Difference between revisions of "Village:CTF Village"
Line 41: | Line 41: | ||
}} | }} | ||
− | A village of Dutch CTF enthusiasts from the Netherlands. | + | A village of Dutch CTF enthusiasts from the Netherlands. We will organize the official SHA2017 CTF, on-site CTF teams are welcome to play this CTF in our village. The team organizing the CTF consists of people who also organized the official CTF at OHM2013 ([http://ebctf.nl/ ebCTF]). |
Teams organizing the CTF: | Teams organizing the CTF: | ||
+ | * [http://eindbazen.net De Eindbazen] | ||
* [http://ctf.zone/ CTF.zone] | * [http://ctf.zone/ CTF.zone] | ||
− | |||
* [https://twitter.com/hackersftw Hack.ERS] | * [https://twitter.com/hackersftw Hack.ERS] | ||
* [https://twitter.com/JoblessHackers Jobless Hackers] | * [https://twitter.com/JoblessHackers Jobless Hackers] | ||
− | + | A CTF is a Capture The Flag hacking game. Which generally exists of multiple hacking-related challenges which need to be solved during the time the CTF takes place. Players play in teams and compete against each other. Most CTFs run for about 24-48 hours and can be played online. During the CTF all challenges are provided in a controlled environment, and everything is completely legal. No hacking of external parties or the other teams takes place. | |
+ | |||
+ | Most of the hacking events or conferences these days have an official CTF, which takes place during the event/conference. A good example is the yearly CTF at CCC. We personally think a CTF is a great addition to an event and provides the visitors some technical entertainment. The CTF will further provide promotion for the event, especially with the Teaser round we are planning before the event where players can win four tickets for SHA2017. | ||
+ | |||
+ | To get a better understanding of the setup and kind of challenges that players will encounter we would like to refer to the CTF we organized during OHM 2013, which was called ebCTF: https://ebctf.nl/ | ||
+ | |||
+ | Basically we have 6 categories with each challenges in 4 difficulties. | ||
+ | * Binary challenges where you get a binary which you need to reverse engineer. Binaries are usually Windows or Linux executables, but can also be from more exotic environments. | ||
+ | * Crypto challenges which involves classic crypto algorithms such as substitution, Vigenere and Caeaser Ciphers, or more advanced challenges including weaknesses in ECB mode, bit flipping, padding oracle attacks or hash function length extension attacks. | ||
+ | * Forensics challenges, which contains anything related to forensics. Challenges can include Windows, Linux, Android or Exotic platform forensics. | ||
+ | * Network challenges, such as analyzing packet captures or network communication, port knocking, etc. | ||
+ | * Pwnables challenges where you need to exploit a specific local or remote vulnerability, like buffer overflows, format strings or a different kind of vulnerability. The level of difficulty can be made harder with mitigations such as ASLR and NX. | ||
+ | * Web challenges which contains all web and HTTP related challenges. Including, but not limited to: SQL injection, directory traversal, file inclusion, scripting language quirks, XSS, remote command execution. | ||
+ | |||
+ | Besides the main CTF we will run a "mini" CTF which contains challenges for beginning CTF players. | ||
+ | |||
+ | To promote the CTF and SHA2017 we will run a Teaser round, which will contain 4-6 challenges in different categories and with different difficulties. The winner of this Teaser round will win four tickets to SHA2017. | ||
+ | |||
+ | For more information about the CTF and the upcoming Teaser round, follow us on Twitter: @sha2017ctf |
Revision as of 17:47, 12 May 2017
Village Name | SHA2017CTF |
---|---|
Generated SHA Flag (experiment here) | |
Website | |
Contact | sha2017ctf@gmail.com |
Part of Cluster | |
Assigned Field | |
Description | A village of Dutch CTF enthusiasts from the Netherlands. Will organize the CTF during SHA2017 and on-site CTF teams are welcome to play this CTF in the village. The team organizing the CTF consists of people who also organized the official CTF at OHM2013 (ebCTF). http://ebctf.nl/
Teams organizing the CTF: CTF.zone De Eindbazen Hack.ERS Jobless Hackers More information soon. |
Members |
Edit your membership on your user page, here, and then on "edit with form" at the top. |
Projects | |
Self-organized Sessions | |
Interests | ctf , capture the flag , hacking , wargames , challenges , puzzles |
Registered on | 13 January 2017 15:16:02 |
Hosts self-organized sessions | No |
Other villages by tags...
arcade arduino bbq beer capture the flag ccc challenges crypto ctf ctf, capture the flag, hacking, wargames, challenges, puzzles diy electronics emulators esp32 esp8266 food friendly people fun hackerspace hacking hamradio hardware iot makers music open source privacy programming puzzles retrogaming sdr security soldering sound videogames wargames
| |
refresh |

Name | Arrival | Departure | Bringing |
---|---|---|---|
Asby ![]() |
Wed Aug 2 14:00 | Tue Aug 8 18:00 | |
Thice ![]() |
Wed Aug 2 14:00 | Tue Aug 8 18:00 | |
gijs ![]() |
Fri Aug 4 0:00 | Tue Aug 8 0:00 | |
3 inhabitants. Refresh this list. You can add yourself to a village by editing your profile page, here. |
A village of Dutch CTF enthusiasts from the Netherlands. We will organize the official SHA2017 CTF, on-site CTF teams are welcome to play this CTF in our village. The team organizing the CTF consists of people who also organized the official CTF at OHM2013 (ebCTF).
Teams organizing the CTF:
A CTF is a Capture The Flag hacking game. Which generally exists of multiple hacking-related challenges which need to be solved during the time the CTF takes place. Players play in teams and compete against each other. Most CTFs run for about 24-48 hours and can be played online. During the CTF all challenges are provided in a controlled environment, and everything is completely legal. No hacking of external parties or the other teams takes place.
Most of the hacking events or conferences these days have an official CTF, which takes place during the event/conference. A good example is the yearly CTF at CCC. We personally think a CTF is a great addition to an event and provides the visitors some technical entertainment. The CTF will further provide promotion for the event, especially with the Teaser round we are planning before the event where players can win four tickets for SHA2017.
To get a better understanding of the setup and kind of challenges that players will encounter we would like to refer to the CTF we organized during OHM 2013, which was called ebCTF: https://ebctf.nl/
Basically we have 6 categories with each challenges in 4 difficulties.
- Binary challenges where you get a binary which you need to reverse engineer. Binaries are usually Windows or Linux executables, but can also be from more exotic environments.
- Crypto challenges which involves classic crypto algorithms such as substitution, Vigenere and Caeaser Ciphers, or more advanced challenges including weaknesses in ECB mode, bit flipping, padding oracle attacks or hash function length extension attacks.
- Forensics challenges, which contains anything related to forensics. Challenges can include Windows, Linux, Android or Exotic platform forensics.
- Network challenges, such as analyzing packet captures or network communication, port knocking, etc.
- Pwnables challenges where you need to exploit a specific local or remote vulnerability, like buffer overflows, format strings or a different kind of vulnerability. The level of difficulty can be made harder with mitigations such as ASLR and NX.
- Web challenges which contains all web and HTTP related challenges. Including, but not limited to: SQL injection, directory traversal, file inclusion, scripting language quirks, XSS, remote command execution.
Besides the main CTF we will run a "mini" CTF which contains challenges for beginning CTF players.
To promote the CTF and SHA2017 we will run a Teaser round, which will contain 4-6 challenges in different categories and with different difficulties. The winner of this Teaser round will win four tickets to SHA2017.
For more information about the CTF and the upcoming Teaser round, follow us on Twitter: @sha2017ctf