You are on page 1of 27

TABLE OF CONTENTS
PROPOSAL INDONESIAN CYBER ARMY 2013 I. II. III. Introduction................................................................................................................ 1 Purpose and Objectives ............................................................................................. 4 Cyber Army Competition ............................................................................................ 4 1. Capture The Flag .................................................................................................. 4 2. Forensic Investigation .......................................................................................... 6 IV. Details and Requirements for the Competition ......................................................... 7 1. Participants for the Competition ....................................................................... 2. Requirements of ICA Competition ..................................................................... Registration requirements of participation in the competition ........................ Technical skills requirements of team members for Capture the Flag ............. Technical requirements of software and hardware to be used ........................ Technical details of the competition ................................................................. 3. Systems of the Competition .............................................................................. 4. Details of the Competition and Scoring System ................................................ 5. Judges of the Competition & Trainer for ICA Team Members .......................... V. VI. VII. IX. 7 7 7 8 8 8 9 10 10

Endorsement of the Event.......................................................................................... 10 Schedule and Venue of the Competition ................................................................... 11 ICA Event Program...................................................................................................... 11 Closing ........................................................................................................................ 13

VIII. Structure of the Committee ....................................................................................... 11

APPENDIX: FLASHBACK OF INDONESIAN CYBER ARMY 2012 I. II. III. IV. V. VI. Introduction................................................................................................................ 14 List of the Colleges and Universities Joined in ICA Competition ................................ 14 Indonesian Cyber Army Team .................................................................................... 16 The Competition ......................................................................................................... 16 The Training ................................................................................................................ 19 Announcement of the Winners .................................................................................. 21

i

Yogyakarta. Kemkominfo. such as Banda Aceh. 2012 is a successful event. Jakarta. Multimatics and FORESEC. Palembang. It is not easy finding the best. but those team who won the Indonesian Cyber Army Competition will be promoted nationally and internationally. Create a local Cyber Army to their own campus and built a good and strong Cyber Security sphere who will help their respective local district area. This event has been recognized by several government. Medan.DeTIKNAS. APTIKOM. academia and the private sector like Directorate of Information Security. Now. Cyber Security event bigger and the world. INTRODUCTION The first nation wide event Indonesian Cyber Army (ICA) 2012 or better known as Cyber Security Official Competition which was held in the city of Medan on October 16-18.I. Bengkulu. Lampung. Indonesian Cyber Army is a competition that facilitates Indonesian students to compete in order to demonstrate their ability in the field of Cyber Security. organizations. Academic CSIRT. The winners were trained and equipped to become the future leader in the Cyber Security field and join the Indonesian Cyber Army Team. The participants consisted of various regions in Indonesia. In the future they will be included in international events like Defcon or Defense Contest. This is just a start-up capital to find a true warrior and competent in the realm of Cyber Security. 1 . Depok. through the Internet domains or so-called cyber security they are trying to be involved in positive activities that will result in a positive impact. Semarang and Denpasar with a total of 60 participants consisting of 20 teams from different leading universities throughout Indonesia. This event will not only help the government and the public to protect from hackers action but help the Indonesian people to defense the counterfeiting of the important information in an organizations and institutions .

Many of them are requesting for the continuity of this event. the winners are able to compete to other teams and be the member of the Indonesian Cyber Army in Indonesia. This event will be one of the pride to Indonesian people. academician and ICT industries will be interested in internet security to sustain this kind of activities and reap the benefits. This event became a popular to many universities and colleges. To become a professional in the field of Cyber Security takes dedication and commitment that need to enrich. 2 . You can see the enthusiasm based on the feedback of many students. With good preparation. With the circumstances in which the number of cyber crimes not only in Indonesia but also in the whole world of the existence of Information Technology industry professionals. we would like to hold Indonesian Cyber Army 2013 with more better and bigger competition. hard work. there is a huge enthusiasm from the students.It is hoping that relevant government departments. especially to those students who has great interests in the field of Cyber Security. high motivation and full of confidence. Hence. Due to this results. where this profession can provide a good future. but on the contrary makes it more complicated for IT professionals who are responsible for protecting critical/important data and organizational information assets. Aside from the description above as we know that Information Technology can make life easier for the user. The results of the competition boasts most of the colleges and universities especially for those who joined and won this competition. We would like to make Indonesian Cyber Army as a benchmark of the competition in the field of Cyber Security in Indonesia in short term and mid term in South East Asia. big support from lecturers and campuses related to the ICA 2012 because this is an activity that is positive and constructive building Cyber Security leader for the campus and students. especially in the field of Cyber Security is in need.

