Gianluca Canitano
Development of framework for Attack/Defense Capture the Flag competition.
Rel. Antonio Lioy. Politecnico di Torino, Corso di laurea magistrale in Ingegneria Informatica (Computer Engineering), 2022
|
PDF (Tesi_di_laurea)
- Tesi
Licenza: Creative Commons Attribution Non-commercial No Derivatives. Download (1MB) | Preview |
Abstract: |
Nowdays cybersecurity is a very important field, thanks to global spread of Internet and smart devices, demand for cybersecurity expert is continuously growing, so computer security education has become a priority. Together with security courses, security competitions are a very important tool which can be used for educational purposes. Capture the Flag (CTF) competitions are most popular type of security competitions, because playing them contestants, grouped in teams, can improve their teamwork, and can apply, test and demonstrate practically their skills and theoretical knowledge learned in security courses, by solving challenges and/or exploiting vulnerabilities. In particular, in Attack/Defense CTF, contestants have to interact and challenge each other, by exploiting services of other teams while they are patching their own services, focusing on both attack and defense and developing offensive and defensive skills. These competitions usually involve a lot of teams, so is not easy to implement an architecture that could be used to host them. Purpose of this thesis is to describe framework that can be used to host an Attack/Defense CTF that I have implemented, and some vulnerable services I have already inserted that could be used for a real Attack/Defense CTF competition. |
---|---|
Relatori: | Antonio Lioy |
Anno accademico: | 2021/22 |
Tipo di pubblicazione: | Elettronica |
Numero di pagine: | 45 |
Soggetti: | |
Corso di laurea: | Corso di laurea magistrale in Ingegneria Informatica (Computer Engineering) |
Classe di laurea: | Nuovo ordinamento > Laurea magistrale > LM-32 - INGEGNERIA INFORMATICA |
Ente in cotutela: | INSTITUT EURECOM (FRANCIA) |
Aziende collaboratrici: | Fortinet |
URI: | http://webthesis.biblio.polito.it/id/eprint/23430 |
Modifica (riservato agli operatori) |