当前位置:网站首页>Official competition volume and "answer" of "Cyberspace Security" of secondary vocational group in 2019 national vocational college skills competition

Official competition volume and "answer" of "Cyberspace Security" of secondary vocational group in 2019 national vocational college skills competition

2022-06-22 03:42:00 Wangzai sec

2019 The secondary vocational group of the national vocational college skills competition

Cyberspace Security ” Official competition volume

The environment needs to be able to confide in bloggers , The answer is at the end of the article

One 、 Competition stage

Competition stage

Mission phase

Competition mission

Competition time

The score is

The first stage

Individual mode system penetration test

Mission 1

Wireshark Packet analysis

100 minute

100

Mission 2

File upload penetration test

100

Mission 3

Web Penetration test

100

Mission 4

Windows Operating system penetration test

100

Mission 5

Linux Operating system penetration test

100

Mission 6

Network protocol stack penetration test

100

Mission 7

Comprehensive penetration test and safety reinforcement of the system

100

Preparation stage

Preparations for offensive and defensive confrontation

20 minute

0

The second stage

Group confrontation

System reinforcement :15 minute

60 minute

300

Penetration test :45 minute

Two 、 Topology

PC Machine environment :

The physical machine :Windows7;

virtual machine 1:Ubuntu Linux 32bit( user name :root; password :123456), Install toolset :Backtrack5, Installation development environment :Python3;

virtual machine 2:Kali1.0( user name :root; password :toor);

virtual machine 3:Kali2.0( user name :root; password :toor);

virtual machine 4:WindowsXP( user name :administrator; password :123456).

3、 ... and 、 Competition assignment

( One ) Phase I mission statement (700 branch )

Mission 1. Wireshark Packet analysis (100 branch )

Mission environment description :

  • Server scenario :PYsystem20191
  • Server scenario operating system :Windows( Version unknown )

1. Use Wireshark View and analyze PYsystem20191 Under the desktop capture4.pcap Package file , Find out the information obtained by hackers that can successfully log in to the target server FTP Account password of , And take the account and password obtained by the hacker as Flag value ( The user name and password are separated by English commas , for example :root,toor) Submit ;(9 branch )

2. Continue analyzing packets capture4.pcap, Find out that the hacker logs in with the obtained account and password FTP Time for , And log the hacker in FTP Time for Flag value ( for example :14:22:08) Submit ;(13 branch )

3. Continue analyzing packets capture4.pcap, Find the hacker connection FTP Obtained from the server FTP Service version number , And will get FTP The service version number is used as Flag Value submission ;(15 branch )

4. Continue analyzing packets capture4.pcap, Find out that the hacker successfully logged in FTP The first command executed after the server , And take the executed command as Flag Value submission ;(11 branch )

5. Continue analyzing packets capture4.pcap, Find out that the hacker successfully logged in FTP Key files downloaded after the server , And take the name of the downloaded file as Flag Value submission ;(13 branch )

6. Continue analyzing packets capture4.pcap, Find out the hacker brutally crack the target server Telnet Service and successfully obtain the user name and password , Get the user name and password of Flag value ( The user name and password are separated by English commas , for example :root,toor) Submit ;(9 branch )

7. Continue analyzing packets capture4.pcap, Find out the files added by the hacker under the root directory of the server website , And take the file name of the file as Flag Value submission ;(13 branch )

8. Continue analyzing packets capture4.pcap, Find out the users added by hackers in the server system , And take the added user name and password as Flag value ( The user name and password are separated by English commas , for example :root,toor) Submit .(17 branch )

Mission 2. File upload penetration test (100 branch )

Mission environment description :

  • Server scenario :PYsystem20191
  • Server scenario operating system :Windows( Version unknown )

1. Via local PC Medium penetration test platform Kali2.0 For the server scenario PYsystem20191 Conduct website directory violence enumeration test ( Using tools DirBuster, Scan server 80 port ), Choose to use dictionary ( Use the default dictionary directory-list-2.3-medium.txt) The way to crack , And set the variable of fuzzy test as “{dir}”, Take the number in the sixth line from top to bottom in the echo message as Flag Value submission ;(11 branch )

2. Via local PC Medium penetration test platform Kali2.0 For the server scenario PYsystem20191 Conduct website directory violence enumeration test ( Using tools DirBuster, Scan server 80 port ), By analyzing the scanning results , Find the upload point and use Firefox to access the page containing the upload point , And take the first word in the first line of the page after successful access as Flag Value submission ;(13 branch )

3. After the successful access, the upload name is backdoor.php Of php In a word, the Trojan horse goes to the server , Open the console and use the website security dog to detect whether there is a Trojan horse in the local area , If a Trojan horse is detected , The absolute path of the Trojan horse is taken as Flag Value submission , If no Trojan horse is detected, submit false;(15 branch )

4. Via local PC Medium penetration test platform Kali2.0 For the server scenario PYsystem20191 Conduct file upload penetration test , Using tools weevely stay / Directory to generate a Trojan horse , The name of the Trojan horse is backdoor.php, The password for pass, This operation uses the fixed string in the command as Flag Value submission ;(17 branch )

5. Upload and use weevely Generated Trojan backdoor1.php To server , Open the console and use the website security dog to detect whether there is a Trojan horse in the local area , If a Trojan horse is detected , The absolute path of the Trojan horse is taken as Flag Value submission , If no Trojan horse is detected, submit false;(11 branch )

6. Via local PC Medium penetration test platform Kali2.0 For the server scenario PYsystem20191 Conduct file upload penetration test ( Using tools weevely, Connect the Trojan file on the target server ), After the connection is successful, take the string of the host name of the target server as Flag Value submission ;(11 branch )

7. Turn on all the protection of the website security dog , Again using weevely Generate a new Trojan file and upload it to the target server , Take the second line of the page prompt after uploading as Flag Value submission ;(13 branch )

8. Turn on all the protection of the website security dog , Again using weevely Generate Trojan file and upload it to the target server , It is required to upload successfully , Take the parameters that must be used to generate the Trojan horse as Flag Value submission .(9 branch )

Mission 3. Web Penetration test (100 branch )

Mission environment description :

  • Server scenario :PYsystem20192( user name :root; password :123456)
  • Server scenario operating system :PYsystem20192( Version unknown )

1. Via local PC Medium penetration test platform Kali1.0 For the server scenario PYsystem20192 Conduct Web Penetration test ( Using tools w3af Target of Web Server for auditing ), stay w3af Under the command line interface of , Use the command to list all plug-ins for auditing , Use the command used for this operation as Flag Value submission ;(9 branch )

2. Via local PC Medium penetration test platform Kali1.0 For the server scenario PYsystem20192 Conduct Web Penetration test , Using tools w3af Yes Web Server for auditing , stay w3af The crawling module is loaded under the command line interface of phpinfo Information and spider crawling data , Use the command used for this operation as Flag Value submission ;(11 branch )

3. Via local PC Medium penetration test platform Kali1.0 For the server scenario PYsystem20192 Conduct Web Penetration test , Using tools w3af Yes Web Server for auditing , stay w3af Enable the audit plug-in in the command line interface of sql Blind note 、 Command injection and sql Inject to test the security of the server website , And use the command used for this operation as Flag Value submission ;(13 branch )

4. Via local PC Medium penetration test platform Kali1.0 For the server scenario PYsystem20192 Conduct Web Penetration test , Using tools w3af Yes Web Server for auditing , stay w3af Set the target server address to start scanning in the command line interface of , Use the fixed string in the command for this operation Flag Value submission ;(11 branch )

5. In the local PC Penetration testing platform Kali1.0 View the audit results in , The audit results contain loopholes URL Address as Flag value ( When submitting answers IP use 192.168.80.1 Instead of , for example http://192.168.80.1/login.php) Submit ;(17 branch )

6. In the 5 Based on the question , Get into exploit Pattern , load sqlmap The module is used to SQL Injection test , Load sqlmap The module is used to SQL The commands that need to be used for injection testing are Flag Value submission ;(9 branch )

7. Via local PC Medium penetration test platform Kali1.0 For the server scenario PYsystem20192 Conduct SQL Injection test , Take the name of the last database as Flag Value submission ; (19 branch )

8. Via local PC Medium penetration test platform Kali1.0 For the server scenario PYsystem20192 Conduct SQL Injection test , The root The user password is used as Flag Value submission . (11 branch )

Mission 4. Windows Operating system penetration test (100 branch )

Mission environment description :

  • Server scenario :PYsystem20194
  • Server scenario operating system :Windows( Version unknown )

1. Via local PC Medium penetration test platform Kali2.0 For the server scenario PYsystem20194 Conduct system service and version scanning penetration test , And display the operation in the result 445 The service version information string corresponding to the port is used as Flag Value submission ;(7 branch )

