#IICSG2018

ICS/SCADA CAPTURE-THE-FLAG (CTF) COMPETITION

Sponsored By:

REGISTRATION

The ICS/SCADA CTF competition is open to all conference ticketholders to play, enjoy and compete.

Participants simply have to register at the NSHC booth located in the Exhibition Foyer. 

 

GAMEPLAY

There are altogether 6 scenarios, each with its own set of challenges and scores. 

The scenarios and challenges are based on real ICS/SCADA simulations using real ICS/SCADA components. 

 

There are more than 50 challenges — Providing an enjoyable and unforgettable experience for both Beginners and Experts. 

 

SCENARIOS

  1. Malware/Forensics

    • An Operator's Workstation

    • Windows System

    • Email Attachment

  2. IoT/Web Vulnerability Forensics 

    • Wireless LAN (WLAN)

    • No Access Control

  3. Bypass Airgap/Network/Cryptosystem

    • Windows System

    • Default Installation 

    • No Internet Access

  4. Bypass Airgap/HMI

    • Windows System 

    • PLC Developer's Workstation

    • USB Block

    • Only Mouse & Keyboard

  5. ICS Vulnerability in PLC

    • PLC Software/Firmware

    • 0-day

  6. ICS Infrastructure/Real-World

    • Simulation

    • Railway

    • Smart Grid

 

CHALLENGE CATEGORIES

Each challenge may span across various challenge categories. 

 

  1. Bypass Airgap

    • Industrial WiFi Hacking

    • Industrial Bluetooth

    • Radio Frequency (RF) Hacking

    • USB-based Microcontroller

    • Default Network-based Attack

  2. ICS Protocol

    • IEC 60870-5-101 or 104, IEC 61850, DNP3

    • Modbus

    • Incident Response for Security Operations Centre (SOC)

  3. PLC & HMI 

    • Well-known vulnerabilities

    • Password Cracking

    • 0-day Vulnerabilities (Discovered by NSHC Red Alert Team)

    • Control PLC, HMI

  4. Forensics 

    • Networking — Industrial Network Capture

    • Documents

  5. Misc. 

    • Shodan & IoT Manipulation 

    • ZoomEye Search for SCADA Equipment 

    • OSINT for Critical Infrastructure

    • Trivia

  6. Critical Infrastructure Security

    • Water Treatment System Hacking

    • Smart Grid & Meter Hacking

    • Railway System Hacking

    • Energy Power Plant System Hacking

Infosec in the City. Copyright © 2017-2019
IIC Productions (Pte. Ltd.). All rights reserved.

  • @infoseccity
  • @infosec_city

Contact Us  |  Join Our Mailing List   |  Follow Us :