{"id":82805,"date":"2018-07-18T13:00:56","date_gmt":"2018-07-18T20:00:56","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=82805"},"modified":"2019-01-31T13:10:07","modified_gmt":"2019-01-31T21:10:07","slug":"build-cyber-skills-heres-host-successful-capture-flag-event","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2018\/07\/build-cyber-skills-heres-host-successful-capture-flag-event\/","title":{"rendered":"Build Those Cyber Skills: Here\u2019s How to Host a Successful Capture the Flag Event"},"content":{"rendered":"<p>Experience matters when it comes to stopping contemporary cybercriminals. This advice might sound straightforward, but the real question is, \u201cHow?\u201d How exactly do cybersecurity professionals and those new to the field get this kind of experience?<\/p>\n<p>Learning to think like a hacker includes having hands-on experience \u2013 learning to do what hackers do, and using the tools and tactics they use. That provides valuable on-the-ground intelligence on how to best prevent cybersecurity breaches.<\/p>\n<p>This type of hands-on experience is not part of most traditional computer science programs. However, one activity many organizations find successful is to hold capture the flag events on a regular basis for students, employees and others who may be interested. If done right, CTF events can be highly interactive sessions for participants to build a rapid understanding of how security works, and how they can stop hackers from exploiting vulnerabilities in their own environments.<\/p>\n<p>Ask any member of a Red Team \u2013 the \u201cwhite hat\u201d hackers who take on the challenge of using their hacker mindset on a daily basis to stay several steps ahead of the bad guys \u2013 and that person will recommend participating in capture the flag events.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"600\"><span class=\"ar-custom\" style=\"padding-bottom:61.83%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-82808 alignnone lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/CTF_1.png\" alt=\"CTF_1\" width=\"600\" height=\"371\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/CTF_1.png 750w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/CTF_1-230x142.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/CTF_1-500x309.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/CTF_1-485x300.png 485w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/CTF_1-65x40.png 65w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/span><\/div><\/p>\n<p><em>Palo Alto Networks hosted \u201cAcademy Day\u201d in our Amsterdam office. Over 40 students from universities in six different countries participated in a CTF event. <\/em><em><a href=\"https:\/\/youtu.be\/oo3iRucJlyQ\" rel=\"nofollow,noopener\" >Watch highlights from the event<\/a><\/em><em>.<\/em><\/p>\n<p><div class=\"styleIt\" style=\"width:560px;height:315px;\"><lite-youtube videoid=\"oo3iRucJlyQ\" ><\/lite-youtube><\/div><\/p>\n<p><strong>What\u2019s Behind Hosting a Successful Capture the Flag Event?<\/strong><\/p>\n<p>While hosting a capture the flag event requires resources and planning, the benefits of having a more security-minded workforce \u2013 and being able to introduce students and others to the fast-growing field of cybersecurity\u2014are well-worth it. What follows are some important factors to consider when hosting a successful CTF event.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><strong>Determine the Challenge<\/strong><\/strong><\/p>\n<ul>\n<li>It\u2019s rare that organizations have the internal resources to dedicate to creating a capture the flag activity, such as a web app where participants can learn offensive and defensive tactics. As an alternative, there are some free challenges out there, but it\u2019s best to seek out experienced vendors with a range of tested solutions that will work for different audiences.<\/li>\n<li>The level of difficulty of the challenge should range from common vulnerabilities, such as SQL injection and cross-site scripting, or XSS, to more advanced cryptanalysis and cipher-cracking challenges. Don\u2019t forget to embed vulnerabilities that reflect common business process pitfalls, such as weak password policies.<\/li>\n<li>It is important that the target chosen for the CTF reflects real-world scenarios as closely as possible.<\/li>\n<li>There is often confusion about the differences between capture the flag challenges and \u201chackathons.\u201d Hackathons require more foundational coding and developer skills, usually to build something from scratch, while CTF challenges focus on detecting and exploiting vulnerabilities. Making this distinction clear to participants will help to set expectations about the skill level required.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong><strong>Build in Learning Resources<\/strong><\/strong><\/p>\n<ul>\n<li>Effectively managing the balancing act of competition vs. education is important to the effectiveness of a CTF event.<\/li>\n<li>Provide participants with cheat sheets or online resources prior to the event for those who want to get warmed up.<\/li>\n<li>Offer participants a chance to team up with others, especially if there are different backgrounds and skill levels. If there\u2019s an opportunity to host an event for students or a mix of employees and students, you\u2019ll see the level of learning is high!<\/li>\n<li>At the event, schedule learning labs that are 15- or 30-minutes long to provide a deeper dive into topics of interest.