- This event has passed.
7th Annual Purple Event
July 17, 2019 @ 8:00 am - 5:00 pm
Cyber Hub at WMCAT is proud to sponsor the West Michigan Cyber Security Consortium’s 7th Annual Purple Event
The West Michigan Cyber Security Consortium (WMCSC) is proudly hosting the 7th Annual Purple Event at WMCAT with title sponsor, Optiv, on Wednesday, July 17, 2019.
The region’s best cybersecurity professionals who respond to in-the-moment cyber threats against our state, local governments, schools and businesses will gather to exercise their skills and compete. Participants will practice in a live offensive and defensive virtual environment called Capture The Flag.
Anyone interested in the cybersecurity sector is encouraged to attend the annual event to see cybersecurity professionals and experts who defend our state in action during a live hacking competition. WMCSC hosts events throughout the year for their members, encouraging growth in the sector and opportunities for practice exercises that increase the capabilities of professionals that defend our region.
Registration for competing in the event has been closed, but those interested in attending and observing are encouraged to register for free on the WMCSC website here.
WHO: West Michigan Cyber Security Consortium, Cyber Hub at WMCAT (West Michigan Center for Arts + Technology), Optiv as title sponsor, cybersecurity professionals from the region, anyone interested in learning more about the cyber sector.
WHAT: The 7th Annual Purple Event is hosted by the West Michigan Cyber Security Consortium (WMCSC) and is an opportunity for cybersecurity professionals to compete in a friendly hacking event that offers professional practice and industry engagement for anyone interested in the sector. Teams will compete through the virtual environment, Capture The Flag.
WHERE: West Michigan Center for Arts + Technology (WMCAT) / 614 First St. NW Suite 300, Grand Rapids, MI 49504
WHEN: Wednesday, July 17, 2019, (Event: 8:00am – 5:00pm + Networking: 5:00pm – 7:00pm)
WHY: The Purple Event provides offensive (red) and defensive (blue) hacking exercises and competition for cybersecurity professionals to help improve their abilities and take their capabilities to the next level. The red and blue together within the competition makes purple – symbolizing neutrality or a convergence in a competitive industry. WMCSC hosts the event to also attract and retain skilled cyber professionals in the West Michigan region.
Welcome (8am – 9am)
Live hacking competition (9am – 4:30pm)
Live demos of virtual 3D environment (Alphaville) + Capture The Flag Tutorial (9am – 4:30pm)
Vendor showcase (8am – 7pm)
Networking with industry professionals and businesses (5pm-7pm)
CAPTURE THE FLAG (CTF)
DURATION: 8 HOURS
SKILL LEVEL: BEGINNER to ADVANCED
Capture the Flag, or CTF, is a challenge designed to cover the spectrum of cybersecurity. Choose from a variety of self-paced and self-directed modules to complete challenges and capture hidden flags that earn your team points. From Python scripting and web application hijacking to reverse engineering, database hacking, and penetrating SCADA networks, this exercise is a means to challenge and assess individual skills across a broad range of systems.
Teams of four individuals will work together to earn points by using open source tools to fire-off live attacks on networked systems in real time. Pick the areas that challenge you to rack up as many points as possible (note that easier modules earn less points and fewer flags). Nobody will be able to prevent another’s ability to capture a flag or achieve a challenge. User experience is augmented through the use of a scoreboard and 3D visualization of the Alphaville environment. At the end of the exercise, the team with highest points and most flags wins.
CTF participants should have basic computer skills, familiarity with the command line, understanding of IP addressing and DNS, familiarity with basic security concepts, problem solving skills, and resourcefulness. Participants will not know all the solutions to problems encountered in the CTF. The solutions will require research outside of the game.
List of Current CTF Modules (in approx. order of increased difficulty):
- Linux 100
- Linux 101
- Networking 101
- Python 101
- Powershell 101
- Powershell 201
- Recon 101
- Binary Forensics
- School Computer (Reverse Engineering & Exploitation)
- Library (Find PII)
- City Hall (Deface a website)
- Private Business – Zenda (Incident Response & Forensics)
- Power & Energy – SCADA (Service Exploitation)
Participants are shown how to access to the CTF and how to interact with the environment. A proctor is onsite to solve technical problems only. No assistance in how to solve challenges is offered.