2. Via local PC Medium penetration test platform Kali2.0 For the server scenario PYsystem20194 Conduct penetration tests , Put the scene in the network connection information DNS Information as Flag value ( for example :114.114.114.114) Submit ;(9 branch )

3. Via local PC Medium penetration test platform Kali2.0 For the server scenario PYsystem20194 Conduct penetration tests , Put the scene on the desktop 111 The only suffix in the folder is .docx The file name of the file is used as Flag Value submission ;(11 branch )

4. Via local PC Medium penetration test platform Kali2.0 For the server scenario PYsystem20194 Conduct penetration tests , Put the scene on the desktop 111 The only suffix in the folder is .docx The document content of the file is used as Flag Value submission ;(15 branch )

5. Via local PC Medium penetration test platform Kali2.0 For the server scenario PYsystem20194 Conduct penetration tests , Put the scene on the desktop 222 The English word in the only picture in the folder is Flag Value submission ;(17 branch )

6. Via local PC Medium penetration test platform Kali2.0 For the server scenario PYsystem20194 Conduct penetration tests , Take the password of the current top account administrator in this scenario as Flag Value submission ;(20 branch )

7. Via local PC Medium penetration test platform Kali2.0 For the server scenario PYsystem20194 Conduct penetration tests , Take the document contents of the files in the recycle bin in this scenario as Flag Value submission .(21 branch )

Mission 5. Linux Operating system penetration test (100 branch )

Mission environment description :

  • Server scenario :PYsystem20195
  • Server scenario operating system :Linux( Version unknown )

1. Via local PC Medium penetration test platform Kali2.0 For the server scenario PYsystem20195 Conduct system service and version scanning penetration test , And display the operation in the result 21 The service version information string corresponding to the port is used as Flag Value submission ;(5 branch )

2. Via local PC Medium penetration test platform Kali2.0 For the server scenario PYsystem20195 Conduct penetration tests , Put the scene /home/guest The only suffix in the directory is .pdf The file name of the file is used as Flag Value submission ;(7 branch )

3. Via local PC Medium penetration test platform Kali2.0 For the server scenario PYsystem20195 Conduct penetration tests , Put the scene /home/guest The only suffix in the directory is .pdf The contents of the document are used as Flag Value submission ;(9 branch )

4. Via local PC Medium penetration test platform Kali2.0 For the server scenario PYsystem20195 Conduct penetration tests , Put the scene /var/www The only suffix in the directory is .bmp The file name of the file is used as Flag Value submission ;(7 branch )

5. Via local PC Medium penetration test platform Kali2.0 For the server scenario PYsystem20195 Conduct penetration tests , Put the scene /var/www The only suffix in the directory is .bmp The English words in the picture file are used as Flag Value submission ;(9 branch )

6. Via local PC Medium penetration test platform Kali2.0 For the server scenario PYsystem20195 Conduct penetration tests , Put the scene /var/vsftpd The only suffix in the directory is .docx The file name of the file is used as Flag Value submission ;(8 branch )

7. Via local PC Medium penetration test platform Kali2.0 For the server scenario PYsystem20195 Conduct penetration tests , Put the scene /var/vsftpd The only suffix in the directory is .docx The contents of the document are used as Flag Value submission ;(11 branch )

8. Via local PC Medium penetration test platform Kali2.0 For the server scenario PYsystem20195 Conduct penetration tests , Put the scene /root The only suffix in the directory is .txt The file name of the file is used as Flag Value submission ;(21 branch )

9. Via local PC Medium penetration test platform Kali2.0 For the server scenario PYsystem20195 Conduct penetration tests , Put the scene /root The only suffix in the directory is .txt The contents of the document are used as Flag Value submission .(23 branch )

Mission 6. Network protocol stack penetration test (100 branch )

   

Mission environment description :

attack :

Be careful : The attacker must use the virtual machine in the physical machine

  • Physical machine operating system :Windows7
  • Virtual machine operating system :Ubuntu Linux 32bit
  • Virtual machine operating system installation tool 1:Python3
  • Virtual machine operating system installation tool 2:Wireshark
  • The relationship between virtual machine network card and physical machine network card :Bridge( The bridge )
  • user name :root, password :123456

Drone aircraft :

  • Server scenario :PYsystem20196
  • Server scenario operating system :Microsoft Windows2003 Server
  • Server scenario FTP Download service user name :anonymous, password :123456
  • Server scenario FTP Download service port :2121

