How to Win CCDC

Press 's' to show speaker notes...

Repo

The Playing Field

CCDC isn't a CTF. It's a business simulation. You inherit a broken corporate network full of vulnerabilities, and your job is to keep the business running while professionals try to take it apart.

Three things matter: Service uptime, business injects, and not getting owned.

How Scoring Works

  • Service Availability (~50%) - Automated scoring engine polls your services
  • Business Injects (~50%) - Tasks from the Orange Team / management
  • Red Team Penalties - Points deducted for breaches
    • User-level access: minor penalty
    • Root/admin access: major penalty
    • PII/PHI exfiltration: massive point loss (highest at Nationals)

The Teams: Who's Who

Not everyone at CCDC is trying to ruin your day. Most of them are there to help. Learn who they are.

↓ Scroll down for each team

Blue Team (That's You)

  • Student competitors representing your school
  • Secure the inherited network
  • Keep services up and scored
  • Complete business injects
  • Hunt threats and respond to incidents

White Team (The Judges)

  • They observe, evaluate, and judge your performance
  • They grade your injects and incident response reports
  • They are the final word on rule disputes
  • Be professional with them - they're evaluating you as much on conduct as technical skill

Black Team (Infrastructure)

  • They built and maintain the competition environment
  • Scoring engine, networking, virtualization - that's all them
  • You can request help if you completely lose a box, but it costs points
  • That cost scales on a Fibonacci sequence - 1st request is cheap, 5th is devastating

Orange Team (The Business)

  • Simulated executives, employees, and clients
  • They submit business injects - helpdesk tickets, policy requests, CEO briefings
  • They evaluate your professionalism and communication
  • Do not ignore them to fight the Red Team

Red Team (The Adversary)

  • Professional penetration testers and offensive security researchers
  • Their job: breach your systems, steal data, disrupt services, maintain access
  • They simulate advanced persistent threats

Gold & Green Teams

Gold Team - Event administration, logistics, sponsorships. You probably won't interact with them much.

Green Team - They help Black Team deploy and tear down the competition infrastructure. They ensure every Blue Team starts with an identical environment.

Focus!

At Nationals and at each Regional things will be different, however the thing you'll hear repeated at every event is "Do your injects!". Effective teams identify what tasks create the most amount of points for the least amount of effort.

Obtain Mentors

In Zak Thoreson's blog post he mentions reaching out to industry professionals for help preparing for the competition. DO THIS! Invite the Red Team to come talk about / perform / demo attacks and their defenses.

Everyone has a plan...

Until they get hit in the mouth -- Mike Tyson

Demystifying the Red Team

Let's talk about what Red Team actually does. Because it isn't magic.

Red Team Reality Check

What Red Team does is not magic:

  • We run the same tools you can download and learn
  • We exploit the same misconfigurations you can find and fix
  • We automate heavily - our scripts change passwords, plant backdoors, and exfiltrate data faster than any human types
  • We know operating systems deeply because we break them all year long
  • We talk, share notes, and build on each other's work constantly

Common Misconceptions

  • You use 0days! - Not usually
  • You have a head start! - Nope
  • You have advanced tools! ...sure, if you call RDP advanced
  • You're doing something we can't understand! - Everything we do, you can learn to detect and prevent

What Red Team Actually Targets (1/2)

In order of what we try first:

  1. Default and weak credentials - always, every time, first thing
  2. Unnecessary services - if it's running and you don't need it, we'll use it
  3. Egress to our C2 servers - reverse shells, DNS tunnels, HTTP callbacks
  4. Your automation infrastructure - if we own your Ansible server, we own everything

What Red Team Actually Targets (2/2)

  1. Lateral movement via AD - Kerberoasting, Pass-the-Hash, GPO abuse
  2. Web application backdoors - webshells dropped in your scored web apps
  3. Data exfiltration - PII/PHI from databases for maximum point damage

The First 15 Minutes

The competition is often won or lost here. Red Team hits you with automation immediately. Your counter: have your own automation ready.

The Checklist

Three things, in this order, as fast as possible:

  1. Mass credential rotation - every account, every service, every database, all at once
  2. Egress filtering - default deny outbound, whitelist only what's scored
  3. Kill unnecessary services - if it's not scored, turn it off

Practice and Preparation

Prep Notes

  • Create a play-book
  • Automate everything you can
  • Have a copy for every member, even if it's not their focus area
  • Have a list of shortened / easily typed URLs for everything

What to Bring (on paper)

  • Password sheets of easily typed, long, passwords
  • Cheat sheets of useful commands
  • List of known / standard users per OS
  • List of known / standard services per OS
  • Inject response templates ready to customize
  • Incident response report templates (NIST 800-61 format)

Consistency is King

Red Teamers practice 12 months a year. CCDC season is only Feb through April.

  • Build a lab and break it. Rebuild it. Break it again.
  • Practice your automation until it's muscle memory
  • Run mock competitions with your team
  • Study Red Team tools and techniques - learn what you're defending against
  • Cross-train so everyone can cover at least two roles

Know Your Team

Roles and Chain of Command

  • Team Captain / Incident Commander
  • Injects Lead / Business Liaison
  • Networks and Firewall Lead
  • Linux Systems Administrator
  • Windows and Active Directory Administrator
  • Services and Web Administrator
  • Threat Hunter / Incident Responder
  • Automation and Deployment Engineer

Team Captain

  • Make sure everyone is focused on the most important tasks
  • Coordinates interdisciplinary requirements
  • Focuses on maximum completion of injects
  • Answers to CEO
  • Insures that nothing distracts other team members
  • Monitors the scoring dashboard
  • Becomes Incident Commander when breaches occur

