sCTF 2012

This is a great opportunity for all the students from India. Do participate and learn more about security!

Amrita University & TIFAC CORE
proudly present
sCTF ’12

National Level “Capture the Flag” style ethical hacking contest

Not a day passes when several machines are compromised and infections spread rampantly in the world today. The cyber world has witnessed several dangerous attacks including the Stuxnet virus and it’s successor Duqu. The most recent such attack is the Flame infection, in which the virus managed to disguise itself as a legitimate Windows software. It exploited a bug in Windows to obtain a certificate which allowed itself to authenticate that is was from Windows.

Indian websites too offer little or no resistance to such security intrusions. The Computer Emergency Response Team, India(Cert-In) has been tracking
de-facements of Indian websites and more. Their report can be viewed here. It’s really sad that with so much talent and skill, Indian websites are compromised frequently and nothing can be done to stand this wave of attacks on them.

sCTF is a Capture the Flag style ethical hacking contest, a strategic war-game designed to mimic the real world security challenges. Software developers in India have little exposure to secure coding practices and the effects of not adopting such practices-one of the main reasons why systems are compromised quite easily. Following such simple practices can help prevent such incidents. sCTF is focused exclusively on the student community. No prior exposure or experience in cyber security needed to participate. There are 3 rounds in the contest-the first rounds provide some necessary skills required to perform in the subsequent two rounds.

sCTF is being organized along with the 1st International Conference on Security of Internet of Things to be held at Amrita Vishwa Vidyapeetham, Amritapuri from 17-19 August 2012. Teams who qualify to the final round are fully sponsored to attend the conference and the event on-site. This is a golden opportunity to interact with the best security researchers from around the world! For more details, visit http://securit.ws.

What you need to do?
1. Form a team (max five members from your college)
2. Approach a faculty/mentor and request him/her to mentor your team
3. Register online at http://portal.inctf.in

Great Rewards

25K

15K

10K

The winning team receives a cash prize of up to
Rs. 25000/-

The first runner-up team receives a cash prize of
up to Rs. 15000/-

The second runner-up team receives a cash prize
of up to Rs. 10000/-

So, what are you waiting for? It’s simple: Register, Learn, Hack!

Notes:
1. Only four machines will be provided to each team-3 player machines and 1 gateway. Players cannot use any
additional machines. Also, collaborating with players(s) remotely is not allowed and any team doing so will be
disqualified from the event.
2. The expenses of only 3 members will be covered. Their conference fee will be waived and we will reimburse
upto a second class sleeper fare(2S). Each of the 3 members will be required to submit a copy of their tickets
in order to be eligible for reimbursement.
3. The remaining members, if any, have to register for the conference at the website and have to bear all
expenses they incur.
4. The final round will be on 20th August, 2012. The team can attend workshops and the conference from 17th
to 19th August.
5. Accommodation will be available from 16th, August 2012 night to 20th August 2012 night. Kindly plan your
travel accordingly.

If you have any clarifications, do get in touch with us.
Website|Email|Facebook|Twitter

*Cash prizes are subject to their performance and participation in the CTF round.

Advertisements

Tagged: ,

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s