1. From the target server scenario FTP Download files from the server smurf.py, Edit this Python Program files , Make the program pass UDP The target server scenario is DOS( Denial of service ) Function of penetration test , Fill in the blanks in this document F1 character string , Pass the string through SHA256 After the operation, the hexadecimal result of the hash value is returned as Flag value ( form : Hexadecimal string ) Submit ;(7 branch )

2. Continue editing named smurf.py Of Python Program files , Make the program pass UDP The target server scenario is DOS( Denial of service ) Function of penetration test , Fill in the blanks in this document F2 character string , Pass the string through SHA256 After the operation, the hexadecimal result of the hash value is returned as Flag value ( form : Hexadecimal string ) Submit ;(7 branch )

3. Continue editing named smurf.py Of Python Program files , Make the program pass UDP The target server scenario is DOS( Denial of service ) Function of penetration test , Fill in the blanks in this document F3 character string , Pass the string through SHA256 After the operation, the hexadecimal result of the hash value is returned as Flag value ( form : Hexadecimal string ) Submit ;(9 branch )

4. Continue editing named smurf.py Of Python Program files , Make the program pass UDP The target server scenario is DOS( Denial of service ) Function of penetration test , Fill in the blanks in this document F4 character string , Pass the string through SHA256 After the operation, the hexadecimal result of the hash value is returned as Flag value ( form : Hexadecimal string ) Submit ;(9 branch )

5. adopt Python The interpreter performs smurf.py, And open Wireshark Monitoring network traffic , Analysis through program files smurf.py Produced ICMP Traffic , And put the ICMP In the data object Code Attribute values are passed through SHA256 After the operation, the hexadecimal result of the hash value is returned as Flag value ( form : Hexadecimal string ) Submit ;(11 branch )

6. Continue from the target server scenario FTP Download files from the server scansion.py, Edit this Python Program files , Make the program realize the function of scanning and penetration test for the target server scene , Fill in the blanks in this document F1 character string , Pass the string through SHA256 After the operation, the hexadecimal result of the hash value is returned as Flag value ( form : Hexadecimal string ) Submit ;(7 branch )

7. Continue editing named scansion.py Of Python Program files , Make the program realize the function of scanning and penetration test for the target server scene , Fill in the blanks in this document F2 character string , Pass the string through SHA256 After the operation, the hexadecimal result of the hash value is returned as Flag value ( form : Hexadecimal string ) Submit ;(7 branch )

8. Continue editing named scansion.py Of Python Program files , Make the program realize the function of scanning and penetration test for the target server scene , Fill in the blanks in this document F3 character string , Pass the string through SHA256 After the operation, the hexadecimal result of the hash value is returned as Flag value ( form : Hexadecimal string ) Submit ;(7 branch )

9. Continue editing named scansion.py Of Python Program files , Make the program realize the function of scanning and penetration test for the target server scene , Fill in the blanks in this document F4 character string , Pass the string through SHA256 After the operation, the hexadecimal result of the hash value is returned as Flag value ( form : Hexadecimal string ) Submit ;(7 branch )

10. Continue editing named scansion.py Of Python Program files , Make the program realize the function of scanning and penetration test for the target server scene , Fill in the blanks in this document F5 character string , Pass the string through SHA256 After the operation, the hexadecimal result of the hash value is returned as Flag value ( form : Hexadecimal string ) Submit ;(9 branch )

11. Continue editing named scansion.py Of Python Program files , Make the program realize the function of scanning and penetration test for the target server scene , Fill in the blanks in this document F6 character string , Pass the string through SHA256 After the operation, the hexadecimal result of the hash value is returned as Flag value ( form : Hexadecimal string ) Submit ;(9 branch )

12. adopt Python The interpreter executes program files scansion.py, Put the program file into the display result after execution , Key words found Word1 And keywords Word2 The corresponding string is filled in the following form (Word1 The corresponding string : Word2 The corresponding string ), And pass the formal string through SHA256 After the operation, the hexadecimal result of the hash value is returned as Flag value ( form : Hexadecimal string ) Submit .(11 branch )

Mission 7. Comprehensive penetration test and safety reinforcement of the system (100 branch )

Mission environment description :

attack :

Be careful : The attacker must use the virtual machine in the physical machine

  • Physical machine operating system :Windows7
  • Virtual machine operating system :Ubuntu Linux 32bit
  • Virtual machine operating system installation tool 1:Python3
  • Virtual machine operating system installation tool 2:Wireshark
  • The relationship between virtual machine network card and physical machine network card :Bridge( The bridge )
  • user name :root, password :123456

Drone aircraft :