Injects Lead / Business Liaison

  • Manages the Orange Team interface
  • Translates technical work into professional business documents
  • Owns inject deadlines - late submissions get zero points regardless of quality
  • Has pre-compiled templates for policies, memos, and reports
  • Works in parallel with the technical team, not in series

Firewall Admin

  • RAISE SHIELD Mr Sulu!!
  • Egress and Ingress filter quickly
  • Default deny outbound, whitelist scored services
  • You are the choke point - if Red Team can't call home, their persistence dies
  • Help your team identify malicious traffic

Linux Admin

  • Move or disable SSH if it isn't scored
  • Automate hardening with Ansible playbooks
  • sysctl hardening: disable ICMP redirects, restrict kernel pointers
  • SELinux/AppArmor - enforce it, don't disable it
  • Fail2Ban on anything accepting auth
  • Know systemd - that's where persistence hides

Windows Admin

  • PowerShell is your best friend and worst enemy
  • Group Policy Objects are how you enforce security at scale
  • Kerberos attacks (Kerberoasting, AS-REP Roasting) are Red Team favorites
  • Sysmon + Windows Event Forwarding = visibility
  • Windows Defender is actually good now - make sure it's running and updated
  • Know how to find and kill persistence in the registry, scheduled tasks, and WMI

Services and Web Admin

  • Maintain uptime for all scoring engine services
  • Audit web applications for backdoors immediately - check for recently modified PHP/ASP files
  • Secure databases: rotate creds, restrict network access, back up scored data
  • ModSecurity or similar WAF in front of web apps
  • Docker/Kubernetes: know container escapes and how to prevent them

Threat Hunter / Incident Responder

  • Assume you're already breached - hunt from minute one
  • Centralize logs: Splunk, Graylog, or ELK
  • Monitor for anomalous egress: odd DNS queries, unexpected outbound connections
  • Baseline normal behavior, alert on deviations
  • File integrity monitoring on critical paths
  • IR reports using NIST 800-61 framework

Automation Engineer

  • Deploy hardening playbooks in the first minutes - Ansible, PowerShell DSC
  • Version control your automation - Git
  • Secure your automation infrastructure - if Red Team owns your Ansible server, they own everything
  • Use least-privilege service accounts for automation
  • Test your playbooks before competition day

Physical Space

  • Go into blackout - no phones, no outside communication
  • Violation means disqualification
  • Organize your workspace - monitor layout matters under stress
  • Printed playbooks, cheat sheets, and password lists
  • Whiteboard for service status and inject deadlines

Injects

  • Injects are IMPORTANT. Do not fail to turn in SOMETHING for them. Partial credit is way better than nothing.
  • They range from "add a user to AD" to "present a disaster recovery plan to the board"
  • Late submissions earn zero points regardless of quality
  • Professional formatting matters - use complete sentences, proper tone

Know Your Network

  • Map everything in the first 10 minutes - what's running, what's scored, what shouldn't be there
  • Cross-reference against the team packet topology
  • Document IP addresses, services, and credentials as you discover/change them
  • Segment where possible - the flat network is Red Team's playground

Know Your Defenses

Layer your defenses - no single control stops everything

  • Perimeter: firewall egress filtering
  • Host: endpoint protection, sysctl hardening, GPOs
  • Application: WAF, input validation, secure configs
  • Data: encryption, access controls, backups of PII/PHI
  • Monitoring: centralized logging, alerting on anomalies

Know Your Enemy

  • Study Red Team writeups and debrief videos
  • Learn the tools: Metasploit, Cobalt Strike, Impacket, Sliver, Mythic
  • Understand common attack chains, not just individual techniques
  • MITRE ATT&CK framework maps techniques to detections
  • The best defenders have offensive skills

Cloud and Modern Infrastructure

Some regions (especially Northeast) now deploy entirely on cloud infrastructure. Be ready for:

  • AWS / Azure / GCP fundamentals
  • Terraform and Infrastructure as Code
  • Kubernetes cluster defense
  • IAM and identity-based security
  • Cloud-native logging (CloudTrail, CloudWatch)

Regional Specific Notes

↓ Scroll down for regions

Pacific Rim Region

  • Washington, Idaho, Oregon
  • Single virtual qualifier in early February

Western Region

  • Arizona, California, Nevada
  • Hosted primarily in Southern California

Rocky Mountain Region

  • Colorado, Kansas, Nebraska, Utah
  • Denver-based finals, virtual qualifier narrowing the field to eight teams

At-Large Region

  • Variance region for geographically displaced or unaffiliated institutions
  • Single virtual qualifier in late February

North-East Region

  • New England states and New York
  • Pioneering cloud-native environments (AWS, Kubernetes, Terraform)
  • Virtual qualifier narrowing 24 teams to a 9-team regional final

Mid-Atlantic Region

  • Delaware, DC, Maryland, New Jersey, North Carolina, Pennsylvania, Virginia, West Virginia
  • Scores are ordinal (1st in category get 1 point, 8th, 8)
  • Team Captains that go into CEO meetings with statistics like # of services online, # of injects completed, usually have better meetings

South-East Region

  • Alabama, Florida, Georgia, Mississippi, South Carolina, Tennessee
  • Single virtual qualifier in early February

South-West Region

  • Arkansas, Louisiana, New Mexico, Oklahoma, Texas
  • Single virtual qualifier in early February

Mid-West Region

  • Illinois, Indiana, Iowa, Kentucky, Michigan, Minnesota, Missouri, Ohio, Wisconsin
  • Most complex qualification: state-by-state qualifiers, then a regional wildcard round
  • The gauntlet ensures only the most battle-tested teams emerge

The Wildcard

Second-place teams from all nine regions compete in a sudden-death Wildcard event. The winner gets the 10th and final slot at Nationals.

Red Team Debriefs

Questions?