|Generated SHA Flag (experiment here)|
|Part of Cluster|
|Assigned Field||Liskov Field|
|Description||We are a group of hackers who are part of the Eindbazen CTF team and we organize the official CTF for the SHA event.|
Edit your membership on your user page, here, and then on "edit with form" at the top.
|Interests||ctf, capture the flag, hacking, wargames, challenges, puzzles|
|Registered on||13 January 2017 15:16:02|
|Hosts self-organized sessions||No|
|Other villages by tags...|
|Asby||Wed Aug 2 14:00||Tue Aug 8 18:00|
|Thice||Wed Aug 2 14:00||Tue Aug 8 18:00|
|gijs||Fri Aug 4 0:00||Tue Aug 8 0:00|
|3 inhabitants. Refresh this list. You can add yourself to a village by editing your profile page, here.|
|Needs network||Villages describe network needs|
|Village plans||... play loud music and party, ... bring light installations, ... build up a big tent|
|Village comments plans|
|Provides transport for|
|Has plans with tracks|
|Has order interest|
A village of Dutch CTF enthusiasts from the Netherlands. We will organize the official SHA2017 CTF, on-site CTF teams are welcome to play this CTF in our village. The team organizing the CTF consists of people who also organized the official CTF at OHM2013 (ebCTF).
A CTF is a Capture The Flag hacking game. Which generally exists of multiple hacking-related challenges which need to be solved during the time the CTF takes place. Players play in teams and compete against each other. Most CTFs run for about 24-48 hours and can be played online. During the CTF all challenges are provided in a controlled environment, and everything is completely legal. No hacking of external parties or the other teams takes place.
Most of the hacking events or conferences these days have an official CTF, which takes place during the event/conference. A good example is the yearly CTF at CCC. We personally think a CTF is a great addition to an event and provides the visitors some technical entertainment. The CTF will further provide promotion for the event, especially with the Teaser round we are planning before the event where players can win four tickets for SHA2017.
To get a better understanding of the setup and kind of challenges that players will encounter we would like to refer to the CTF we organized during OHM 2013, which was called ebCTF: https://ebctf.nl/
Basically we have 6 categories with each challenges in 4 difficulties.
- Binary challenges where you get a binary which you need to reverse engineer. Binaries are usually Windows or Linux executables, but can also be from more exotic environments.
- Crypto challenges which involves classic crypto algorithms such as substitution, Vigenere and Caeaser Ciphers, or more advanced challenges including weaknesses in ECB mode, bit flipping, padding oracle attacks or hash function length extension attacks.
- Forensics challenges, which contains anything related to forensics. Challenges can include Windows, Linux, Android or Exotic platform forensics.
- Network challenges, such as analyzing packet captures or network communication, port knocking, etc.
- Pwnables challenges where you need to exploit a specific local or remote vulnerability, like buffer overflows, format strings or a different kind of vulnerability. The level of difficulty can be made harder with mitigations such as ASLR and NX.
- Web challenges which contains all web and HTTP related challenges. Including, but not limited to: SQL injection, directory traversal, file inclusion, scripting language quirks, XSS, remote command execution.
Besides the main CTF we will run a "mini" CTF which contains challenges for beginning CTF players.
To promote the CTF and SHA2017 we will run a Teaser round, which will contain 4-6 challenges in different categories and with different difficulties. The winner of this Teaser round will win four tickets to SHA2017.
For more information about the CTF and the upcoming Teaser round, follow us on Twitter: @sha2017ctf
Teams organizing the CTF: