Giter VIP home page Giter VIP logo

2019's Introduction

Zimbabwe CTF 2019

The first ever Zimbabwe Capture the Flag (CTF) contest for Cybersecurity Month 2019

For the first time ever, the Harare Institute of Technology, the Ministry of Information and Communication Technology, Postal and Courier Services (MICTPCS), TelOne Zimbabwe and ZICT, the ICT Division of the Zimbabwe Institution of Engineers (ZIE) will be organizing this exciting event that has taken the cyberspace domain by storm!

What is a CTF??

CTF is short for Capture The Flag and it is a kind of cyber security contest that challenges participants to solve a variety of cyber-related tasks ranging from analyzing captured network data for secret information, to hacking your way into a server to steal data. In these challenges, the contestant is usually asked to find a specific piece of text or a file that may be hidden on the server or behind a webpage. That hidden data or file is called the flag, hence the name, CTF!

Who is the CTF open to?

It is open to all people who work in or have an interest in the field of cybersecurity, regardless of their years of experience.

The beauty of CTFs is that they give student hackers, security professionals and enthusiasts as well as hobbyists an opportunity to try out a variety of hacking challenges and basically test their skill level. As most people know, cybersecurity is a domain that affects everyone and the more you have a practical understanding of how attacks can be performed, the easier it is for you to help other people understand how real the threat is.

Do we have to register to participate?

Yes you will have to register online via this link. Please note that the challenges will only be availed to registered teams and only registered teams will be up to win prizes.

Oh, so there are prizes to be won?

Yes there are! The winning team will be awarded a prize and they will also have the bragging rights as the winners of the first ever Zim CTF Contest.

Can we sign up as a team?

Yes, you can. The sizes of the teams that can attempt the challenge can range from One person to a maximum of Four individuals per team.

How will the Finalists and Winners be determined?

There will be a set of challenges that will need to be completed as is the standard model with CTFs. In this case, it will be time-based, so the first team to complete the challenge, submit a flag and the accompanying report of how they completed the challenge will be the victor.

We will also have to submit a report?

Yes, the coordinators of the CTF will need to get a report from you on the steps you took in order to overcome the challenges. A standard template will be shared with registered teams. If your team would prefer to submit the report in video format, we can also accommodate that as well.

Where will the CTF be hosted?

The CTF model we are using has two phases:

  • Phase 1: This will involve the Entry Round and Elimination Round challenges which will all be done by teams remotely and online.
  • Phase 2: This will be onsite in Harare where the Top Five teams will battle it out to see who becomes the winner.

IMPORTANT DATES

No. Event Date
  1. | Team Registration | 18 September 2019 - 24 September 2019 (extended to 25 September 2019)
  2. | Opening of Challenges | 25 September 2019 (extended to 26 September 2019)
  3. | Closing of Challenges | 01 October 2019
  4. | Announcement of Finalists | 01 October 2019
  5. | CTF Finals | 05 October 2019

For more information please get in touch via this IRC link with the following info:

  • Nick: This is entirely up to you
  • Password: ZimCTF2019
  • Channel: #zimctf2019

or you can email us on zimbabwe[dot]ctf[at]gmail[dot]com, we will respond as soon as we possibly can.

GENERAL TERMS & CONDITIONS

Please read these Terms and Conditions carefully prior to registration.

  • No DoS/automated scans/large amounts of traffic on the hosting servers.
  • Do not share flags or solutions with other teams. We will not tolerate flag sharing.
  • Participants shall provide correct & truthful information in registration and team creation.
  • Participants shall keep their contact information accurate and up-to-date.
  • The participants shall ensure the code they use is free from viruses or malware.
  • The participant shall not use this contest to do anything unlawful, misleading, malicious or discriminatory.
  • If any participant is found to have violated the term & conditions of the contest, the coordinating Team has the right, to disqualify the participant without prior notice.
  • The Coordinating Team has all the rights reserved, in case of any conflict, the decision of the Coordinating Team shall be final.
  • The Coordinating Team reserves the right to change Terms and Conditions.

2019's People

Contributors

shlomo88 avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.