  • Server scenario :PYsystem20197
  • Server scenario operating system :Microsoft WindowsXP

1. Log in to the target server through penetration test on the attacker side , Will log in successfully , String displayed on the operating system desktop through SHA256 After the operation, the hexadecimal result of the hash value is returned as Flag value ( form : Hexadecimal string ) Submit ;(7 branch )

2. Edit the file from the target server scene C:\Appserv\www\WebSeep.php, Edit this PHP Program files , So that the program implementation can realize the SQL Injection penetration test and XSS Safety protection of penetration test , Fill in the blanks in this document F1 character string , Pass the string through SHA256 After the operation, the hexadecimal result of the hash value is returned as Flag value ( form : Hexadecimal string ) Submit ;(7 branch )

3. Continue editing section of this task 2 In the question PHP Program files , So that the program implementation can realize the SQL Injection penetration test and XSS Safety protection of penetration test , Fill in the blanks in this document F2 character string , Pass the string through SHA256 After the operation, the hexadecimal result of the hash value is returned as Flag value ( form : Hexadecimal string ) Submit ;(7 branch )

4. Continue editing section of this task 2 In the question PHP Program files , So that the program implementation can realize the SQL Injection penetration test and XSS Safety protection of penetration test , Fill in the blanks in this document F3 character string , Pass the string through SHA256 After the operation, the hexadecimal result of the hash value is returned as Flag value ( form : Hexadecimal string ) Submit ;(7 branch )

5. Continue editing section of this task 2 In the question PHP Program files , So that the program implementation can realize the SQL Injection penetration test and XSS Safety protection of penetration test , Fill in the blanks in this document F4 character string , Pass the string through SHA256 After the operation, the hexadecimal result of the hash value is returned as Flag value ( form : Hexadecimal string ) Submit ;(9 branch )

6. Find the file from the target server scenario C:\PenetrationTest\PenetrationTest.c, Edit this C Program source file , Make the program implement the security test on whether there is buffer overflow vulnerability in the target server scenario , Fill in the blanks in this document F1 character string , Pass the string through SHA256 After the operation, the hexadecimal result of the hash value is returned as Flag value ( form : Hexadecimal string ) Submit ;(7 branch )

7. Continue editing section of this task 6 In the question C Program source file , Make the program implement the security test on whether there is buffer overflow vulnerability in the target server scenario , Fill in the blanks in this document F2 character string , Pass the string through SHA256 After the operation, the hexadecimal result of the hash value is returned as Flag value ( form : Hexadecimal string ) Submit ;(7 branch )

8. Continue editing section of this task 6 In the question C Program source file , Make the program implement the security test on whether there is buffer overflow vulnerability in the target server scenario , Fill in the blanks in this document F3 character string , Pass the string through SHA256 After the operation, the hexadecimal result of the hash value is returned as Flag value ( form : Hexadecimal string ) Submit ;(7 branch )

9. Continue editing section of this task 6 In the question C Program source file , Make the program implement the security test on whether there is buffer overflow vulnerability in the target server scenario , Fill in the blanks in this document F4 character string , Pass the string through SHA256 After the operation, the hexadecimal result of the hash value is returned as Flag value ( form : Hexadecimal string ) Submit ;(7 branch )

10. Continue editing section of this task 6 In the question C Program source file , Make the program implement the security test on whether there is buffer overflow vulnerability in the target server scenario , Fill in the blanks in this document F5 character string , Pass the string through SHA256 After the operation, the hexadecimal result of the hash value is returned as Flag value ( form : Hexadecimal string ) Submit ;(7 branch )

11. Continue editing section of this task 6 In the question C Program source file , Make the program implement the security test on whether there is buffer overflow vulnerability in the target server scenario , Fill in the blanks in this document F6 character string , Pass the string through SHA256 After the operation, the hexadecimal result of the hash value is returned as Flag value ( form : Hexadecimal string ) Submit ;(7 branch )

12. Use... In the target server scenario Microsoft Visual C++ Compiler for the above 6-11 Edited in the topic PenetrationTest.c Source file to compile 、 link , Make the program run into the execution operating system Shell Program , Eject the operating system Shell The system prompt string passes SHA256 After the operation, the hexadecimal result of the hash value is returned as Flag value ( form : Hexadecimal string ) Submit ;

13. Secure the buffer overflow vulnerability in the above target server scenario , Find the operating system configuration file that needs to be modified to solve this problem , Pass the file name string of the complete configuration file through SHA256 After the operation, the hexadecimal result of the hash value is returned as Flag value ( form : Hexadecimal string ) Submit .(11 branch )

( Two ) Phase II mission statement (300 branch )

Suppose that the contestants are information security engineers of an e-commerce enterprise , Be responsible for the security protection of some servers in the enterprise , The server may have various problems and vulnerabilities . You need to secure the server as soon as possible ,15 In minutes, other teams will infiltrate these servers .

according to 《 Field parameter table 》 The information provided in the second stage , Please use PC Google browser login actual combat platform .

