You are on page 1of 27

TABLE OF CONTENTS

PROPOSAL INDONESIAN CYBER ARMY 2013 I. II. III. Introduction................................................................................................................ 1 Purpose and Objectives ............................................................................................. 4 Cyber Army Competition ............................................................................................ 4 1. Capture The Flag .................................................................................................. 4 2. Forensic Investigation .......................................................................................... 6 IV. Details and Requirements for the Competition ......................................................... 7 1. Participants for the Competition ....................................................................... 2. Requirements of ICA Competition ..................................................................... Registration requirements of participation in the competition ........................ Technical skills requirements of team members for Capture the Flag ............. Technical requirements of software and hardware to be used ........................ Technical details of the competition ................................................................. 3. Systems of the Competition .............................................................................. 4. Details of the Competition and Scoring System ................................................ 5. Judges of the Competition & Trainer for ICA Team Members .......................... V. VI. VII. IX. 7 7 7 8 8 8 9 10 10

Endorsement of the Event.......................................................................................... 10 Schedule and Venue of the Competition ................................................................... 11 ICA Event Program...................................................................................................... 11 Closing ........................................................................................................................ 13

VIII. Structure of the Committee ....................................................................................... 11

APPENDIX: FLASHBACK OF INDONESIAN CYBER ARMY 2012 I. II. III. IV. V. VI. Introduction................................................................................................................ 14 List of the Colleges and Universities Joined in ICA Competition ................................ 14 Indonesian Cyber Army Team .................................................................................... 16 The Competition ......................................................................................................... 16 The Training ................................................................................................................ 19 Announcement of the Winners .................................................................................. 21

I.

INTRODUCTION The first nation wide event Indonesian Cyber Army (ICA) 2012 or better known as Cyber Security Official Competition which was held in the city of Medan on October 16-18, 2012 is a successful event. This event has been recognized by several government, organizations, academia and the private sector like Directorate of Information Security, Kemkominfo, APTIKOM,DeTIKNAS, Academic CSIRT, Multimatics and FORESEC. Indonesian Cyber Army is a competition that facilitates Indonesian students to compete in order to demonstrate their ability in the field of Cyber Security. The participants consisted of various regions in Indonesia, such as Banda Aceh, Medan, Bengkulu, Palembang, Lampung, Jakarta, Depok, Yogyakarta, Semarang and Denpasar with a total of 60 participants consisting of 20 teams from different leading universities throughout Indonesia. This is just a start-up capital to find a true warrior and competent in the realm of Cyber Security. It is not easy finding the best, but those team who won the Indonesian Cyber Army Competition will be promoted nationally and internationally. The winners were trained and equipped to become the future leader in the Cyber Security field and join the Indonesian Cyber Army Team. Create a local Cyber Army to their own campus and built a good and strong Cyber Security sphere who will help their respective local district area. This event will not only help the government and the public to protect from hackers action but help the Indonesian people to defense the counterfeiting of the important information in an organizations and institutions . Now, through the Internet domains or so-called cyber security they are trying to be involved in positive activities that will result in a positive impact. In the future they will be included in international events like Defcon or Defense Contest, Cyber Security event bigger and the world.

It is hoping that relevant government departments, academician and ICT industries will be interested in internet security to sustain this kind of activities and reap the benefits. The results of the competition boasts most of the colleges and universities especially for those who joined and won this competition. With good preparation, hard work, high motivation and full of confidence, the winners are able to compete to other teams and be the member of the Indonesian Cyber Army in Indonesia. This event became a popular to many universities and colleges, especially to those students who has great interests in the field of Cyber Security. Many of them are requesting for the continuity of this event. You can see the enthusiasm based on the feedback of many students. Due to this results, there is a huge enthusiasm from the students, big support from lecturers and campuses related to the ICA 2012 because this is an activity that is positive and constructive building Cyber Security leader for the campus and students. Hence, we would like to hold Indonesian Cyber Army 2013 with more better and bigger competition. We would like to make Indonesian Cyber Army as a benchmark of the competition in the field of Cyber Security in Indonesia in short term and mid term in South East Asia. This event will be one of the pride to Indonesian people. Aside from the description above as we know that Information Technology can make life easier for the user, but on the contrary makes it more complicated for IT professionals who are responsible for protecting critical/important data and organizational information assets. With the circumstances in which the number of cyber crimes not only in Indonesia but also in the whole world of the existence of Information Technology industry professionals, especially in the field of Cyber Security is in need. To become a professional in the field of Cyber Security takes dedication and commitment that need to enrich, where this profession can provide a good future.

