Type: Single Player
Player Count: 250
Game will be played: Monday 27th to Wednesday 29th August 2012
Registration is now closed
This Sophos challenge was designed last year in response to candidate demand but many found it difficult so we are reviewing the first year and may decide to slightly modify this competition for 2012/13. Any modifications made to the game will be advised to those registered to play in advance of the playing date.
Designed to test your knowledge of malicious code and circumvention on Linux systems. In the real world, an astonishingly large percentage of malicious code is distributed from systems running the LAMP. Attacks against these systems (whilst not comparable to widespread threats like Conficker) are common place as they often are the most trusted, or contain the most sensitive data in the enterprise. This challenge is designed to test your sleuthing skills to identify what is wrong with a system, how it has been compromised, with what and as much as possible why? In addition to detecting the changes made by the bad Guys. You will need to make recommendations as to how to prevent such problems in the future - completing the full incident management lifecycle. You will need to be familiar with Linux operating systems configuration as well as typical daemons configured on this platform. A range of tools will be provided, but you are able to use your own for analysis. The competition will be timed and will test your skills of prioritisation and intuition to find the bad and keep the cyber criminals at bay.
This registration is for Round 1 of the “Investigate & Understand” Stream. Successful candidates from this stream of activity will qualify for entry to the Sophos Face to Face Malware Final.
THE FIRST 4000 PEOPLE TO SEND IN A COMPETITION RETURN, WHO SCORE SOME POINTS, WILL RECEIVE A VIRTUAL TRAINING PROGRAMME FROM INFOSEC SKILLS – SO DON’T GIVE UP EVEN IF YOU THINK YOUR RETURN IS NOT GOOD ENOUGH TO WIN.