ISM Capture The Flag Contest 2023

Welcome to the ISM CTF Challenge!

Are you ready to put your cybersecurity and hacking skills to the test? Join us for an adrenaline-pumping Capture The Flag (CTF) contest. Whether you're a seasoned hacker or a newbie, this event is for you.

Get ready to:

  • Crack codes and solve puzzles
  • Uncover vulnerabilities
  • Compete with fellow hackers

Skill Development

CTFs are a great way to develop and hone your cybersecurity and hacking skills. Participants face real-world challenges, such as solving puzzles, exploiting vulnerabilities, and bypassing security mechanisms, which can significantly enhance their technical expertise.

Hands-On Experience

CTFs provide a hands-on learning experience that allows participants to apply their knowledge in a practical environment. It’s an opportunity to gain real-world experience in a controlled and ethical setting.

Problem-Solving

CTF challenges often require creative problem-solving and critical thinking. Participants must think outside the box to solve complex puzzles and overcome obstacles. This helps develop analytical and logical reasoning skills.

Community

CTFs bring together like-minded individuals who share a passion for cybersecurity. Participating in these contests is an excellent way to network with fellow enthusiasts, learn from others, and become part of a supportive and knowledgeable community.

Recognition

Many CTFs offer prizes and recognition for top performers. Winning or placing well in a CTF can boost your reputation in the cybersecurity field and open up career opportunities. It’s a chance to showcase your skills and earn recognition for your expertise.

Fun

CTFs can be a lot of fun and provide a sense of accomplishment when you successfully solve challenges. Whether you’re a beginner looking to learn or an experienced hacker seeking to test your skills, CTF contests offer a valuable and enjoyable experience.

Important dates

  • Registration between 1 – 20 November, 2023
  • Online training sessions between 1 – 22 November, 2023
  • CTF on November 25, 2023

Rules & Code of Conduct

The CTF Contest organizers are committed to providing an enjoyable and respectful environment for all participants. This code of conduct outlines our expectations for behavior and interactions during the event.

By participating in the CTF Contest, you agree to adhere to this code of conduct. We expect all participants to treat each other with respect, foster a culture of inclusivity, and prioritize ethical hacking practices.

Rules

  1. Eligibility:
    • Any student from the Bucharest University of Economic Studies
    • For 2023 edition students from other universities can participate based on invitation
  2. Fair Play:
    • The objective of the contest is to promote ethical hacking and responsible disclosure of security vulnerabilities.
    • Any malicious or destructive actions, including disrupting the CTF infrastructure or other participants’ activities is prohibited.
  3. Team Size:
    • The contest will take place in teams.
    • Each participant must register individually
    • Teams will be formed 2-3 days before the event. Team size will be announced later.
  4. Registration:
    • Registration is done individually by filling up the previous linked form
    • Teams will be defined on the CTF platform and individual participant can enroll
  5. Scoring:
    • Each challenge has a predefined number of points, which are visible on the CTF platform
    • By solving a challenge, each team will get a flag (a string value) which must be submitted into the CTF platform. If the flag is correct, the team will be awarded with a number of points
    • After a number of successful flags submissions for a challenge, the points will be decreased by 50%
    • Explain how points are awarded for solving challenges.
    • In case of a tie the team with the most solved challenges will have .
  6. Flag Submission:
    • Each challenge has a flag with the format {ISMCTF………}
    • Flags will be submitted using the CTF platform. Each challenge has a submission button
    • After the submission the team will get the points and a success message. If the flag is not correct, you get a warning
  7. Cheating:
    • Cheating by sharing flags with other teams is prohibited
    • Getting help from non-participants is prohibited
    • Helping others is allowed but don’t share the flags
  8. Disqualification:
    • Teams that solve challenges with the help of non-participants will be disqualified
    • Teams that attack the CTS infrastructure or other teams environments will be disqualified
  9. Privacy and Data Handling:
    • Personal data collected by the registration form will be used only to organize the ISM CTF contest. Personal data may be used to cover the legal procedure related with awarding the winners
    • Personal data will not be published or shared with third parties
    • The teams names and score will be available to all participants on the CTF platform
  10. Event Schedule:
    • Share the schedule of the CTF, including start and end times, and any specific times for challenge releases or scoring updates.
  11. Prizes and Awards:
    • Knowledge and friends
    • … and others provided by our sponsors
  12. Event Modifications:
    • Reserve the right to make rule modifications or address unforeseen issues as necessary.
    • Clearly communicate any rule changes to participants.
  13. Liability and Waivers:
    • Organizers will provide the infrastructure (access to cyber range/ remote machines / virtual images) required to do the challenges
    • Any action conducted in the cyber range or on the given virtual machines, with the purpose of solving the challenge, is allowed
    • Participants are responsible for their actions outside the cyber range / provided infrastructure
  14. Post-Event :
    • Explain what will happen after the event, such as the publication of solutions and results, and the distribution of certificates.
  15. Contact Information:
    • For questions, concerns, or technical issues please use the contact information available on the contact page

Code of Conduct

# CTF Contest Code of Conduct

## Overview

The CTF Contest organizers are committed to providing an enjoyable and respectful environment for all participants. This code of conduct outlines our expectations for behavior and interactions during the event.