In addition the International Certification in the field of Cyber Security is also an important thing to own by every professional in this field.

The lack of professionals in the field of Cyber Security is because training and international certification in this field is very expensive and only best Universities in Indonesia who has qualified HR Lecturer, especially in this field of security. Lack of knowledge on different types of cyber threats and unfamiliar on how to prevent this threats, lack of planning and implementing security policies and controls. Therefore, as for the commitment and serious implementation of Indonesian Cyber Army 2013, we collaborated with APTIKOM with the purpose and objective to encourage APTIKOM members to participate in the incoming Indonesian Cyber Army 2013 competition to build the future in Cyber Security leader in the global cyber environment.

II. PURPOSE AND OBJECTIVES The purpose and objectives to achieve this competition are: Accommodate, distribute, and develop the skills and creativeness of the students. Increase motivation and develop talents and interests of students in the field of Cyber Security. Measure the capacity of student knowledge in Cyber Security through the competition. Inspire, team building and facilitate the development of advanced expertise and skills of the students. Teach students to compete in a good manner of Cyber Security competition with the knowledge, skills and creativity. Build the confidence of individuals and gives awards to those who participated and managed to become a winner. III. CYBER ARMY COMPETITION ICA competition is divided into two categories. 1. Capture the Flag

Capture the Flag (CTF) is a safe and legal competition that aims to test the defensive and offensive capabilities to solve challenges related to Cyber Security that has been prepared by the committee. This competition not only fulfills the game but also education in the field of Cyber Security. In the field of Cyber Security, CTF is a competitive war of defense and security of computer systems, followed by several teams of players (multi player) with a target value of points in the specified time period. This CTF game was first popularized at hacker conference DEF CON known in Las Vegas, USA. It was designed as a game that educate participants of the competition to secure the server machine services as well as reacting to a series of attacks that occur in the real world. CTF is based on Computer Hacking which is not only put high ethical professionals but also wanted to test the skills and knowledge of students in Indonesia.It mainly focuses on the infiltration of a particular system purposely designed with some vulnerabilities and also with security. The objectives is however to engage the students knowledge on the techniques used to bypass the security which has been already put in place and to gauge that if the students could possibly find the vulnerabilities and exploit it. The team or the students who could methodologically find these loopholes and exploit it shall be declared a winner. The levels which we have given would be from: The first level, Basic Attack - Specifically on Attacking web services on PHP The second level goes complex where we have given them a CTF image of "Java based exploitation" and the Third level is based on combination of multiple source code based vulnerabilities.

2. Forensic Investigation

Forensic Investigation where its objective is to allow the students to understand capturing, sorting, and analyzing network data. It could be in Terabytes size. There are many challenges to this as network traffic is not as volatile as a hard drive based forensic. This competition is to test participants ability to analyze network attacks happened to a computer or server. Participants were given a file that contains all the data that have come out and get in when the computer is attacked, then required to answer the questions pose. Forensic Investigation Competition primarily focuses on the past event which has already happen. Each participants where given an evidence file that has been prepared by the committee where each team asks to analyse the structure of the data packets or the hard drive images. On the process of the forensic investigation, each participants shows their skills ranging from identification and analysis techniques to find the target and the attacker.

The objective are simply to find out the when / where / how / what/which tools exploits and location which was involved in the crime scene. The students not only would be analysing the evidence but also to critically understand the chain of evidence involved in forensic investigation. These competitions is usually done in a large meeting room. Each team occupies an area or table that there is a server machine that must be maintained, arranged in a LAN network, so all server machine of each team are interconnected. It is also connected to a game server machine which is controlled by the committee to monitor the game. The projector which is connected to a Game Server will display the assessment board. IV. DETAILS AND REQUIREMENTS FOR THE COMPETITION 1. Participants for the Competition This competition is intended for students throughout Indonesia who is reliable in Linux operating and exploitation methods. It was designed like a game of defense and attack. It is not allowed to peek into the data network or poison the data network of the opponent. There will be rules to followed so that the competition will run with honest, fair and ethical. The maximum number of participants is 30 teams, representatives from Higher Education Institutions in Indonesia, where each team is consists of 3 persons. Participants are required to bring their laptop. 2. Requirements of ICA Competition Registration requirements of participation in the competition: Active students and registered from Higher Education Institutions in Indonesia. One team represents from one (1) Institutions of Higher Education.

Bring a letter of recommendation as a representative of higher education institutions concerned. Register and sign the following statement of following the rules and regulation of the competition with ethics of professionalism. Meet the technical requirements specified by the committee.

Technical skill requirements of team members for Capture the Flag: Master in Linux and methods of Exploitation. Ability to manage and secure server computers.

