[go: up one dir, main page]

0% found this document useful (0 votes)
95 views3 pages

CTF Event Guide

The Capture The Flag (CTF) event is a cybersecurity competition where teams solve challenges in areas like cryptography and web security to find 'flags'. Teams must consist of two students, and fair play is emphasized with strict rules against cheating and attacking event infrastructure. Participants will be ranked based on their scores and time taken, with the organizers' decisions being final in case of disputes.

Uploaded by

harish2110921
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
95 views3 pages

CTF Event Guide

The Capture The Flag (CTF) event is a cybersecurity competition where teams solve challenges in areas like cryptography and web security to find 'flags'. Teams must consist of two students, and fair play is emphasized with strict rules against cheating and attacking event infrastructure. Participants will be ranked based on their scores and time taken, with the organizers' decisions being final in case of disputes.

Uploaded by

harish2110921
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

A Capture The Flag (CTF) event is a puzzle based competition where participants

solve challenges in various fields, such as coding, logic, and problem-solving. It


is a cybersecurity competition to find weaknesses and exploit loopholes in
various computer programs. CTF aims to engage participants in the creative
exploration of real-world computer security by distilling the significant
disciplines of professional cybersecurity into short, objectively measurable
exercises.
• It will be a ‘Jeopardy!’ style event.
• There will be a set of challenges from different categories like
cryptography, web security, forensics, steganography, reverse
engineering, binary exploits, etc.
• The challenges can either be a collection of downloadable files to find
the “flag” or running it as web services in which the participants try to
connect and exploit to retrieve the Flag.
The participants will be ranked based on their scores, and the time taken will
be used as a tiebreaker.

Event Categories:
➢ Steganography
➢ Cryptography
➢ Reverse Engineering
➢ OSINT
➢ Web Exploitation (Offensive Security , Defensive Security)

Team Composition Rules:


• Team Name:
o Teams must choose a unique name that is appropriate and not
offensive.
o No impersonation of other teams or organizations.
• Team Size:
o A Team must contain 2 members.
o Individual Participant not Allowed.
• Team Formation:
o Teams must be formed and registered before the competition
starts.
o No last-minute changes unless approved by organizers.
o No player can be part of multiple teams.

• Eligibility:
o Open to students only.
o Participants must comply with the event’s code of conduct

CTF Challenge Rules:


• Fair Play & Restrictions:
• DO NOT Attack the event infrastructure (e.g., DoS, brute-forcing,
exploiting unintended vulnerabilities).
• Any team violating this rule will be banned immediately.
• Flag Submission:
• Flags must be submitted via the official CTF platform only.
• Hints & Assistance:
• Challenge hints may be released at the organizer’s discretion.
• General Conduct:
• No flag sharing, collaboration with other teams, or external
assistance.
• Sharing flags or solutions is considered as cheating and may result
in disqualification.
• Respect other teams and organizers—Improper behavior may lead
to disqualification.
• Final Decisions:
• The organizers’ decisions are final in case of disputes or rule
violations.
• Incorrect Flag Submission Penalty:
o Repeated abuse or flag guessing may lead to point deductions or
disqualification

Permitted Tools & Resources:


• Participants are required to bring their own laptops or devices.
• While the college Wi-Fi will be accessible, it is recommended to have a
personal mobile hotspot as a backup in case of connectivity issues.
• Pre-written scripts are allowed.

Judging Criteria:
• Each category contains a variety of challenges of different point values
and difficulties.
• Participants will be ranked based on their scores, and the time taken to
solve the challenge will be considered in case of a tie.
• The decision of the organizers will be final.

You might also like