Fri, 26 May 2017, 13:00 UTC — Fri, 26 May 2017, 22:00 UTC
On-line
A FAUST CTF event.
Format: Attack-Defense
Official URL: https://2017.faustctf.net/
This event's future weight is subject of public voting!
Event organizersFAUST CTF 2017: Internet of Sh...Things Edition
The second edition of the attack-defense CTF competition run by FAUST, the CTF team of Friedrich-Alexander University Erlangen-Nürnberg. Hopefully running more smoothly this time.
This will be a classic online attack-defense CTF, where teams are given access to a VPN and host their Vulnboxes themselves.
First place: 512 €
Second place: 256 €
Third place: 128 €
Additionally, for each service the first team to exploit it, submit a valid flag and publish a write-up will win 32 €.
50 teams total
Place | Team | CTF points | Rating points | |
---|---|---|---|---|
1 | Bushwhackers | 27460.023 | 20.000 | |
2 | Eat, Sleep, Pwn, Repeat | 22629.745 | 13.241 | |
3 | saarsec | 21421.493 | 11.134 | |
4 | c00kies@venice | 18580.135 | 9.266 | |
5 | M.I.S.T. | 16990.678 | 8.187 | |
6 | LC↯BC | 16441.895 | 7.654 | |
7 | WE_0WN_Y0U | 14757.597 | 6.803 | |
8 | TokyoWesterns | 14161.470 | 6.407 | |
9 | LosFuzzys | 14087.644 | 6.241 | |
10 | CInsects | 12744.153 | 5.641 | |
11 | dcua | 12361.466 | 5.411 | |
12 | Shady Hats | 12320.354 | 5.320 | |
13 | SPbCTF | 12184.133 | 5.206 | |
14 | SiBears | 11732.161 | 4.987 | |
15 | girav | 11712.694 | 4.932 | |
16 | Tower-of-Hanoi | 11263.009 | 4.727 | |
17 | STT | 11052.186 | 4.613 | |
18 | ENOFLAG | 10714.184 | 4.457 | |
19 | Shellphish | 10242.477 | 4.256 | |
20 | labrats | 9990.837 | 4.138 | |
21 | squareroots | 9985.221 | 4.112 | |
22 | SIGFLAG | 9972.543 | 4.086 | |
23 | NOP | 9731.852 | 3.979 | |
24 | badfirmware | 9664.974 | 3.936 | |
25 | Kernel Space Invaders | 9399.896 | 3.823 | |
26 | cyberwehr | 9391.425 | 3.805 | |
27 | vimvaders | 9140.034 | 3.699 | |
28 | VoidHack | 8932.769 | 3.610 | |
29 | MV9rwGOf08 | 8641.032 | 3.492 | |
30 | hxp | 8574.755 | 3.456 | |
31 | nope123 | 8502.431 | 3.419 | |
32 | Hacker Ameer | 8174.015 | 3.289 | |
33 | khack40 | 8067.048 | 3.241 | |
34 | Life | 7457.021 | 3.010 | |
35 | 0x90r00t | 7177.599 | 2.900 | |
36 | WCSC | 7121.152 | 2.871 | |
37 | i2sec | 6730.624 | 2.721 | |
38 | Bits For Everyone | 6422.266 | 2.602 | |
39 | noraneco | 6350.630 | 2.569 | |
40 | SU Red Team | 5971.131 | 2.424 | |
41 | team rot | 5259.983 | 2.159 | |
42 | enZyme | 5086.465 | 2.090 | |
43 | FluxFingers | 4891.357 | 2.014 | |
44 | OpenToAll | 3957.295 | 1.668 | |
45 | py31415926 | 1894.567 | 0.912 | |
46 | NIS | 1734.171 | 0.849 | |
47 | [censored] | 1499.855 | 0.759 | |
48 | MilindBhargava | 712.522 | 0.468 | |
49 | soleman | 536.973 | 0.400 | |
50 | LFlare | 100.837 | 0.118 |
What is Attack/Defense? I have never competed in one of those before.
when can we register for this? and how?
@ashishsirohi: registration just opened at https://2017.faustctf.net/
@WaterBear: a short description is at https://ctftime.org/ctf-wtf/ . You should take the time to set up your network (connected to the VPN, the vulnerable machine and the participants' computers) ideally a few days before the event, so that you don't waste any time on that when you should be pwning other teams. When the competition starts, you'll get a password to decrypt a vulnerable virtual machine image. You have 1 hour to get it running and to analyse what's running on it. Then the VPN network opens... every few minutes the organizers will place a new flag in every service of every team. You want to steal as many of them as possible and submit them, while preventing other teams from stealing your flags.
@WaterBear Also have a look at https://2017.faustctf.net/information/attackdefense-for-beginners/.