Tue, 28 Aug. 2018, 08:31 UTC — Fri, 07 Sept. 2018, 22:00 UTC
On-line
A ICON CTF event.
Format: Jeopardy
Official URL: https://ctf.icon-2018.org/
This event's future weight is subject of public voting!
This event lasts more than 5 days! No global rating points.
Event organizersICON 2018 is a two-days event around cyber security and artificial intelligence. A Capture The Flag competition will take place on September 14 in Geneva, in which 8 teams will fight for the rescue of NOCI, a fictitious hyper-connected city.
Qualified teams will meet in person in Geneva for 8 hours of hacking, working on challenges on the following topics: Reverse engineering, IOT, Cryptography, Artificial Intelligence, Governance.
The 8 top teams will be qualified for the final event in Geneva.
31 teams total
Place | Team | CTF points | Rating points | |
---|---|---|---|---|
1 | sharknado | 3.000 | 50.000 | |
2 | p4 | 3.000 | 37.500 | |
3 | madmonies | 3.000 | 33.333 | |
4 | sw1ss | 3.000 | 31.250 | |
5 | \J | 3.000 | 30.000 | |
6 | Pwnium | 3.000 | 29.167 | |
7 | SeBC | 3.000 | 28.571 | |
8 | hackercat | 2.000 | 19.792 | |
9 | int3pids | 2.000 | 19.444 | |
10 | InfoSecIITR | 2.000 | 19.167 | |
11 | x0r19x91 | 2.000 | 18.939 | |
12 | FresherMan | 2.000 | 18.750 | |
13 | sample_team_1 | 2.000 | 18.590 | |
14 | Brap | 2.000 | 18.452 | |
15 | s1m0n3 | 2.000 | 18.333 | |
16 | fake | 1.000 | 9.896 | |
17 | Inshall'hack | 1.000 | 9.804 | |
18 | yhql | 1.000 | 9.722 | |
19 | arl | 1.000 | 9.649 | |
20 | noxale | 1.000 | 9.583 | |
21 | BE4HOXVII | 1.000 | 9.524 | |
22 | Kappa | 1.000 | 9.470 | |
23 | Harekaze | 1.000 | 9.420 | |
24 | Djavaa | 1.000 | 9.375 | |
25 | Acca_ | 1.000 | 9.333 | |
26 | dotsu- | 1.000 | 9.295 | |
27 | Hecării, Țuica și Păunii | 1.000 | 9.259 | |
29 | Sice Squad | 1.000 | 9.195 | |
30 | babyr00t | 1.000 | 9.167 | |
31 | null2root | 1.000 | 4.570 | |
32 | DoR | 1.000 | 4.557 |
Yeah, let's make the challenge binary use so much memory the computer thrashes so badly that stopping the binary takes 10 minutes. GREAT FUCKING IDEA.
@NieDzejkob I don't think you understand the idea of Reverse Engineering. Running ANY binary provided at a CTF without a proper sandbox and debugger attached, or before thorough static analysis is a suicide. You do realize that in many cases those binaries are malware-like and can cause harm? You should be happy that in this case it only caused memory swapping...
1. Disable swap, it's a disaster on Linux systems anyway. Just let OOM killer do its work.
2. @Pharisaeus has a point. Malware-like or harmful binaries are not the norm on CTFs, but they do happen. Swapping for a minute because you misconfigured your system is peanuts in comparison. You should always exercise extreme caution when running an untrusted binary - *especially* during CTFs.
3. Even if true, that was the least important problem during the CTF (for example, as far as I know, 3 tasks out of 4 were broken at the beginning :P).
ICON CTF Quals is the basic concept that is explained by this blog. To know more about this concept and <a href="https://www.analyzedu.com/writing-services-reviews/bid4papers-com-review.html">https://analyzedu.com/writing-services-reviews/bid4papers-com-review.html</a>, the reading of this blog is best. I am sure that people would like the reading of this blog.