The lack of professionals in the field of Cyber Security is because training and international certification in this field is very expensive and only best Universities in Indonesia who has qualified HR Lecturer. as for the commitment and serious implementation of Indonesian Cyber Army 2013. Lack of knowledge on different types of cyber threats and unfamiliar on how to prevent this threats.In addition the International Certification in the field of Cyber Security is also an important thing to own by every professional in this field. especially in this field of security. 3 . lack of planning and implementing security policies and controls. Therefore. we collaborated with APTIKOM with the purpose and objective to encourage APTIKOM members to participate in the incoming Indonesian Cyber Army 2013 competition to build the future in Cyber Security leader in the global cyber environment.

team building and facilitate the development of advanced expertise and skills of the students. CYBER ARMY COMPETITION ICA competition is divided into two categories. • Build the confidence of individuals and gives awards to those who participated and managed to become a winner. • Inspire. Capture the Flag 4 . 1. • Measure the capacity of student knowledge in Cyber Security through the competition. • Teach students to compete in a good manner of Cyber Security competition with the knowledge.II. PURPOSE AND OBJECTIVES The purpose and objectives to achieve this competition are: • Accommodate. skills and creativity. distribute. • Increase motivation and develop talents and interests of students in the field of Cyber Security. and develop the skills and creativeness of the students. III.

In the field of Cyber Security. CTF is a competitive war of defense and security of computer systems. The objectives is however to engage the students’ knowledge on the techniques used to bypass the security which has been already put in place and to gauge that if the students could possibly find the vulnerabilities and exploit it.It mainly focuses on the infiltration of a particular system purposely designed with some vulnerabilities and also with security. Basic Attack .Specifically on Attacking web services on PHP The second level goes complex where we have given them a CTF image of "Java based exploitation" and the Third level is based on combination of multiple source code based vulnerabilities. The team or the students who could methodologically find these loopholes and exploit it shall be declared a winner. CTF is based on Computer Hacking which is not only put high ethical professionals but also wanted to test the skills and knowledge of students in Indonesia. It was designed as a game that educate participants of the competition to secure the server machine services as well as reacting to a series of attacks that occur in the real world. This CTF game was first popularized at hacker conference DEF CON known in Las Vegas. USA.Capture the Flag (CTF) is a safe and legal competition that aims to test the defensive and offensive capabilities to solve challenges related to Cyber Security that has been prepared by the committee. 5 . The levels which we have given would be from: • • • The first level. This competition not only fulfills the game but also education in the field of Cyber Security. followed by several teams of players (multi player) with a target value of points in the specified time period.

It could be in Terabytes size. On the process of the forensic investigation. Forensic Investigation Forensic Investigation where its objective is to allow the students to understand capturing. then required to answer the questions pose. This competition is to test participants’ ability to analyze network attacks happened to a computer or server. and analyzing network data. each participants shows their skills ranging from identification and analysis techniques to find the target and the attacker. Participants were given a file that contains all the data that have come out and get in when the computer is attacked. Forensic Investigation Competition primarily focuses on the past event which has already happen.2. sorting. There are many challenges to this as network traffic is not as volatile as a hard drive based forensic. Each participants where given an evidence file that has been prepared by the committee where each team asks to analyse the structure of the data packets or the hard drive images. 6 .

