National Cyber Security CTF Competition

    Hackfest

    Hackfest is an annual event of cyber security, initially hosted by the Higher School of Communication. Each year, since 2015, it gathers under the same roof specialists of cyber security, entrepreneurs and students. After its massive success in the previous editions, Hackfest is back this year in its 4th edition under the name of "RANSOMWARE : THE LEADING TREND OF BUSINESS CYBERTHREAT" on the 21st and 22nd of April at Technopark El Gazala.

    Conferences

    More than five conferences will be held by national and international speakers about ransomwares, the causes, the consequences and the preventive methods against this kind of attacks.

    Workshops

    Held and supervised by a variety of experts in cyber security, they represent a great opportunity for anyone who is interested in knowing more about attacks and vulnerabilities and how to handle them.

    Training

    Bootcamp sessions are organised in diferrent universities for students who want to learn the field of cyber security. The focus of the training is on understanding and analyzing attacks on networks, systems and softwares.

    SecCamp CTF

    The National Cyber Security Competition. A contest of 18 hours during which the passionate about cyber security will try to tackle challenges in numerous categories : IoT, cryptography, web exploitation, forensics and binary exploitation. There will be prizes the following day.

    Junior Cryptoparty

    A series of challenges for kids aged 5-12 years old, this competition will aim to introduce the youngsters to cryptography and cryptanalysis. It is an excellent opportunity for kids to discover a variety of activities related to cyber security.

    IoT Hacking

    For the first time in Hackfest, a series of challenges in the theme of "IOT Hacking" will present the different methods of hacking used against connected objects.

    National Cyber Security CTF Competition

    The CTF consits of 2 phases. A qualification round and a final round. During qualification round contestants will compete individually to win slot for the final round. Only 160 contestants will qualify for finals.Final round is multi-team hacking challenge in which teams compete independently to win prizes.
    National Cyber Security CTF Competition is meant for both beginners and experienced contestants and consists of tasks ranging from simple to extremely difficult in various categories:

    Cryptography

    In this category, you'll attack poorly implemented crypto, outdated crypto, or use well-known vulnerabilities to attack encrypted messages. You might be given for example a few RSA keys whose modulus share a factor, and you decrypt a message encrypted by one of these keys

    Binary Exploitation

    The program you received is running as a service on a remote machine. Reverse-engineer it, figure out its vulnerability, and use that to take exploit the remote service into serving you a flag. Often, there's a flag.txt you can get the program to read, or perhaps it has a flag in memory you need to get it to accidentally send you.

    Web Exploitation

    These challenges involve attacking common vulnerabilities in web technology. For example, you might need to use SQL injection to read the "secret_flag" table of a database, use directory traversal to get a web server to serve you "flag.txt", use Cross-Site Scripting to trick a simulated user to send you their password, or bypass some client-side checks implemented by obfuscated javascript

    Reverse Engineering

    In this category You'll receive a program, but not the source, so you need to disassemble it, look at the assembly, and figure out what it does. Programs can be x86 Windows, x86 Linux, ARM Linux, obfuscated Java, and a whole bevy of more obscure formats

    Forensics

    This is a fairly broad category. You might receive an image of a disk in FAT format, and you'll need to un-delete "flag.txt". Maybe you receive a zip file, that contains a 7z file, that contains a tar archive, that contains some obscure file format you've never heard of, and unpacking the entire chain eventually gives you a flag.

    IoT

    These challenges involve attacking Embedded/IoT devices. You might receive an Arduino board, and you'll need to dump and analyse a firmware. Maybe you receive a binary program, that contains memory management vulnerability, exploiting the entire flow gives you a priviliged access to read files.
    If you have any questions, email us at maroueneboubakri[at]gmail.com

    Hackfest

    Hackfest is an annual event of cyber security, initially hosted by the Higher School of Communication. Each year, since 2015, it gathers under the same roof specialists of cyber security, entrepreneurs and students. After its massive success in the previous editions, Hackfest is back this year in its 4th edition under the name of "RANSOMWARE : THE LEADING TREND OF BUSINESS CYBERTHREAT" on the 21st and 22nd of April at Technopark El Gazala.

    LEARN MORE

    Le Challenge CTF

    Le Capture The Flag (CTF) est une sorte de hackathon relatif au monde de la cybersecurite. Il s'agit des epreuves ludiques destinees a initier les participants a certains types de vulnerabilites, a des methodes de hacking particulieres

    Learn More

    Register

    Eligibility

    National Cyber Security CTF Competition is an onsite, multi-team hacking challenge in which contestants compete independently to win slot for the final round. The game is open to anyone (Student/Professionals/Teachers) with an interest in computer science.

    Rules and Restrictions

    1. The CTF is jeopardy based and consists of a series of challenges in the following categories (Binary, Web, Crypto and Forensics).
    2. Registration form is live and will be closed when the number of 60 regsitred teams is reached.
    3. Every member must give his full name not his nickname.
    4. Any registration which does not follow the rules, will be discarded.
    5. Registered contestants will receive an email to confirm their accounts.
    6. Contestants will compete individually to win slot for the final round.
    7. Top 160 contestants will qualify for final round.
    8. A qualified contestant will create/join a team before final round start.
    9. Teams can have up to 4 members
    10. Incomplete teams will be completed by us using individual players
    11. Individual players will be assigned to a an incomplete team
    12. Teams should login to the CTF platform before the game start. No Login/Password will be recovered after game start.
    13. Flags sharing and trading with other teams/contestants is not allowed.
    14. You are allowed to use any tool to solve a challenge.
    15. Denial of challenge service/servers is prohibited.
    16. Finding bugs in infrastructure can bring more points to the team/contestant, but do not scan please !
    17. Each task has a score listed. The team/contestant who earns the most points wins the competition
    18. If two teams/contestants tie, the submission times will be used to judge.
    19. 3 Teams will win the competition
    20. Besides the team ranking, each team member will be ranked based on his performance in solving the tasks.
    21. A best Hacker prize will be awared to the best contestant
    22. Prizes TBA
    23. Have fun and learn
    The Registration is closed. We reached the maximum capacity of the CTF. We can no longer accept new participants.

    Our Kind Partners

    Contact Us