GovWare Features
Cybersecurity Challenge Singapore

The Face-to-Face (F2F) competition segment of the Cybersecurity Challenge Singapore, co-organised by CSA and BAE Systems will be held on 19 September 2018 at the Singapore International Cyber Week (SICW). Top players from the Singapore Floor in CyPhinx will go through a series of real-life cyber incident response scenarios, where they will demonstrate their cybersecurity proficiencies to deal with the incident. The winners will walk away with attractive prizes such as an all-expenses paid trip to London to compete against UK players in the UK Masterclass, as well as other career enhancing prizes.

Competition Design
  1. The competition is a sequel from the online Cybersecurity competition qualifiers - CyPhinx. 30 selected contestants are invited to test their skills at the next level in the F2F competition.

  2. The contestants are to work together in groups of 3-4, taking on the role of security consultants to respond to a simulated cyber incident.

  3. Challenges are presented to the team sequentially in the form of a storyline – a concept similar to a gamebook. These challenges are designed to test individual participants’ technical skills as well as team work. Each team is to present their analysis findings to an interview panel and provide technical advice on mitigating any security breaches.
System Setup and Reading Materials
  1. Participants are to bring a laptop running on both Windows (e.g. Windows 7/Windows 8/Windows 10) and Linux operating systems (e.g. Ubuntu, Redhat, any UNIX-like) as some challenges are easier to handle in Windows environment and vice versa.
    The laptop will be connected to a Wired Ethernet network.

  2. A maximum of two laptops per participant are allowed.

  3. The challenges will include the following topics, but not limited to:
    1. End Point Forensics
      1. Registry key
      2. File-system
      3. Timestamp analysis
      4. Chain-of-custody
    2. Network analysis
      1. Knowledge of TCP/UDP
      2. Usage of Wireshark
    3. File analysis
      1. Reverse engineering (For EXE files and java files)
      2. Document Analysis
      3. Binary exploit
    4. Web application.
      1. Discovery of SQL injection
      2. Discovery of Client side attack
    5. Concepts in cyber security
Code of Conduct
  1. Participants are expected to behave professionally at all times.

  2. Participants will not tamper with, modify, or attempt to manipulate any element of the competition including scoring and management systems.

  3. Denial of Service (DoS) attacks are not allowed.

  4. Participants will not reboot, shutdown, or intentionally disable the services or functions of the target systems.

  5. Participants will not conduct any offensive actions to scan, attack, or interfere with another participant's system.

  6. Participants are to observe cybersecurity hygiene such as locking their laptops while unattended, and provide a password to any collaborating platform for team-work based discussion. Poor practices will result in deduction of points.

  7. Participants are to compete without "outside assistance" from non-participants.

  8. Participants may not publicly disclose information about the competition or targets including flags or their means of obtaining them without the written consent of the organiser.

  9. Participants understand that violation of this code of conduct or any of these rules is grounds for their immediate dismissal and disqualification from the competition, as well as removal from the competition area.
Internet Usage
  1. Internet resources such as company websites, FAQs, and existing forum responses may be used during competition provided there are no fees, membership, or special access required. Only resources that could reasonably be available to all participants are permitted.

  2. All network activity that takes place on the competition network may be logged and subject to release.
Permitted Materials
  1. Printed reference materials (books, magazines, checklists, etc.) are permitted.

  2. All competition materials, including equipment, hand-outs, and participant-generated reports and documents, must not be removed from the competition area unless specifically authorised. Personal materials brought into the competition area may only be removed after the conclusion of the competition.
Questions and Disputes
  1. Participants should work with the competition staff to resolve any questions regarding the rules of the competition or scoring methods before the start of the competition.

  2. Should any questions arise about scoring, the scoring engine, or how they function, participants should immediately contact the competition staff.

  3. Protests must be presented in writing to the competition staff as soon as possible. The competition officials are the final arbitrators for any protests or questions arising before, during, or after the competition. Rulings by the competition officials are final. All competition results are official and final as of the end of the competition.
Scoring
  1. Scores are given to completed challenges that are provided throughout the competition. Extra credits will be given if an individual is able to articulate how they complete the challenges.

  2. Scores are also given during the interview panel

    1. to evaluate the involvement of the individual and contributions to the team
    2. on providing sound and practical advice for security mitigations
    3. good presentation and explanation of the findings.

  3. Bonus points will be given for team work as well as correct cybersecurity practices. 

  4. Scores are maintained by the competition officials and may be shared at the end of the competition. Running totals may be provided during the competition.

  5. Attacking or otherwise interfering with the scoring system is strictly prohibited.