyberchallenge.com.au/inabox.html

2/3


6/12/2014

Cyber Security Challenge Australia - 2014

(http://www.nbnco.com.au)

(http://www.microsoft.com)

Follow @CySCAExCon (https://twitter.com/CySCAExCon) Follow @CySCA2014Game (https://twitter.com/CySCA2014Game) Š Telstra 2014 Webpage powered by Telstra Cloud Services (http://cloud.telstra.com) Privacy Statement (privacy.html)

http://cyberchallenge.com.au/inabox.html

3/3


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.