CCSC CTF 2020



CCSC CTF 2020




Cyprus Computer Society proudly presents CCSC Capture the Flag competition 2020

Competition is open to everyone but Cypriots who are born between 1995 and 2006 are also eligible for the European Cyber Security Competition in Austria. Compete now and secure an opportunity to have a spot in the National Cyber Security team! Join us for two weeks full of hacking!

Registration is now open here

>>>> Date and Time: 1st March 00:00 – 15th March 23:59 GMT+2


</INSTRUCTIONS>

When the competition date approaches registered participants will receive an email with instructions on how to join the CTF platform. Make sure you keep an eye on your emails!

You do not have to submit information that personally identifies you on the online platform. You just need a valid e-mail for registration / password reset purposes.

Flag format is CCSC{…}

For live anouncements, questions and support join our discord server!

Click here to join!


</PREPARATION>

If you want to prepare for the competition beforehand there are publicly available write ups in https://ctftime.org. Additionally, there are links for some writeups from previous CCSC CTFs provided below:


</SCORING>

  • Every problem has an assigned point value, which is usually representative of our perceived
    difficulty of the problem. Your total score is the sum of the points you obtain from every problem
    you solve.
  • In case of ties, the time taken to solve the challenges will be used as the tie-breaker.
  • There are no bonus points, so do not attempt to find hidden flags outside of the challenges.
  • During the CTF, the scoreboard will display rankings on a per-group basis. After the competition
    ends, we will release the top 10 overall participants.


</RULES>

  • Don’t share flags!
  • Do not attack CTF infrastructure! This includes brute-forcing flags.
  • Be nice.
  • Don’t use profanity.
  • Don’t spam
  • Don’t harass.
  • Do not discriminate against age, race,
    gender, religion, nationality, ethnicity, sexual orientation, choice of Linux distro or ANYTHING ELSE.


</BUG BOUNTY>

If you happen to be oblivious to rule 2 and discover a vulnerability within the domains of the CTF infrastructure, then we urge you to e-mail us in private so we can
fix it and everyone else can enjoy the fun.
We will give you credit once the competition has finished and buy you a cookie and some coffee.
You will also earn our respect, which is hard to come by.


Under the auspices









Supported by:



CYberMouflons CTF Team