Our applied security contest (also called CTF as in "Capture The Flag") opposes 50 teams of 8 people trying to obtain the most points by capturing flags.
Those flags typically are secret messages hidden in different challenges.
The Challenges will be available to teams through a web portal on their own private contest network, they are not authorized to attack each other (it's not a red/blue team type of contest), they compete to have the most points on the leaderboard.
Challenges proposed will be from multiple security fields including:
networking, web application, binary reverse engineering, data forensics, hardware hacking, and more.
We add more items to your Internet of Things by providing hackable electronic badges that shines. It runs on programmable micro-controllers and features multiple I/Os. Examples from past years includes USB, Bluetooth LE, OLED screen, several LEDs and buttons. Everything the badge team does is open source software and open hardware.
Being an on-site CTF we have the unique opportunity to leverage physical access. Every year we try to innovate with a dedicated physical track that combines several disciplines. Electronic voting, kiosk hacking, smartcard, lock-picking, UEFI boot tampering, etc. wrapped around a tiny layer of social engineering.
Here are few resources to help you prepare for the competition:
To relax after several hours of non-stop CTF action we provide a social break in the shape of a friendly Hacker Jeopardy competition. Enjoy a beer while watching your peers failing at easy questions because of "stage fright".
46 Internet Simulations1 per team
92 Windows Virtual Machines2 per team
12,543 Linux Containers272 per team
11,244 BGP Router244 per team
3,647,800 IPv6 routing table entries79300 per team
100+ ChallengesChanging every year