GovWare Features
Singapore Cyber Conquest

The Singapore Cyber Conquest is a highlight of GovWare, open only to students of Institutes of Higher Learning (IHL) to challenge their cyber security capabilities in a near real-world cyber range. Participants will race against time to complete a diverse range of cybersecurity challenges that will put their cybersecurity skills and knowledge to the ultimate test.

Competition Design
  1. The  competition  is a computer  and network security challenge designed  to test  a participant's experience and skills in a safe environment.

  2. It is accessible to a broad level of player skill ranges and is split into separate levels so that  advanced players may quickly move through earlier levels to the level of their expertise.
System Setup and Reading Materials
  1. Participants are to bring a laptop running both Windows (e.g. Windows 7/Windows 8/Windows 10) and Linux operating systems (e.g. Ubuntu, Redhat, any UNIX-like) as some challenges are easier to deal with in Windows environment and vice versa. The laptop would be connecting to a Wired Ethernet network.

  2. A maximum of two laptops per participant is allowed.

  3. All tools and their respective README files needed  to solve the challenges will be provided. Participants will also be allowed to use their own tools.

  4. The challenges will cover topics like:
    1. Exploitation
      1. Exploit development for heap overflow, stack overflow, etc.
      2. Bypassing mitigation techniques such as StackGuard, Address Space Layout Randomization (ASLR), and RELRO
    2. Web security
      1. OWASP Top 10
      2. Advanced penetration testing
      3. Reconnaissance
    3. Reverse engineering
      1. Disassembling  / decompiling
      2. Unpacking  / anti anti-debug / de-obfuscation
    4. Cryptography
      1. Classical cipher
      2. Symmetric-key algorithm
      3. Public-key cryptography
      4. Digital signature
    5. Misc.
      1. Packet analysis, memory forensics, disk recovery
      2. Other basic cybersecurity skills
Code of Conduct
  1. Participants are expected to behave professionally at all times.

  2. Participants will not tamper  with, modify, or attempt  to manipulate any element of the competition including scoring and management  systems.

  3. Denial of Service (DoS) attacks are not allowed.

  4. Participants  will  not  reboot,  shutdown,  or  intentionally  disable  the  services  or functions of the target systems.

  5. Participants will not conduct any offensive actions that scan, attack, or interfere with another participant's system, unless stated otherwise.

  6. Participants will not enter another  participant's workspace, nor attempt  to deceive, hoax, or assist other participants by any means.

  7. Participants must compete without "outside assistance" from non-participants.

  8. Participants may not publicly disclose information about the competition or targets including flags or their means of obtaining them without the express written consent of the organiser.

  9. Participants  understand  that  violation of this  code of conduct or of these  rules  is grounds for their immediate dismissal and disqualification from the competition, as well as removal from the competition area.
Internet Usage
  1. Internet resources such as company websites, FAQs, and existing forum responses may be used during competition provided there are no fees, membership, or special access required. Only resources that could reasonably be available to all participants are permitted.

  2. All network activity that takes place on the competition network may be logged and subject to release.
Permitted Materials
  1. Printed reference materials (books, magazines, checklists, etc.) are permitted.

  2. All competition materials, including equipment, hand-outs, and participant-generated reports and documents, must remain in the competition area unless specifically authorized. Only materials brought into the competition area may be removed after the competition concludes.
Questions and Disputes
  1. Participants should work with the competition staff to resolve any questions regarding the rules of the competition or scoring methods before the competition begins.

  2. Should any questions arise about scoring, the scoring engine, or how they function, participants should immediately contact the competition staff.

  3. Protests must be presented in writing to the competition staff as soon as possible. The competition officials are the final arbitrators for any protests or questions arising before, during, or after the competition. Rulings by the competition officials are final. All competition results are official and final as of the end of the competition.
  1. Scoring is based on completing tasks that are provided throughout  the competition.
    Participants accumulate points by successfully obtaining flags and entering them into the scoring system.

  2. Scores are maintained by the competition officials and may be shared at the end of the competition. Running totals may be provided during the competition. Rankings for some portion of the top participants may be provided during the competition.

  3. Attacking or otherwise interfering with the scoring system is strictly prohibited.

  4. Scoring will be publicly displayed on a near-real time basis for all teams to see.

You may wish to express your interest by writing in to [email protected].