Target server environment description :

scene 1:CentOS2019024( Unable to open the console to operate the target , Only the of the target can be obtained IP, The competitor needs to enter the target aircraft by other methods to reinforce it ), Server operating system :CentOS( Version unknown );

scene 2:Windows2019024( Unable to open the console to operate the target , Only the of the target can be obtained IP, The competitor needs to enter the target aircraft by other methods to reinforce it ), Server scenario operating system :Windows( Version unknown ).

matters needing attention :

1. Cannot attack the referee server , If the attack continues after one warning, the team will be ordered to leave the field ;

2.Flag The value is the unique identification of each target server , Each target server has only 1 individual ;

3. Target server Flag Values are stored in /root/flagvalue.txt File or C:\flagvalue.txt In file ;

4. After logging into the automatic scoring system , Submit to the opponent's target server Flag value , At the same time, you need to specify the target server of the opponent IP Address ;

5. CentOS2019024 The following services and ports of the target server are not allowed to be closed :80、3306、7000-7999、8080;Windows2019024 The following services and ports of the target server are not allowed to be closed :21、80、7000-7999;

6. During system reinforcement, it is necessary to ensure the availability of external services provided by the target aircraft , The service can only change the configuration , Changes are not allowed ;

7. This session is a confrontation session , No overtime .

The list of possible vulnerabilities is as follows :

1. The vulnerability in the server may be a conventional vulnerability or a system vulnerability ;

2. The website on the target server may have a vulnerability of command injection , Ask contestants to find vulnerabilities related to command injection , Exploit this vulnerability to obtain certain permissions ;

3. There may be a file upload vulnerability on the website on the target server , Ask the contestants to find the loopholes related to file upload , Exploit this vulnerability to obtain certain permissions ;

4. There may be a File Inclusion Vulnerability in the website on the target server , Ask the contestant to find the relevant vulnerabilities contained in the file , Combine with other vulnerabilities to obtain certain permissions and raise rights ;

5. The services provided by the operating system may contain vulnerabilities in remote code execution , Ask the user to find the service for remote code execution , And use this vulnerability to obtain system permissions ;

6. The service provided by the operating system may contain a buffer overflow vulnerability , Services that require users to find buffer overflow vulnerabilities , And use this vulnerability to obtain system permissions ;

7. There may be some system backdoors in the operating system , Players can find this back door , And use the reserved back door to directly obtain the system permission .

Scoring instructions :

The rules 1: Per submission 1 Secondary target server Flag Increase in value 2 branch , Whenever submitted by an opponent 1 Secondary target server Flag Value minus 2 branch , Of each opponent's target server Flag Values can only be submitted once ;

The rules 2: The system automatically starts the violation detection and score deduction mechanism , If the following violations are found , The system will automatically deduct points , Deduct a score for every violation detected , The score deduction details are displayed in the violation record , Calculated in the total score of the second stage :

1) The attack and defense phase is enabled Flag Detection mechanism , If found Flag abnormal ( for example : Delete 、 modify 、 Move 、 Killing process ), Record it as a violation , Deduct points each time 3 branch ;

2) Enable the service port detection mechanism in the attack and defense stage , If the problem of closing is found, the port required to be opened , Record it as a violation , Deduct points for each port 1 branch ;

3) Target server in attack and defense stage IP The address is DHCP Automatic access to , No modification allowed , If modified, all the above detection mechanisms will be triggered ;

4) After reinforcement time , The player shuts down the target server or is shut down by others , Trigger all the above detection mechanisms , And the referee will not help restart .

The rules 3: The second stage is divided into 300 branch , Initial classification 100 branch . In the actual score and large screen display , A player's score may show a negative score or exceed 300 branch ; Those with negative scores , The evaluation results at this stage are all 0 branch ; Usually more than 300 Points of , The evaluation results at this stage are all 300 branch ;0-300 The evaluation score of the score remains unchanged .

answer :

 

 

 

原网站

版权声明
本文为[Wangzai sec]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/173/202206220328571963.html