The projector which is connected to a Game Server will display the assessment board. The students not only would be analysing the evidence but also to critically understand the chain of evidence involved in forensic investigation. It was designed like a game of defense and attack. 2. arranged in a LAN network. There will be rules to followed so that the competition will run with honest. Each team occupies an area or table that there is a server machine that must be maintained. These competitions is usually done in a large meeting room. It is also connected to a game server machine which is controlled by the committee to monitor the game. fair and ethical. Requirements of ICA Competition Registration requirements of participation in the competition: • • Active students and registered from Higher Education Institutions in Indonesia. IV. so all server machine of each team are interconnected. 7 . Participants are required to bring their laptop. It is not allowed to peek into the data network or poison the data network of the opponent. One team represents from one (1) Institutions of Higher Education. representatives from Higher Education Institutions in Indonesia.The objective are simply to find out the when / where / how / what/which tools exploits and location which was involved in the crime scene. The maximum number of participants is 30 teams. DETAILS AND REQUIREMENTS FOR THE COMPETITION 1. Participants for the Competition This competition is intended for students throughout Indonesia who is reliable in Linux operating and exploitation methods. where each team is consists of 3 persons.

Each team are not allowed to inactivate this account. Ability to manage and secure server computers. The main server is the target that can be attacked by each opponent. Communication channel is available for discussion or answering technical issues with the committee. This image is locked. Meet the technical requirements specified by the committee. Software required in this game will be designed and developed by the committee. Technical details of the competition: • • • • • • • All traffics will be logged or written. Technical skill requirements of team members for Capture the Flag: • • Master in Linux and methods of Exploitation. distributed and installed before the start of the competition. Server computer services is a part of the image-VMWARE. Technical requirements of software and hardware to be used: • • • Windows XP SP3 fully patched and 1GB of RAM for "VMWARE".i5 and at least 2 GB of RAM for server for each team. Minimum Core Processor i2 . It is not allowed to use Security Tools except Backtrack 5R1 for the client computer. Register and sign the following statement of following the rules and regulation of the competition with ethics of professionalism. Regulation will be announced on the start of the game.• • • Bring a letter of recommendation as a representative of higher education institutions concerned. 8 . The image has the ability to order the committee to come and check if there is a team violates the rules.

Additional scores can be gained by patching the vulnerabilities of the services and exploiting the knowledge of the found weaknesses at the other team's servers. as well as keeping services up and functional during the course of the game. functional and uncompromised for the duration of the game. while simultaneously trying to get access into the computer server of the opposing team. mail server. or customized services. Each team participant hosting a server that has multiple services running such as web server. Each successful penetration gains points. Distal data to manageable levels by employing filters and analysis. CTF competition framework: The main task is to maintain a server running multiple services. 9 . These services have specific security flaws that make the server can not perform its functions properly. Description: This game consists of multiple teams participating in a local area network (LAN) that are connected to each other. The main goal of the game is to maintain the services up. The skills sets that would be required from a student would be tuning of IDS solutions and identification of security breaches via log and network traffic. • Forensic’s Investigation Game: Investigation Forensic’s proposed objective of the project is allow students to find details of network events after they have happened.3. Systems of the Competition • Capture the Flag’s Game: Structure: Team participants will receive preconfigured systems and services that they must maintain and protect.

V.The traffic forensic challenge scenario would be based on a pre captured traffic data that will be presented to the students where they will have to analyze the timeline and come up with a conclusive report explaining the chain of events that has happened and how do they relate to the crime that has happened. Themost conclusive and complete findings shall be deemed as the winner on this competition. ENDORSEMENT OF THE EVENT This event was endorsed by the following departments from the government. Details of the Competition and Scoring System Details of the competition and scoring system will be post through website and will inform via e-mail to all participants. 4. Judges of the Competition and Trainer for the ICA Team Members Judges and Trainers who will be involved in this competition is a person who has experienced in the field of Cyber Security. industries and institutions: • • • • • • • • • KOMINFO DETIKNAS DIKTI DEPHAN POLRI APTIKOM ACAD CSIRT Vendors and Partner ICT Industry 10 . 5. well-known and has a good reputation in IT industry.