Technical requirements of software and hardware to be used: Windows XP SP3 fully patched and 1GB of RAM for "VMWARE". It is not allowed to use Security Tools except Backtrack 5R1 for the client computer. Minimum Core Processor i2 - i5 and at least 2 GB of RAM for server for each team.

Technical details of the competition: All traffics will be logged or written. The main server is the target that can be attacked by each opponent. Server computer services is a part of the image-VMWARE. This image is locked, distributed and installed before the start of the competition. Regulation will be announced on the start of the game. The image has the ability to order the committee to come and check if there is a team violates the rules. Each team are not allowed to inactivate this account. Communication channel is available for discussion or answering technical issues with the committee. Software required in this game will be designed and developed by the committee.

3. Systems of the Competition Capture the Flags Game: Structure: Team participants will receive preconfigured systems and services that they must maintain and protect. CTF competition framework: The main task is to maintain a server running multiple services, while simultaneously trying to get access into the computer server of the opposing team. Each successful penetration gains points, as well as keeping services up and functional during the course of the game. Description: This game consists of multiple teams participating in a local area network (LAN) that are connected to each other. Each team participant hosting a server that has multiple services running such as web server, mail server, or customized services. These services have specific security flaws that make the server can not perform its functions properly. The main goal of the game is to maintain the services up, functional and uncompromised for the duration of the game. Additional scores can be gained by patching the vulnerabilities of the services and exploiting the knowledge of the found weaknesses at the other team's servers. Forensics Investigation Game: Investigation Forensics proposed objective of the project is allow students to find details of network events after they have happened. Distal data to manageable levels by employing filters and analysis. The skills sets that would be required from a student would be tuning of IDS solutions and identification of security breaches via log and network traffic.

The traffic forensic challenge scenario would be based on a pre captured traffic data that will be presented to the students where they will have to analyze the timeline and come up with a conclusive report explaining the chain of events that has happened and how do they relate to the crime that has happened. Themost conclusive and complete findings shall be deemed as the winner on this competition. 4. Details of the Competition and Scoring System Details of the competition and scoring system will be post through website and will inform via e-mail to all participants. 5. Judges of the Competition and Trainer for the ICA Team Members Judges and Trainers who will be involved in this competition is a person who has experienced in the field of Cyber Security, well-known and has a good reputation in IT industry. V. ENDORSEMENT OF THE EVENT This event was endorsed by the following departments from the government, industries and institutions: KOMINFO DETIKNAS DIKTI DEPHAN POLRI APTIKOM ACAD CSIRT Vendors and Partner ICT Industry

10

VI. SCHEDULE AND VENUE OF THE COMPETITION This Indonesian Cyber Army Competition 2013 event of activities will be hold on the specified venue and schedule mentioned below: Date: Time: Place: 29-30 October 2013 09:00 17:00 WITA
STMIK WIDYA CIPTA DHARMA

Jl M. Yamin No. 25, Samarinda, Indonesia VII. ICA EVENT PROGRAM Day 1: Competition Opening Remarks Capture the Flag and Forensic Investigation Competition Announcement of Winners and Awarding

9.00 10.00 : 10.00 16.00 : 16.00 17.00 : Day 2:

Training and Closing Review Capture The Flag Training Forensic Investigation Training Closing

9.00 10.00 : 10.00 16.00 : 16.00 17.00 :

VIII. STRUCTURE OF THE COMMITTEE 1. Steering Committee The steering committee of this event are coming from the respectable organizations and institutions: Prof. Richardus Eko Indrajit Prof. Zainal A Hasibuan Mr. IGN Mantra Dr. Desmond Devendran Mr. Onno W Purbo Prof Rahmat Budiarto - APTIKOM - DETIKNAS - ACAD CISRT - FORESEC - Pakar Telematika - UUM

11

2. Organizing Committee This competition was organized by the following professionals coming from different organizations and institutions: Chairman Vice Chairmans : : Mr. Agus Setiawan, MM, CEP, CEI, CISCP, CIPMP Mr. M. Said Hasibuan, M.Kom Mr. Roy Rudolf Huizen, ST, MT Mr. Awang Harsa Kridalaksana Ms. Silvia Aprilia, SS Ms. Yunita, SE

Secretaries

Workshop and Socialization Division Coordinators : Mr. Gde Sastrawangsa, S.Kom Mr. Khairil, M.Kom Mr. Suryayusra, M.Kom Mr. Ade Nugraha, ST, MMSI Ms. Henny Pratiwi, S.Kom, M.Pd

