In hacking, a wargame (or war game) is a cyber-security challenge and mind sport in which the competitors must exploit or defend a vulnerability in a system or application, and/or gain or prevent access to a computer system.[1][2][3]

A wargame usually involves a capture the flag logic, based on pentesting, semantic URL attacks, knowledge-based authentication, password cracking, reverse engineering of software (often JavaScript, C and assembly language), code injection, SQL injections, cross-site scripting, exploits, IP address spoofing, forensics, and other hacking techniques.[4]

Wargames for preparedness

edit

Wargames are also used as a method of cyberwarfare preparedness.[5] The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) organizes an annual event, Locked Shields, which is an international live-fire cyber exercise.[5][6] The exercise challenges cyber security experts through real-time attacks in fictional scenarios and is used to develop skills in national IT defense strategies.[6]

Additional applications

edit

Wargames can be used to teach the basics of web attacks and web security, giving participants a better understanding of how attackers exploit security vulnerabilities.[1] Wargames are also used as a way to "stress test" an organization's response plan and serve as a drill to identify gaps in cyber disaster preparedness.[3]

See also

edit

References

edit
  1. ^ a b "Hurricane-Bound Hacker? Here's A Rainy Day Web-Hacking War Game". Forbes. 29 October 2012.
  2. ^ "First Collegiate Pentesting Competition tackles cybersecurity problem differently".
  3. ^ a b Hiep Nguyen Duc (8 April 2015). "Cyber War Games: Top 3 Lessons Learned About Incident Response". eForensics.
  4. ^ "Google Will Offer $1 Million In Rewards For Hacking Chrome In Contest". Forbes. 28 February 2012.
  5. ^ a b Ranger, Steve. "Cybersecurity: This giant wargame is preparing for the next big election hack". ZDNet. Retrieved 2020-09-25.
  6. ^ a b "NATO team tackles cyber-crisis exercise in Eston". Anadolu Agency. 2019-09-04. Retrieved 2020-09-24.
edit