September 15, 2016 By Anna Seacat 2 min read

What does a team of talented and highly motivated interns do when paired with the expertise and capability of professionals in IBM Managed Security Services? Develop an interactive IBM hacking competition, of course.

I am intrigued by the idea of matching young, capable college students with seasoned IBM professionals to create interactive events. Knowing this, Diane Delaney, a worldwide talent manager at IBM, recommended I interview Chelsea Williams, one of the interns chosen to develop the IBM hacking competition.

An Intern Dishes on the IBM Hacking Competition

Question: Can you give us an idea of what this project was all about?

Williams: Sure, it was a Capture the Flag (CTF) event and was designed to test offensive, or red team, skills of the participants. Although these skills often fall into the realm of black-hat hacking, the thought is that without knowing how to break into a system, you can’t truly know how to secure a system. Thus, a CTF allows for these skills to be tested and developed.

The CTF, which we designed, hosted 15 teams consisting of 60 IBM employees from Managed Security Services.

That sounds like a very cool project for IBM interns. How did you and your fellow interns contribute?

Well, we started off with building the hardware that was required. Then, we were involved in physically building the servers to house the required hardware. By the end of the setup, we had four physical servers racked into the lab server racks.

Once the servers were installed, the networking had to be implemented according to documentation that was designed. From that point, the infrastructure was ready to be configured for the games to start. One of the servers was designated to host Kali Linux, the operating system used by participants to interface with the rest of the environment.

We were responsible for the master virtual machine (VM), from which 20 clones were created, and each team was given its own VM. We were also responsible for the creation and testing of the various machines and challenges used throughout the CTF. We tested the challenge machines and ensured the walk-throughs were in place, just in case the teams required assistance throughout the two-week event.

Wow! What a great hands-on learning experience! What will you take away from this?

I have met and worked with some pretty incredible IBMers. We all worked tirelessly to make the CTF competition a success, which is what makes it so memorable. I have thoroughly enjoyed working as an intern for IBM, and I am very grateful to represent a company that values the input from and collaboration with students.

Everyone Wins

The winner of the IBM hacking competition was team “Boom!” — a group of security correlation engineers at IBM. But, clearly, Williams and her fellow interns will be counted among the winners as well.

More from Mainframe

How dangerous is the cyberattack risk to transportation?

4 min read - If an attacker breaches a transit agency’s systems, the impact could reach far beyond server downtime or leaked emails. Imagine an attack against a transportation authority that manages train and subway routes. The results could be terrible. Between June of 2020 and June of 2021, the transportation industry witnessed a 186% increase in weekly ransomware attacks. In one event, attackers breached the New York Metropolitan Transportation Authority (MTA) systems. Thankfully, no one was harmed, but incidents like these are cause…

Low-code is easy, but is it secure?

4 min read - Low-code and no-code solutions are awesome. Why? With limited or no programming experience, you can quickly create software using a visual dashboard. This amounts to huge time and money savings. But with all this software out there, security experts worry about the risks. The global low-code platform market revenue was valued at nearly $13 billion in 2020. The market is forecast to reach over $47 billion in 2025 and $65 billion in 2027 with a CAGR of 26.1%. Very few,…

Starting From Scratch: How to Build a Small Business Cybersecurity Program

4 min read - When you run a small business, outsourcing for services like IT and security makes a lot of sense. While you might not have the budget for a full-time professional on staff to do these jobs, you still need the services.However, while it might be helpful to have a managed service provider handle your software and computing issues, cybersecurity for small and medium businesses (SMBs) also requires a personal, hands-on approach. While you can continue to outsource some areas of cybersecurity,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today