Comprehensive reference guide and resources for AFA CyberPatriot competitions
Developed by Hawaii Baptist Academy CyberPatriot Team
This repository contains a comprehensive Competition Reference Guide for the Air Force Association's CyberPatriot National Youth Cyber Defense Competition. The guide provides prioritized checklists, commands, and best practices for securing Windows, Linux, and Cisco networking systems during competition rounds.
- Quick Reference: Instant access to critical security commands during 6-hour competition windows
- Prioritized Content: Organized by point value and common vulnerability patterns
- Best Practices: Compiled from previous competition winners and official CyberPatriot resources
- Multi-Platform: Covers Windows, Linux (Ubuntu/Debian), and Cisco IOS
Location: Honolulu, Hawaii
Mission: Defending Networks β’ Building Character β’ Serving Christ
Motto: "Be strong and courageous." - Joshua 1:9
-
Clone the repository:
git clone https://github.com/timames/CyberPatriot.git cd CyberPatriot -
Open the reference guide:
- Open
HBA_CyberPatriot_Reference_Guide.htmlin any web browser - Use during practice rounds and competition (if allowed by competition rules)
- Bookmark for quick access
- Open
-
Search functionality:
- Use the built-in search boxes to quickly find specific commands
- Filter by keywords like "user", "firewall", "password", etc.
- Tabbed Interface: Separate tabs for Windows, Linux, and Cisco
- Search Functionality: Quickly find commands by keyword
- Color-Coded Priorities:
- π΄ CRITICAL - Must-do items (Forensics, Backdoors)
- π HIGH - High-value items (15-30 points typically)
- π΅ MEDIUM - Important but lower priority
- First Steps & Competition Workflow
- User Management (15-30 points)
- Password Policy Configuration
- Service Hardening
- Firewall & Windows Defender
- Registry Hardening & Backdoor Removal
- Scheduled Tasks Analysis
- Local Security Policies
- Network Shares Management
- Media File Detection
- Program Management
- Windows Features
- Browser Hardening
- SysInternals Tools
- First Steps & Competition Workflow
- User Management & sudo Configuration
- Password Policy & PAM Configuration
- UFW Firewall Setup
- SSH Hardening
- Package Management & Updates
- Service Management
- Backdoor Detection (cron, rc.local)
- Kernel Hardening (sysctl)
- Antivirus (ClamAV, rkhunter, chkrootkit)
- File Permissions & Security
- Network Security
- Basic Security Configuration
- Interface Configuration
- VLAN Setup
- Static & Dynamic Routing (OSPF)
- Access Control Lists (ACLs)
- SSH Configuration
- DHCP Setup
- Port Security
- Verification Commands
- READ README THOROUGHLY - Note authorized users, admins, required services
- ANSWER FORENSICS QUESTIONS FIRST - Before ANY system changes!
- Take screenshot of initial score
- Document all changes made
- Backup current configurations
1. Forensics Questions (FIRST!)
2. User Management (15-30 pts)
- Disable guest account
- Delete unauthorized users
- Remove unauthorized admins
- Set strong passwords
3. Password Policy
4. Firewall - Enable all profiles
5. Windows Defender - Enable & scan
6. Services - Start critical, disable dangerous
7. Windows Update - Enable
8. Local Security Policies
9. Scheduled Tasks - Check for backdoors
10. Registry Hardening
11. Network Shares - Review/delete
12. Media Files - Search and remove
13. Programs - Uninstall unauthorized
14. Windows Features - Disable dangerous ones
15. Browser Hardening
1. Forensics Questions (FIRST!)
2. Lock root account
3. User Management (15-30 pts)
- Check UID 0 users
- Delete unauthorized users
- Remove unauthorized sudo
4. Password Policy (BEFORE changing passwords!)
- Install libpam-cracklib
- Configure /etc/login.defs
- Configure PAM
5. UFW Firewall - Enable
6. SSH Hardening
7. Updates - apt-get update && upgrade
8. Services - Disable dangerous services
9. Backdoor Detection - cron, rc.local, ports
10. Kernel Hardening - sysctl
11. Remove prohibited packages
12. Antivirus - Run scans
13. Media Files - Search and remove
14. File Permissions
- Modern web browser (Chrome, Firefox, Edge, Safari)
- No installation required - pure HTML/CSS/JavaScript
- Download
HBA_CyberPatriot_Reference_Guide.html - Open in browser
- Bookmark or keep tab open during competition
- Use search functionality to quickly find commands
The reference guide works completely offline - no internet connection required once downloaded.