00 : VIII. Desmond Devendran Mr. STRUCTURE OF THE COMMITTEE 1.00 : 10.ACAD CISRT . IGN Mantra Dr.00 – 10.00 : 16.00 – 17. Onno W Purbo Prof Rahmat Budiarto .00 : 10. Indonesia VII.Pakar Telematika .00 : 16. Richardus Eko Indrajit Prof.DETIKNAS .00 : Day 2: Training and Closing Review Capture The Flag Training Forensic Investigation Training Closing 9. Yamin No.APTIKOM .00 – 16. Steering Committee The steering committee of this event are coming from the respectable organizations and institutions: • • • • • • Prof. SCHEDULE AND VENUE OF THE COMPETITION This Indonesian Cyber Army Competition 2013 event of activities will be hold on the specified venue and schedule mentioned below: Date: Time: Place: 29-30 October 2013 09:00 – 17:00 WITA STMIK WIDYA CIPTA DHARMA Jl M. Samarinda. ICA EVENT PROGRAM Day 1: Competition Opening Remarks Capture the Flag and Forensic Investigation Competition Announcement of Winners and Awarding 9. 25.00 – 17.UUM 11 .00 – 16.00 – 10.FORESEC .VI. Zainal A Hasibuan Mr.

FCCH. S. M. M.Pd Marketing and Communication Division Coordinators : Ms. CEI. S. S. BSCS Mr. ST. ST. Andrea Reza. Gemma Panopio-Sonaka. Ade Nugraha. Siti Qomariah.Kom 12 . MT Mr.Kom Creative and Production Division Coordinators Graphic Designer Web Developer : : : Mr. Fajrin Armawan Accommodation and Transportation Division Coordinator : Ms. MM. Gede Putu Krisna Juliharta. Agus Setiawan. M.Kom Mr.Kom Mr. Yunita. Dimas Fahreza Mr. Organizing Committee This competition was organized by the following professionals coming from different organizations and institutions: Chairman Vice Chairmans : : Mr. SS Ms.Kom Supplies and Equipment Division Coordinator : Mr. Ikhsan. Henny Pratiwi. Suryayusra.Kom Mr. FCDR Mr.Kom. CISCP. CIPMP Mr. Silvia Aprilia. Said Hasibuan. FCNS. ST. M. Basrie. S.2. S. CEP. S. M. Awang Harsa Kridalaksana Ms. Khairil.Kom Mr. M. Gde Sastrawangsa. Roy Rudolf Huizen. MMSI Ms. SE Secretaries : Workshop and Socialization Division Coordinators : Mr.Kom Mr.

13 . CLOSING Based on this proposal that we prepared. academician and ICT Industry so that this event can be implemented properly and give more benefits for the development and progress of Cyber Security in Indonesia.IX. we hope that we can get the full support from the government departments related to Cyber Security.

