Security Basics mailing list archives

RE: Security Games


From: "Leach Brian TSgt USAFE/A2S" <Brian.Leach () ramstein af mil>
Date: Thu, 16 Sep 2004 12:12:56 +0200

The Government (Defense Information Systems Agency) put out a great
training tool as a game called Cyber Protect. It deals with building a
secure network (proxies, firewalls, AV programs etc) it also enforces
the training concept itself as one of the attacks against the network is
social engineering. It is based in a company environment. As a Systems
Security Tech for the Air Force I use this as a way to break the ice
during training sessions and it does a good job of showing the trainees
their knowledge level. 

TSgt Brian Leach

-----Original Message-----
From: Andrew Smith [mailto:stfunub () gmail com] 
Sent: Thursday, September 16, 2004 12:17 AM
To: xyberpix
Cc: Tommie Ashley; Security Basics[List]
Subject: Re: Security Games

Uplink is a terrible game,
http://hackthissite.org/ is brilliant if/when it's alive.
Alot of 'real life' "hacking games", including MySQL Injection. Fun
Stuff.


On Tue, 14 Sep 2004 19:08:34 +0100, xyberpix <xyberpix () xyberpix com>
wrote:
I've been spending a lot of time playing Uplink, I had to pay for it,
but it's well worth it, and best of all you can run it on Windows and
Linux. Wouold definately recommend it to anyone out there.

xyberpix




On Fri, 2004-09-10 at 20:25, Tommie Ashley wrote:
Sometimes security/hacking games can provide a good deal of training
in computer security. I am posting to ask everyone on the list if
there is a game they have found to be technically correct and
useful.
My pick is called Dark Signs. It is command line based, free to
download, and full of insight. It even has its own built in
scripting
language. You can check it out here: http://www.darksigns.com/ .
Dont
forget to post with your favorite!


------------------------------------------------------------------------
---
Computer Forensics Training at the InfoSec Institute. All of our
class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand
skills of
a certified computer examiner, learn to recover trace data left
behind by
fraud, theft, and cybercrime perpetrators. Discover the source of
computer
crime and abuse so that it never happens again.


http://www.infosecinstitute.com/courses/computer_forensics_training.html

------------------------------------------------------------------------
----
--
For Security and Open Source news:
http://xyberpix.demon.co.uk





------------------------------------------------------------------------
---
Computer Forensics Training at the InfoSec Institute. All of our class
sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand
skills of
a certified computer examiner, learn to recover trace data left behind
by
fraud, theft, and cybercrime perpetrators. Discover the source of
computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
------------------------------------------------------------------------
----


---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------


Current thread: