Challenge

Security Challenge (CTF)

kindly offered byUniversity of Piraeus, InQBit Innovations and Hellenic Cyber Security Team

Date / Time: Friday 10 November / 10:50-12:20 EET @ Workshop room (1st floor Right - Room 105)

Speaker: Christos Xenakis
Professor @ University Piraeus

Speaker: Aristeidis Farao
Associate Researcher @ University Piraeus

Speaker: Athanasios Vasileios Grammatopoulos
CyberSecurity Researcher @ University Piraeus

Speaker: Michalis Takaronis
Research Assistant @ University Piraeus

Speaker: Thodoris Ioannidis 
Cybersecurity Researcher @ University Piraeus

Challenge Description 

In this short Capture the Flag (CTF) competition you will be asked to compete against each other in solving four security related challenges in about one hour. To solve a challenge, you may have to analyse digital files, reverse engineer binaries, crack hashes, break cryptographic algorithms or exploit programs’ vulnerabilities.
Three of the challenges will be offline and one will be online. For the offline challenges, you will have to download the challenges’ files and analyse them locally on your computer to recover the embedded flags. For the online challenge, you will be given access to a vulnerable service which you will have to hack and recover the hidden flag.
During the competition the CTF organisers may change the pool of available challenges if any problem occurs (e.g. network problems) in order to keep the competition running.

Get ready, setup your Linux VMs, install your network analysers, fire up your reverse engineering tools and don’t forget to bring your exploitation cheat sheets. But remember… do not share flags, do not attack machines that are not part of the competition, do not attack the competition infrastructure, you may brute force only offline challenges, and of course have fun!

What will you Learn: 
– Learn more about Capture The Flag (CTF) competitions and their alternative gamified approach for delivering cybersecurity training.
– Experience a beginner’s level Capture The Flag (CTF) competition.
– Introduce yourself into ethical hacking.

Level: Beginner / intermediate

TAGsSecurity, Hacking, CTF

Target audience: People with basic hacking skills that wish to take a Security challenge

Prerequisites on Audience: 

  • (recommended) Linux distribution installed (as host OS or VM)
  • Basic knowledge of cryptography, forensics and web exploitation.
  • Basic Knowledge of specific tools like image manipulation tools, decompiler (ghidra, ida), packet analyzers(wireshark, brim, etc).

Schedule: 

  • 10-min – Introduction
    • Short presentation / instructions to the contestants.
    • The purpose of the presentation is to explain the competition structure to beginners and present the challenges.
  • 60min – Competition
    • Get access to the competition platform.
    • Contestants will  download challenge files and access online services.
    • The status of the competition will be displayed live through a scoreboard.
  • 10min – Closing notes and Q&A
  • During the competition the support team will help the contestants resolve any issue that may occur.