4. 1. 2. 6. 6. Medan. INTRODUCTION Indonesian Cyber Army (ICA) 2012 Competition held at STMIK Potensi Utama. Each region has sent their best champ that has accummulated to almost 20 teams from Banda Aceh. 2. a first nationwide event which was held in the city of Medan. Medan on October 16-18. 8. Lampung. 4. 10. 5. LIST OF COLLEGES AND UNIVERSITIES JOINED IN ICA 2012 List of colleges and universities who joined the CAFTURE THE FLAG Competition: No. Bengkulu.I Yogyakarta Bali Jakarta Aceh Jakarta Sumatera Utara Sumatera Utara 14 . Yogyakarta. 8.APPENDIX: INDONESIAN CYBER ARMY 2012 I. 9. Name of Team Cyber of Unived Shutdown ITCentrum Forensic TCP Ninja UIN FST Jakarta Unimal Cyber Army TI-FTUP STMIK Potensi Utama UNIKA Thomas College/University Universitas Dehasen Universitas Indonesia Universitas Islam Indonesia STIMIK STIKOM Bali UIN Jakarta Universitas Mallikusaleh Universitas Pancasila STMIK Potensi Utama UNIKA Thomas City Bengkulu Depok Sleman Denpasar Jakarta Banda Aceh Jakarta Medan Medan Province Bengkulu Jawa Barat D. 3. 9. 3. Palembang. 7. 1. Name of Team Neophyte redEagle Ubidar ITCentrum Capture Newbie Army Perbanas Security Group (Pes-G) Unimal Cyber Army DCC Linux Community STMIK Potensi Utama UNIKA Thomas College/University Universitas Indonesia Universitas Stikubank Universitas Bina Darma Universitas Islam Indonesia STIMIK STIKOM Bali ABFII Perbanas Universitas Mallikusaleh STMIK DCC Lampung STMIK Potensi Utama UNIKA Thomas City Depok Semarang Palembang Sleman Denpasar Jakarta Banda Aceh Lampung Utara Medan Medan Province Jawa Barat Jawa Tengah Sumatera Selatan D. 5. Depok. 2012. II. 7. Jakarta. Semarang and Denpasar.I Yogyakarta Bali Jakarta Aceh Lampung Sumatera Utara Sumatera Utara List of colleges and universities who joined the FORENSIC INVESTIGATION Competition: No.

Said Hasibuan (IBI Darmajaya). looking for the principal hosts and endorsement for the event. Bengkulu STMIK Atma Luhur.There are almost sixty (60) students who joined the two (2) competitions from different colleges and universities in ten (10) provinces. Jambi 15 . General Manager of Multimatics and Chairman of the ICA Competition 2012. Roy Rudolf Huezin (STIKOM Bali). colleges and universities: • • • • • • • • • • • • • • APTIKOM Academic CSIRT DETIKNAS MULTIMATICS FORESEC STMIK Potensi Utama.” He added that. Semarang STIKOM Dinamika Bangsa. together with the team Dr. Desmond Devendran (FORESEC). “this is just a start-up capital to find a true warrior and competent in the realm of cyber security. Jakarta Universitas Dehasen. Agus Setiawan (Multimatics). and Mr. This competition was organized and led by Mr. Not all provinces are able to send a representative. too many campuses and universities are interested to join this event but they are not ready in terms of the budget. According to Mr. Agus Setiawan.Pangkal Pinang Universitas STIKUBANK. Mr. and recruiting the participants. due to limited time of preparation. “the competition in the field of cyber forensics is the first time held in Indonesia where the slogan is “There is Always a Trail Left by Hackers”. Palembang STIKI Malang UIN Syarif Hidayatullah. Starting from recruiting the team. Indeed. finding the committee and juries for the competition. institutions. Two months preparation after we got the confirmation that we can run this event is not enough. This event was supported and endorsed by the following organizations. Medan STIKOM Bali Universitas Bina Darma.

Mr. Dr. III. IGN Mantra and FORESEC. Sastra (Stikom Bali). 16 . institutions and universities: From left to right: Mr. INDONESIAN CYBER ARMY TEAM Indonesian Cyber Army Team were represented by the following organizations. IGN Mantra (Acad Csirt). Mr. Dr. Desmond Devendran. Krisna (Stikom Bali). Mr. Suryayusra (UBIDAR) and Mr. Roy (Stikom Bali). CEO (Foresec). Desmond Devendran where they are independent body.Some involved in the selection of the jury in this field where came from Academic CSIRT. Mr. THE COMPETITION ICA competition was divided into two categories. General Manager (Multimatics). the Capture the Flag Competition and Forensic Investigation Competition. Capture the Flag Competition ( Hacking)which mainly focuses on the infiltration of a particular system purposely designed with some vulnerabilities and also with security. IV. Agus Setiawan. Said (IBI Darmajaya). Mr. Mr.

