Offical URL: https://bsidesbos.ctf.games/

If you enjoyed the VirSecCon CTF, NahamCon CTF, or H@cktivityCon CTF, the developers are back in action bringing a new Capture the Flag competition in coordination with the BsidesBoston virtual conference!

Event registration is now open and available.

Register here: https://bsidesbos.ctf.games/

BsidesBOS CTF

September 26th, 9:00 AM EST - 5:00 PM EST
8-Hour Competition

We are pleased to offer prizes to the winners of BsidesBOS CTF that are registered for the BsidesBOS virtual conference!

1st Place - 1 Year of HackTheBox Pro Labs access
2nd Place - 6 months of HackTheBox Pro Labs access
3rd Place - 3 months of HackTheBox Pro Labs access

Infra sponsored by g.co/cloud

CTF events

NameWeight
BsidesBOS CTF0.00
HacktivityCon CTF21.78
NahamCon CTF23.56
VirSecCon CTF22.72
Related tags: web pwn xss #web php crypto stego rop sqli hacking forensics gpg base64 android python scripting net pcap xor des algo rsa penetration testing x64 prime bruteforce algebra c++ exec reverse engineering forensic decode javascript technologies programming c engineering security aes java js rand exploitation node.js misc re mobile sql exploit admin apache steganography things math coding nothing networking injection http penetration malware shell exploits drawing cracking bash ssh algorithms windows format-string ai unix stuff network pentesting guessing social engineering find websec padding asm aslr html network hacking linux recon wireshark googling analysis rfi sqlinjection lfi fuzzing networks sql injection mysql morse socket miscellaneous caesar script password malware analysis csrf sleeping rev got optimization software engineering qr code csharp learning science ctf nmap prog kernel kali linux basic language rmi binwalk scapy volatility jwt leak git microsoft socket.io network security jail bof bufferoverflow binaryexploitation java programing php programing pwning powershell code-analysis it logical linuxbasic flask google windows exploitation shellcode pwntools information collection ret2dlresolve wiener guess sqlmap androidsecurity decryption information gathering rsa-crypto revesing ldap vpn vim application security algorithm apk qr ssti osint #exploit stack_overflow blockchain reversing oscp mac ropchain use-after-free fmtstr cryptography-rsa netcat shellcoding udp tor tcp tcpip grsec #crypto prolog server electronics sleep troubleshooting binary analysis botnet warmup serialization crytography encryption ret2libc memory stenography ocr artificial inteligence computer and network security kernel programming encoding icmp ecc cryptanalysis write rubber ducky lan turtle rtl-sdr wifi pineapple scan russian hardening python3 nx bruteforce-bytebybyte c android programing cryptography stack complaining gentoo cheese imagemagick dreaming reverse zip heap magic zlib binary ofb cookie dsa reconnaissance template-injection aes-ecb oracle lsb development bilocation ysoserial steghide exiftool syscall jinja one_gadget cssinjection tcache binary-exploitation chinese-remainder ctf2018 jinja2 cca vimshell pohlig-hellman dlp grepping headers integer_overflow custom-hash memory_dump root ecdlp glyphs ttf signedness oob arm32 iot xxe bash_jail integeroverflow vimcrypt werkzeug 2020 canary challeneges hotdog boneh-durfee small-p 125 weak-keys twin-primes nahamcon awk suid wav-steg chadsec timekeeper newyearresolution finsta fakefile vortex simpleapp candroid metameme clisays cowpie microsooft warmups stegsolve rfc5785 visualism hacktivityconctf hacktivityconctf2020 7z ret2win stegsnow whitespace aes-ofb