<\/li>\n<li>Employ a scoring strategy that\u2019ll tie the team score to the number of team members who have solved each challenge, thus ensuring collaboration within the team.<\/li>\n<li>Recruit experts, such as your information security team, to participate as mentors at the event. Their own real-life stories and insights can prove to be valuable to the participants.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong><strong>Make the Event Fun and Memorable<\/strong><\/strong><\/p>\n<ul>\n<li>Having at least one core team member with strong events planning expertise or hiring an events planner to ensure logistics run smoothly is highly recommended. Because capture the flag events are usually one or two days long, think through the details of how to handle signing in, meals and breaks, and other logistics.<\/li>\n<li>Find a venue that will comfortably accommodate the number of expected participants. Be sure screens \u2013 particularly the scoreboard \u2013 and audio systems are set up and tested from several vantage points.<\/li>\n<li>Use the capture the flag event as an opportunity to build brand awareness by centering giveaways, prizes and d\u00e9cor on a company or common theme.<\/li>\n<li>Go one step further to uplevel the event by inviting executives and other guests to speak or just check out what CTF events are all about and how much value they can add. This additional context can reinforce the significance of a culture of learning and security for the participants.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><div style=\"max-width:100%\" data-width=\"600\"><span class=\"ar-custom\" style=\"padding-bottom:88%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-82847 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/CTF_2.png\" alt=\"CTF_2\" width=\"600\" height=\"528\" \/><\/span><\/div><\/p>\n<p><em>At a Palo Alto Networks-hosted CTF event held in Santa Clara, California, participants were a good mix of employees, interns and students. One participant said, \u201cThis was an amazing experience. I have learned more than [in] any classroom. Such a great way to build community too!\u201d Another added, \u201cTo be honest, half of the challenges were really surprising to me because I never would have thought of so many potential vulnerabilities in a site.\u201d <a href=\"https:\/\/youtu.be\/4BzynePjMpQ\" rel=\"nofollow,noopener\" >Watch highlights from the 2017 event<\/a>. <\/em><\/p>\n<p><div class=\"styleIt\" style=\"width:560px;height:315px;\"><lite-youtube videoid=\"4BzynePjMpQ\" ><\/lite-youtube><\/div><\/p>\n<p>&nbsp;<\/p>\n<p><div class=\"styleIt\" style=\"width:560px;height:315px;\"><lite-youtube videoid=\"QAX7sNVqPj0\" ><\/lite-youtube><\/div><\/p>\n<p>&nbsp;<\/p>\n<p><div style=\"max-width:100%\" data-width=\"600\"><span class=\"ar-custom\" style=\"padding-bottom:53.33%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-83003 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/final-CTF.jpg\" alt=\"final CTF\" width=\"600\" height=\"320\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/final-CTF.jpg 1100w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/final-CTF-230x123.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/final-CTF-768x409.jpg 768w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/final-CTF-500x266.jpg 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/final-CTF-510x272.jpg 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/final-CTF-75x40.jpg 75w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/final-CTF-563x300.jpg 563w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/span><\/div><\/p>\n<p><em>Palo Alto Networks interns learn and have fun at the capture the flag event hosted by the Information Security team. <a href=\"https:\/\/youtu.be\/QAX7sNVqPj0\" rel=\"nofollow,noopener\" >Watch highlights from the 2018 event<\/a>. Comments from participants include:<\/em><\/p>\n<ul>\n<li><em>\u201cA great way to learn about offensive security.\"<\/em><\/li>\n<li><em>\u201cIt was really fun, and I learned a lot. It's like an escape room, but you don't need to move from your chair.\"<\/em><\/li>\n<li><em>\u201cI like being on a team with a variety of skills.\u201d<\/em><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Build those cybersecurity skills: Rinki Sethi shares the secret behind hosting a successful capture the flag event. <\/p>\n","protected":false},"author":327,"featured_media":82847,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6719,155,133],"tags":[2644,2145],"coauthors":[3393],"class_list":["post-82805","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company-culture","category-cybersecurity-2","category-events","tag-capture-the-flag","tag-ctf"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/07\/CTF_2-e1531860349931.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/82805","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/327"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=82805"}],"version-history":[{"count":9,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/82805\/revisions"}],"predecessor-version":[{"id":83414,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/82805\/revisions\/83414"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/82847"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=82805"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=82805"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=82805"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=82805"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}