Marketing and Communication Division Coordinators : Ms. Gemma Panopio-Sonaka, BSCS Mr. M. Ikhsan, S.Kom

Creative and Production Division Coordinators Graphic Designer Web Developer : : : Mr. Gede Putu Krisna Juliharta, ST, FCCH, FCNS, FCDR Mr. Andrea Reza, S.Kom Mr. Dimas Fahreza Mr. Fajrin Armawan

Accommodation and Transportation Division Coordinator : Ms. Siti Qomariah, S.Kom

Supplies and Equipment Division Coordinator : Mr. Basrie, S.Kom

12

IX. CLOSING Based on this proposal that we prepared, we hope that we can get the full support from the government departments related to Cyber Security, academician and ICT Industry so that this event can be implemented properly and give more benefits for the development and progress of Cyber Security in Indonesia.

13

APPENDIX: INDONESIAN CYBER ARMY 2012 I. INTRODUCTION Indonesian Cyber Army (ICA) 2012 Competition held at STMIK Potensi Utama, Medan on October 16-18, 2012, a first nationwide event which was held in the city of Medan. Each region has sent their best champ that has accummulated to almost 20 teams from Banda Aceh, Medan, Bengkulu, Palembang, Lampung, Jakarta, Depok, Yogyakarta, Semarang and Denpasar. II. LIST OF COLLEGES AND UNIVERSITIES JOINED IN ICA 2012 List of colleges and universities who joined the CAFTURE THE FLAG Competition: No. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Name of Team Neophyte redEagle Ubidar ITCentrum Capture Newbie Army Perbanas Security Group (Pes-G) Unimal Cyber Army DCC Linux Community STMIK Potensi Utama UNIKA Thomas College/University Universitas Indonesia Universitas Stikubank Universitas Bina Darma Universitas Islam Indonesia STIMIK STIKOM Bali ABFII Perbanas Universitas Mallikusaleh STMIK DCC Lampung STMIK Potensi Utama UNIKA Thomas City Depok Semarang Palembang Sleman Denpasar Jakarta Banda Aceh Lampung Utara Medan Medan Province Jawa Barat Jawa Tengah Sumatera Selatan D.I Yogyakarta Bali Jakarta Aceh Lampung Sumatera Utara Sumatera Utara

List of colleges and universities who joined the FORENSIC INVESTIGATION Competition: No. 1. 2. 3. 4. 5. 6. 7. 8. 9. Name of Team Cyber of Unived Shutdown ITCentrum Forensic TCP Ninja UIN FST Jakarta Unimal Cyber Army TI-FTUP STMIK Potensi Utama UNIKA Thomas College/University Universitas Dehasen Universitas Indonesia Universitas Islam Indonesia STIMIK STIKOM Bali UIN Jakarta Universitas Mallikusaleh Universitas Pancasila STMIK Potensi Utama UNIKA Thomas City Bengkulu Depok Sleman Denpasar Jakarta Banda Aceh Jakarta Medan Medan Province Bengkulu Jawa Barat D.I Yogyakarta Bali Jakarta Aceh Jakarta Sumatera Utara Sumatera Utara

14

There are almost sixty (60) students who joined the two (2) competitions from different colleges and universities in ten (10) provinces. According to Mr. Agus Setiawan, General Manager of Multimatics and Chairman of the ICA Competition 2012, this is just a start-up capital to find a true warrior and competent in the realm of cyber security. Not all provinces are able to send a representative, due to limited time of preparation. Two months preparation after we got the confirmation that we can run this event is not enough. Indeed, too many campuses and universities are interested to join this event but they are not ready in terms of the budget. He added that, the competition in the field of cyber forensics is the first time held in Indonesia where the slogan is There is Always a Trail Left by Hackers. This competition was organized and led by Mr. Agus Setiawan (Multimatics), together with the team Dr. Desmond Devendran (FORESEC), Mr. Said Hasibuan (IBI Darmajaya), and Mr. Roy Rudolf Huezin (STIKOM Bali). Starting from recruiting the team, finding the committee and juries for the competition, looking for the principal hosts and endorsement for the event, and recruiting the participants. This event was supported and endorsed by the following organizations, institutions, colleges and universities: APTIKOM Academic CSIRT DETIKNAS MULTIMATICS FORESEC STMIK Potensi Utama, Medan STIKOM Bali Universitas Bina Darma, Palembang STIKI Malang UIN Syarif Hidayatullah, Jakarta Universitas Dehasen, Bengkulu STMIK Atma Luhur,Pangkal Pinang Universitas STIKUBANK, Semarang STIKOM Dinamika Bangsa, Jambi
15