Each command in the guide includes:
- Comment: What the command does
- Code: Exact command to run
- Context: When and why to use it
- Warnings: Important notes and gotchas
# Disable guest account (ALWAYS do this!)
net user guest /active:no
Each section is tagged with keywords for easy searching:
- Windows:
user,password,firewall,services,registry,scheduled tasks - Linux:
user,sudo,firewall,ufw,ssh,cron,sysctl - Cisco:
vlan,ospf,acl,ssh,interface,routing
- Read README First: Always follow the scenario instructions
- No Automation During Competition: CyberPatriot rules prohibit automated scripts during competition rounds
- Reference Only: This guide is for reference and learning - not for automated execution
- Understand Commands: Know what each command does before running it
- Practice First: Use this guide during practice rounds to become familiar
This repository is intended for:
- β Learning cybersecurity concepts
- β Practice rounds and training
- β Reference during competition (if allowed)
- β Post-competition analysis
- β NOT for automated script execution during competition
- CyberPatriot Official Website
- CyberPatriot Training Materials
- Cisco NetAcad - Free networking courses
- Marshall Cyber Club Checklists
- GitHub CyberPatriot Topics
- Windows Security Baseline
- Ubuntu Security Guide
- Cisco IOS Security Configuration Guide
We welcome contributions from the CyberPatriot community! Here's how you can help:
- Fork the repository
- Create a feature branch:
git checkout -b feature/new-command - Make your changes
- Test thoroughly
- Submit a pull request
- Add commands that are commonly useful in competition
- Include clear comments explaining what commands do
- Test all commands before submitting
- Follow existing formatting and structure
- Cite sources when applicable
- Additional commands or techniques
- Corrections to existing content
- New sections or categories
- Improved explanations
- Updated documentation
This guide was compiled from multiple sources including:
- Official CyberPatriot Training Materials
- DoD STIG (Security Technical Implementation Guides)
- Marshall Cyber Club Resources
- UAA Cyber (University of Alaska Anchorage) Windows Hardening Guide
- Community GitHub Repositories:
- CAMS-CyberPatriot/Linux-Checklist
- ponkio/CyberPatriot
- Multiple team repositories and checklists
- Previous Competition Experience
- Microsoft Security Documentation
- Cisco IOS Documentation
- Air Force Association for organizing CyberPatriot
- Hawaii Baptist Academy for supporting the team
- All previous CyberPatriot competitors who shared their knowledge
- Open source contributors in the cybersecurity community
This project is licensed for Educational Use.
- β Use for learning and educational purposes
- β Use during CyberPatriot practice and competition (following competition rules)
- β Modify and adapt for your team's needs
- β Share with other teams and educators
- β Do not use for malicious purposes
- β Do not violate CyberPatriot competition rules
This guide is provided "as-is" without warranty. Always verify commands before execution. The authors are not responsible for any system damage or competition penalties resulting from use of this guide.
CyberPatriot/
βββ HBA_CyberPatriot_Reference_Guide.html # Main reference guide
βββ HBA_Branding_Summary.md # Branding documentation
βββ README.md # This file
βββ resources/ # Additional resources (if any)
- Review the entire reference guide
- Practice with training images
- Memorize critical commands
- Understand what each command does
- Test your team's workflow
- Assign roles (Windows, Linux, Cisco specialist)
- Read README thoroughly
- Answer forensics questions FIRST
- Document all changes
- Take screenshots of score progress
- Communicate with team members
- Don't skip password policy setup
- Check for backdoors (scheduled tasks, cron jobs)
- Save configurations frequently
- Review scoring report
- Document what worked
- Note missed vulnerabilities
- Update reference guide with new findings
- Share knowledge with team
- Location: Honolulu, Hawaii
- GitHub: timames/CyberPatriot
- Open an Issue for bugs or questions
- Submit a Pull Request for contributions
- Check CyberPatriot Official Support for competition questions
If you find this guide helpful, please consider:
- β Starring this repository
- π Forking for your team
- π’ Sharing with other CyberPatriot teams
- π€ Contributing improvements