By participating in the CTF Contest, you agree to adhere to this code of conduct. We expect all participants to treat each other with respect, foster a culture of inclusivity, and prioritize ethical hacking practices.

## Code of Conduct

### Respect and Inclusivity

1. **Respect**: Treat all participants, organizers, and sponsors with respect, courtesy, and professionalism. Discrimination, harassment, or offensive behavior will not be tolerated.

2. **Inclusivity**: We welcome participants from diverse backgrounds and skill levels. Encourage and support others in their learning and hacking journey. Avoid exclusionary language or actions.

### Ethical Hacking

3. **Ethical Hacking**: The CTF contest is intended for ethical hacking and learning purposes. Unauthorized access, malicious activities, or any actions that may cause harm to systems or networks outside of this CTF are strictly prohibited.

4. **Responsible Disclosure**: If you discover vulnerabilities or issues during the contest, report them responsibly to the organizers or sponsors.

### Fair Play

5. **Fair Play**: Engage in fair competition. Do not cheat, use unauthorized tools or share flags or solutions with non-participants.

### Privacy and Data Handling

6. **Privacy**: Respect the privacy of others. Do not share personal information or data without consent.

7. **Data Handling**: Handle data provided during the contest with care and respect any data use restrictions specified by the organizers.

### Code Modifications

8. **Code Modifications**: Do not make unauthorized changes to the CTF infrastructure or any code provided by the organizers.

### Reporting Violations

9. **Reporting Violations**: If you witness or experience any violations of this code of conduct, please report them to the organizers promptly.

## Consequences

Violations of this code of conduct may result in actions such as warnings, disqualification, removal from the event, or reporting to relevant authorities, depending on the severity of the violation.

## Contact Information

If you have questions, concerns, or need to report a violation of this code of conduct, please contact the event organizers.

Thank you for your participation and cooperation in making the CTF Contest a positive and inclusive experience for all.

Sponsors

Register yourself

Are you ready to put your cybersecurity and hacking skills to the test? Join us for an adrenaline-pumping Capture The Flag (CTF) contest. Whether you're a seasoned hacker or a newbie, this event is for you.

Frequent Asked Questions

What is a CTF Contest ?

A CTF, or Capture The Flag, contest is a type of cybersecurity competition in which participants (often referred to as “ethical hackers” or “security enthusiasts”) attempt to solve a series of puzzles or challenges to find and capture a hidden digital “flag.” These flags are usually short strings of text or unique tokens that are hidden within computer systems, software, or networks. The goal is to discover as many flags as possible within a specified time frame, typically in a competitive environment.

Check this video presentation or read this guide for more details.

CTF contests are designed to test participants’ skills in various aspects of information security, including:

  1. Reverse Engineering: Participants may need to reverse engineer software, analyze binary code, or examine the inner workings of a program to find vulnerabilities or hidden flags.
  2. Web Application Security: Challenges related to web security might involve finding and exploiting vulnerabilities in web applications, such as cross-site scripting (XSS), SQL injection, or security misconfigurations.
  3. Cryptography: Cryptography challenges often require participants to decrypt or break encrypted messages or solve cryptographic puzzles.
  4. Forensics: In digital forensics challenges, participants may need to analyze file systems, network traffic, or memory dumps to uncover hidden information or flags.
  5. Steganography: Steganography challenges involve finding hidden information within files or images, often through the use of techniques like data embedding.
  6. Network Security: Network-based challenges can include tasks such as analyzing network traffic, identifying network-based vulnerabilities, or exploiting misconfigured services.
  7. Binary Exploitation: Binary exploitation challenges typically involve finding and exploiting vulnerabilities in compiled software, such as buffer overflows or format string vulnerabilities.
  8. Miscellaneous: Some CTFs include a wide range of miscellaneous challenges that test various aspects of security knowledge and problem-solving skills.

CTF contests come in various formats, including jeopardy-style and attack-defense competitions. In a jeopardy-style CTF, challenges are organized into categories with different point values, and participants solve them to earn points. In an attack-defense CTF, participants defend their own systems while simultaneously trying to attack other teams’ systems.

Why to participate ?

These competitions are not only a fun way to learn and practice cybersecurity skills but also serve as a valuable training ground for security professionals and a way to foster a sense of community among cybersecurity enthusiasts. Many CTFs are open to participants of all skill levels, from beginners to seasoned experts, and they are often used by organizations and educational institutions to identify and recruit talented individuals in the field of cybersecurity.

Where can I ask questions ?

You can reach us by email at  ism.ase.ro@gmail.com | ism@ase.ro or register and join the Discord server.