A ICON CTF event.
Official URL: https://ctf.icon-2018.org/
This event's weight is subject of public voting!
ICON 2018 is a two-days event around cyber security and artificial intelligence. A Capture The Flag competition will take place on September 14 in Geneva, in which 8 teams will fight for the rescue of NOCI, a fictitious hyper-connected city.
Qualified teams will meet in person in Geneva for 8 hours of hacking, working on challenges on the following topics: Reverse engineering, IOT, Cryptography, Artificial Intelligence, Governance.
The 8 top teams will be qualified for the final event in Geneva.
31 teams total
|Place||Team||CTF points||Rating points|
|27||Hecării, Țuica și Păunii||1.000||9.259|
Yeah, let's make the challenge binary use so much memory the computer thrashes so badly that stopping the binary takes 10 minutes. GREAT FUCKING IDEA.
@NieDzejkob I don't think you understand the idea of Reverse Engineering. Running ANY binary provided at a CTF without a proper sandbox and debugger attached, or before thorough static analysis is a suicide. You do realize that in many cases those binaries are malware-like and can cause harm? You should be happy that in this case it only caused memory swapping...
1. Disable swap, it's a disaster on Linux systems anyway. Just let OOM killer do its work.
2. @Pharisaeus has a point. Malware-like or harmful binaries are not the norm on CTFs, but they do happen. Swapping for a minute because you misconfigured your system is peanuts in comparison. You should always exercise extreme caution when running an untrusted binary - *especially* during CTFs.
3. Even if true, that was the least important problem during the CTF (for example, as far as I know, 3 tasks out of 4 were broken at the beginning :P).
ICON CTF Quals is the basic concept that is explained by this blog. To know more about this concept and https://analyzedu.com/writing-services-reviews/bid4papers-com-review.html, the reading of this blog is best. I am sure that people would like the reading of this blog.