Some involved in the selection of the jury in this field where came from Academic CSIRT, Mr. IGN Mantra and FORESEC, Dr. Desmond Devendran where they are independent body. III. INDONESIAN CYBER ARMY TEAM

Indonesian Cyber Army Team were represented by the following organizations, institutions and universities: From left to right: Mr. Krisna (Stikom Bali), Mr. Agus Setiawan, General Manager (Multimatics), Mr. IGN Mantra (Acad Csirt), Mr. Said (IBI Darmajaya), Mr. Roy (Stikom Bali), Dr. Desmond Devendran, CEO (Foresec), Mr. Suryayusra (UBIDAR) and Mr. Sastra (Stikom Bali). IV. THE COMPETITION ICA competition was divided into two categories, the Capture the Flag Competition and Forensic Investigation Competition. Capture the Flag Competition ( Hacking)which mainly focuses on the infiltration of a particular system purposely designed with some vulnerabilities and also with security.

16

While the Forensic Investigation Competition primarily focuses on the past event which has already happen. Imagine it as a CSI job. Whereby the participants would have the analyse the structure of the data packets or the hard drive images.

The Indonesian Cyber Army Competition has been started from preparing the equipment, checking its connection and installing the program for each computer of each team which was fully supported by STMIK Potensi Utama.

Mr. Agus Setiawan opened the Indonesian Cyber Army Competition and gave his welcome remarks speech followed by encouraging all teams to do their best, play with honest and integrity and be one of the professional cyber army in Indonesia.
17

This is a timed competition using a count down timer. Each team should make sure that they can hit their target before the time finish. A five (5) hours non-stop competition without break, the participants just get their snacks which is provided in their table.

And the war began, showing the 19 teams trying to hack and defense each other.

18

It is a U-shaped style of arrangement for the competition, where on the left side are ten (10) teams for Capture the Flag and the right side are nine (9) teams for Forensic Investigation competition. One line in front where Juries are seated to monitor the paralleled competitions.

One of the team trying to capture the flag. V. THE TRAINING

19

On October 17, 2012, free training were given to all participants by Dr. Desmond Devendran for Capture the Flag and Forensic Investigation given by Mr. IGN Mantra to equip them to become the future leader in the Cyber Security field, and these future leaders will join the Indonesian Cyber Army Team.

Capture the Flag training by Dr. Desmond where the students shows their enthusiasm to learn and add more knowledge to equip them on how to become a good cyber army

Forensic Investigation training conducted by Mr. IGN Mantra, where the students are eager to listen and learn more about forensic investigation
20

VI. ANNOUNCEMENT OF THE WINNERS October 18, 2012, the most awaiting moment of the competition, the announcement of the winners for Capture the Flag and Forensic Investigation Competitions announced by Mr. Agus Setiawan. Winners for the Capture the Flag Competition goes to the following:

First (1st) winner for Capture the Flag goes to Bina Darma Cyber Army Team from Universitas Bina Darma, Palembang, awarded by Mr. Rico Rasota Rahmada from KOMINFO.

Second winner goes to Neophyte Team from Universitas Indonesia, Jakarta, awarded by Dr. Desmond Devendran from FORESEC.
21

Last or Third (3rd) winner for Capture the Flag goes to redEagle Team from Universitas Stikubank, Semarang, awarded by Mr. Said Hasibuan from IBI Darmajaya. Winners for the Forensic Investigation Competition goes to following:

First (1st) winner for the Forensic Investigation Competition were goes to TCP Ninja Team from STIKOM Bali, Denpasar, award by Mr. Bob Subhan Riza, Ketua Yayasan, STMIK POTENSI UTAMA.

22

Followed by IT Centrum Forensic Team from Universitas Islam Indonesia, Yogya as the second (2nd) winner, awarded by Mr. IGN Mantra from Academic CSIRT.

The last, third (3rd) winner goes to Shutdown Team from Universitas Indonesia, Jakarta, awarded by Mr. Roy Rodulf Huizen, Vice Rector from STIKOM Bali.

23

According to a team judges from Malaysia, Dr. Desmond Devendran, these kids are very talented and enthusiastic championship, they are such professionals, especially in the category of Digital Forensics. The participants were considered to be close to the ability of Professional Forensics Investigator, just train and add more hours that would make them professionals in the field of cyber security and cyber forensics.

The big family of Indonesian Cyber Army 2012 According to Mr. Agus Setiawan as chairman of the committee, the alumni of Indonesian Cyber Army Competition has received national recognition and this competition is expected to be even greater in year 2013, if we can reach most of the colleges in APTIKOM.

24

You might also like