play with honest and integrity and be one of the professional cyber army in Indonesia. Imagine it as a CSI job. Whereby the participants would have the analyse the structure of the data packets or the hard drive images. The Indonesian Cyber Army Competition has been started from preparing the equipment. Mr. Agus Setiawan opened the Indonesian Cyber Army Competition and gave his welcome remarks speech followed by encouraging all teams to do their best. 17 .While the Forensic Investigation Competition primarily focuses on the past event which has already happen. checking its connection and installing the program for each computer of each team which was fully supported by STMIK Potensi Utama.

This is a timed competition using a count down timer. Each team should make sure that they can hit their target before the time finish. A five (5) hours non-stop competition without break. And the war began. showing the 19 teams trying to hack and defense each other. the participants just get their snacks which is provided in their table. 18 .

It is a U-shaped style of arrangement for the competition. THE TRAINING 19 . One of the team trying to capture the flag. where on the left side are ten (10) teams for Capture the Flag and the right side are nine (9) teams for Forensic Investigation competition. One line in front where Juries are seated to monitor the paralleled competitions. V.

Desmond where the students shows their enthusiasm to learn and add more knowledge to equip them on how to become a good cyber army Forensic Investigation training conducted by Mr. Desmond Devendran for Capture the Flag and Forensic Investigation given by Mr. 2012.On October 17. Capture the Flag training by Dr. where the students are eager to listen and learn more about forensic investigation 20 . IGN Mantra to equip them to become the future leader in the Cyber Security field. free training were given to all participants by Dr. IGN Mantra. and these future leaders will join the Indonesian Cyber Army Team.

awarded by Mr. Palembang. 21 . the most awaiting moment of the competition. ANNOUNCEMENT OF THE WINNERS October 18. Agus Setiawan. Desmond Devendran from FORESEC. Jakarta. Winners for the Capture the Flag Competition goes to the following: First (1st) winner for Capture the Flag goes to Bina Darma Cyber Army Team from Universitas Bina Darma. awarded by Dr.VI. the announcement of the winners for Capture the Flag and Forensic Investigation Competitions announced by Mr. Second winner goes to Neophyte Team from Universitas Indonesia. Rico Rasota Rahmada from KOMINFO. 2012.

award by Mr. 22 . Ketua Yayasan. STMIK POTENSI UTAMA.Last or Third (3rd) winner for Capture the Flag goes to redEagle Team from Universitas Stikubank. Denpasar. Winners for the Forensic Investigation Competition goes to following: First (1st) winner for the Forensic Investigation Competition were goes to TCP Ninja Team from STIKOM Bali. awarded by Mr. Said Hasibuan from IBI Darmajaya. Semarang. Bob Subhan Riza.

Vice Rector from STIKOM Bali. awarded by Mr.Followed by IT Centrum Forensic Team from Universitas Islam Indonesia. IGN Mantra from Academic CSIRT. The last. Yogya as the second (2nd) winner. Roy Rodulf Huizen. 23 . third (3rd) winner goes to Shutdown Team from Universitas Indonesia. Jakarta. awarded by Mr.

if we can reach most of the colleges in APTIKOM. The participants were considered to be close to the ability of Professional Forensics Investigator. especially in the category of Digital Forensics. Dr. The big family of Indonesian Cyber Army 2012 According to Mr.According to a team judges from Malaysia. Agus Setiawan as chairman of the committee. these kids are very talented and enthusiastic championship. Desmond Devendran. they are such professionals. the alumni of Indonesian Cyber Army Competition has received national recognition and this competition is expected to be even greater in year 2013. 24 . just train and add more hours that would make them professionals in the field of cyber security and cyber forensics.